Business Ethics Conduct Guide Best practice guidelines for using

Size: px
Start display at page:

Download "www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail"

Transcription

1 Business Ethics Conduct Guide Best practice guidelines for using

2 Contents PREFACE...3 DID YOU KNOW?...4 Make better use of time... 4 Manage the mass of information... 5 Avoid a sense of urgency... 6 Avoid dependency... 6 Improve the quality of your communication... 7 Avoid conflicts... 8 Protect against malicious s... 8 TOOLBOX...10 Guidelines for the proper use of NuCo Guide to basic functions Guide to advanced functions Thales University elearning portal FURTHER INFORMATION...11 France Germany United Kingdom United States Australia Other regulations Thales IT Charter and specific instructions TALK TO US...15 THALES Business Ethics Conduct Guide Best practice guidelines for using

3 33 PREFACE Preface These guidelines are an invitation to stand back and think about some of our daily routines and to see if there are things we could change or improve. has come to play an important role in the way we interact with others. It can sometimes be invasive, and we don t always use it as responsibly as we could! Some of the ideas in these guidelines may sound obvious, but they are here simply to remind us all to think twice about how we interact with other people. Dominique Lamoureux, Vice-President, Ethics and Corporate Responsibility This guide has been developed in close collaboration with the following Corporate Departments: Communications, Human Resources, Security, Internal Audit, Information Systems. CHORUS REFERENCE GOV-GRP-EN-001- Creation December 2012

4 4 DID YOU KNOW? Inappropriate use of can cause annoyance or inconvenience, but this can be avoided. By raising a few issues, this guide aims to improve your understanding of and help you make better use of it in your daily work. Make better use of time is a quick way to communicate. You can send a message to one person or as many people you like, whenever necessary, without needing to go anywhere or wait until they are free. However, the alltoo-familiar build-up of messages in people s inboxes can cancel out the time savings. Use the tool s built-in functions to sort and archive your messages every day and housekeep your mailbox so you can find things easily. Be specific in your subject lines, because this will help your addressees to manage their mailboxes as well. THALES Business Ethics Conduct Guide Best practice guidelines for using

5 5 Manage the mass of information With the widespread use of , the volume of information exchanged every day has also increased. This can lead to information overload and incomprehension. To avoid this, ask yourself about the suitability of the channel of communication used. is not always the best way to communicate. A telephone call or face-to-face meeting may be more appropriate. Similarly, avoid sending too much information at the same time, or choose recipients on a needto-know basis, rather than bulk mailing. DID YOU KNOW? Also remember that using does have an environmental cost and the more we send, the higher the cost! In a company with 100 employees, for example, a year worth of traffic has about the same carbon footprint as flying from Paris to New York and back 13 times! This is due to the electricity needed to power the servers that send and store the messages. Here are three ways we can reduce the environmental impact of our usages: limit the number of recipients: for example, do not use Reply All unless strictly necessary. reduce the size of each include thumbnails instead of full-size pictures, and send a link (URL) instead of attaching a document if possible. use text instead of HTML. CHORUS REFERENCE GOV-GRP-EN-001- Creation December 2012

6 6 Avoid a sense of urgency DID YOU KNOW? boosts productivity, but inappropriate use can cause stress for the people on the receiving end. An can give the impression that your request is urgent and must be dealt with immediately. Plus, if you people during evenings or weekends, it can encourage or oblige them to respond outside their normal working hours. Such practices have been condemned in courts of law. Tips for avoiding a sense of urgency: choose the best time to send your message and / or specify when you need a response. if a message is urgent, state this clearly in the subject line or body of the message, or use the important / priority / urgent indicator in your tool. However, urgent messages should be the exception, not the rule! limit when and where you access your mailbox (see below). Avoid dependency is so useful and compatible with company 3G laptops, smartphones, pushmail devices, etc. that it can be used almost exclusively, to the detriment of other tools, creating a degree of dependence and a willingness (or even perceived need) to be reachable at all times. As outlined above, matters are even worse when people are receiving work s outside normal work hours. For this reason, it is important to set boundaries on when you are available or can be reached, particularly during meetings and periods of annual leave. THALES Business Ethics Conduct Guide Best practice guidelines for using

7 7 Try to limit how accessible you are: when away on leave, activate the out-of-office message function, which automatically replies to anyone who s you, telling them you are unavailable and who to contact if their request is urgent. don t check your messages during meetings! To reduce your dependence, you can also limit pushmail (which automatically pushes messages from the mail server to your mobile device), or get your smartphone to sync messages at regular intervals instead of immediately. DID YOU KNOW? Improve the quality of your communication makes it easier to contact people and allows more frequent communication, but quality of content tends to suffer. If we re not careful, our exchanges can become depersonalised and less engaging and meaningful. Obviously you can t say everything in an , but there s no need to damage a relationship! Simply identifying the person you are ing at the start of the message, identifying yourself by using a signature at the end for example, and personalising the content of your message will help improve the quality of your communications. Always ask yourself whether is the most appropriate form of communication in that particular situation. Excessive use of for general communications can make the people on the receiving end lose interest and motivation. Taking the time to meet your teams, encouraging them face to face, responding to their s and giving them more autonomy are just some of the ways to re-motivate them. CHORUS REFERENCE GOV-GRP-EN-001- Creation December 2012

8 8 Avoid conflicts DID YOU KNOW? s can be misinterpreted, resulting in misunderstandings and conflicts. They can fire up emotions and lead to abusive behaviour. People may feel at liberty to do / say more from behind their screens than they would if they were face to face with the person at the other end. Be careful about what you put in your s and how you put it. Don t reply all when you only need to reply to the person concerned it limits the number of people receiving any personal or contentious information. The best way to defuse a conflict is talking face to face. Protect against malicious s Because can be sent quickly and easily to any number of people at the same time, it lends itself to abuse. Phishing (1), spam and s containing viruses are just three of the dangers awaiting unsuspecting users. It is therefore important to recognise the risks and deal with them effectively: Spam: unsolicited messages, usually advertising, sent indiscriminately and often repeatedly to huge numbers of people whose addresses have been harvested without their consent. The best advice is to never respond to such messages, but simply delete them. (1) Technique used by fraudsters to extract personal data and steal people s identities. THALES Business Ethics Conduct Guide Best practice guidelines for using

9 9 Phishing: method based on s purporting to be from banks, credit card companies and other reputable financial organisations, designed to trick unsuspecting users into disclosing confidential information. Remember, legitimate financial partners never send this type of . So treat any such messages with caution and suspicion, particularly if they ask for confidential details. Also, never click on a link in an which looks suspicious. Viruses: code carried by certain s, which installs itself on your computer as soon as you open a contaminated file attachment or connect to a contaminated website, then executes its payload to destroy certain file types on your hard drive or spy on your computer to harvest and export confidential information. DID YOU KNOW? Beware of any that arrives from an unknown source, or that looks strange or contains anything strange even if it appears to come from a familiar address. The virus protection installed on your Thales computer is vital, but it may not be effective against unknown malware (2). These guidelines are not intended to restrict the way that is used. They are recommendations based on broad experience that have proven useful in the past and should help us to make the most of as a quick and efficient way to communicate. (2) Malicious software, designed to harm computers and networks, without the knowledge or consent of the infected user. CHORUS REFERENCE GOV-GRP-EN-001- Creation December 2012

10 10 More practical recommendations for Thales employees on the use of are available on the Group IT Department intranet site. TOOLBOX Guidelines for the proper use of NuCo Recommendations to improve communications using the NuCo system, to be read in conjunction with this guide. Reglesdebonusage_en.cfm?intralang=en Guide to basic functions A quick-start guide to the basics of these various tools, designed to get you up and running. nuco_user_guide_basic_en.cfm?intralang=en Guide to advanced functions More comprehensive information about organising meetings, managing shared calendars and other more advanced functions. nuco_user_guide_advanced_en.cfm?intralang=en Thales University elearning portal best practices are outlined in the «Communicating powerfully by » module. product_sheet.php?report_id= THALES Business Ethics Conduct Guide Best practice guidelines for using

11 11 Rules already exist for the use of but they vary from country to country and operate at several different levels. At national level, the use of is subject to a legal framework, which varies from one country to another; list of applicable regulations in selected countries at time of publication. France Electronic messages can be recognized by French courts as a legitimate form of evidence, if the part which calls upon them had access there in a regular way. Personal s sent from a work mailbox are tolerated to a certain extent, provided they do not affect people s work, do not reflect negatively on the company s reputation and do not disrupt the operation of its information systems. If you want your correspondence to be considered private, you must clearly state in the subject line that such s are personal or private in nature. In your absence, the company has no right to access personal folders or messages, provided they are marked as such. In any event, only the IT department would be able to access them. FURTHER INFORMATION CHORUS REFERENCE GOV-GRP-EN-001- Creation December 2012

12 12 At Thales, employees working in the defence sector are required to comply with national security laws and regulations. Any breaches may be subject to prosecution. These rules stipulate, among other things, that no classified defence information may be transmitted by . For sensitive but unclassified information or specific information of a strictly national nature, refer to the instructions available on the Legifrance website (see link below) or contact the person responsible for security at your site. Texte=JORFTEXT &fastPos=1&fast ReqId= &categorieLien=cid&oldAction= rechtexte Germany FURTHER INFORMATION Companies that allow their employees to use their work mailboxes for private purposes cannot monitor the content of any such messages unless an employee is specifically suspected of a serious criminal offence. Rules on the appropriate use of the company system must be approved by the works council in an agreement. United Kingdom Employees are entitled to a private family life. In this respect, they may engage in a reasonable amount of private correspondence at work, particularly by . However, the law protects employers and allows them to monitor employee s. Misuse of can result in dismissal. THALES Business Ethics Conduct Guide Best practice guidelines for using

13 13 United States Private s are not considered confidential when they are sent from a work mailbox. Legal rulings have established that employees do not have a reasonable expectation of privacy at their place of work. However, individual employers may decide otherwise, in which case they must specify their policy in writing. Australia As in the United States, Australian law does not prevent a company from monitoring employee s, if the company owns the server. The workplace is considered a public place, but companies must inform employees about the specific types of monitoring in place. Other regulations In the Group s other countries of operation, local regulations are likely to be different from those described above, particularly in the area of national defence. It is important to be aware of them and refer to them whenever necessary. FURTHER INFORMATION CHORUS REFERENCE GOV-GRP-EN-001- Creation December 2012

14 14 At Group level, the Thales IT Charter provides a framework and best practice recommendations for the use of information and communication systems across the organisation, including the use of . In France, infringement of this charter can lead to sanctions. The Charter is available on intranet sites Information Systems and Chorus 2.0. The Charter is designed to be used in conjunction with specific instructions relating to: Information sensitivity Thales has determined degrees of sensitivity for confidential information, with corresponding procedures to be followed whenever such information is sent by . These procedures are available on Chorus database=chorus2p&servicename=fileget&number= GRP/ORGA/01053 FURTHER INFORMATION Security Specific security tools and resources to protect the information system are available to users. They are available on the intranet and must be used. en.cfm?&page_1360=1&y=0&intralang=en Export control for technical data index_en.cfm?&intralang=en THALES Business Ethics Conduct Guide Best practice guidelines for using

15 15 Talk to us... For more information, details or advice, please contact: Ethics and Corporate Responsibility Department: + 33 (0) TALK TO US CHORUS REFERENCE GOV-GRP-EN-001- Creation December 2012

16 This document is printed on recycled paper Ethics and Corporate Responsibility Department 45 rue de Villiers Neuilly-sur-Seine Cedex France Réalisation : Zao+Stratécréa - Shutterstock

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

www.thalesgroup.com Business Ethics Conduct Guide User guide on Ethics Alert

www.thalesgroup.com Business Ethics Conduct Guide User guide on Ethics Alert www.thalesgroup.com Business Ethics Conduct Guide User guide on Ethics Alert Contents UNDERSTANDING THE ETHICS ALERT FACILITY...4 Aim of the ethics alert facility... 4 Scope of the ethics alert facility...

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

Beth Hennigan. 1 P a g e

Beth Hennigan. 1 P a g e 1 P a g e Gold - Unit 13 Using Email Use e-mail software tools and techniques to compose and send messages 1.1 I can select and use software tools to compose and format e-mail messages, including attachments

More information

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

EDEXCEL FUNCTIONAL SKILLS ICT. Study Module 8. Using ICT to communicate

EDEXCEL FUNCTIONAL SKILLS ICT. Study Module 8. Using ICT to communicate EDEXCEL FUNCTIONAL SKILLS ICT Study Module 8 Using ICT to communicate Published by Pearson Education, Edinburgh Gate, Harlow CM20 2JE Pearson Education 2010 All rights reserved. This material may be used

More information

Fighting spam in Australia. A consumer guide

Fighting spam in Australia. A consumer guide Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

Email Policy For Staff and Students

Email Policy For Staff and Students Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management

More information

How To Use A College Computer System Safely

How To Use A College Computer System Safely 1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.

More information

Guidelines on developing a policy for managing email

Guidelines on developing a policy for managing email Guidelines on developing a policy for managing email Crown copyright 2004 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government

More information

COLLEGE POLICY MANUAL

COLLEGE POLICY MANUAL Policy No. & Title: C202: ACCEPTABLE USE OF COLLEGE TECHNOLOGY Effective: 2015-07-14 Next Review: 2020-07-14 Policy Sponsor: Chief Information Officer Ref Cttee: Senior Leadership Council Approvals: 2000-05-03/SA-99-09;

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

OCT Training & Technology Solutions [email protected] (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Information Security Code of Conduct

Information Security Code of Conduct Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

Email Etiquette (Netiquette) Guidance

Email Etiquette (Netiquette) Guidance Email Etiquette (Netiquette) Guidance January 2007 Email Etiquette (Netiquette) Guidance January 2007-1/13 Version Control Version Author(s) Replacement Date 1.0 Timothy d Estrubé Information Governance

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 (Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I

More information

INFORMATION SECURITY GUIDE FOR STAFF

INFORMATION SECURITY GUIDE FOR STAFF INFORMATION SECURITY GUIDE FOR STAFF December 2013 TABLE OF CONTENTS Why is information security so important for you and the university...1 Use strong passwords and keep them safe...2 E-mail use...2 Beware

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0 NOS for IT User and Application Specialist IT Security (ESKITU04) November 2014 V1.0 NOS Reference ESKITU040 ESKITU041 ESKITU042 Level 3 not defined Use digital systems NOS Title Set up and use security

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

Information Governance Framework. June 2015

Information Governance Framework. June 2015 Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review

More information

Internet, E-mail and SMS Texting Usage Policy Group Policy

Internet, E-mail and SMS Texting Usage Policy Group Policy Internet, E-mail and SMS Texting Usage Policy Group Policy Scope: This Orbit Housing Group Limited ( Group ) policy provides a set of guidelines for all users within the Group on the proper usage of the

More information

More Details About Your Spam Digest & Dashboard

More Details About Your Spam Digest & Dashboard TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

How to Manage Email. Guidance for staff

How to Manage Email. Guidance for staff How to Manage Email Guidance for staff 1 Executive Summary Aimed at Note Purpose Benefits staff Necessary skills to All staff who use email This guidance does NOT cover basic IT literacy skills. Staff

More information

ModusMail Software Instructions.

ModusMail Software Instructions. ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account

More information

Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012

Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012 Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

Acceptable Use Policy (AUP) School Computing

Acceptable Use Policy (AUP) School Computing Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts

More information

What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails

What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails 2000 Linwood Ave Suite 19J Fort Lee, NJ 07024-3012 What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails Following Last Year s Hack Attack At Epsilon, You May Be Overwhelmed

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

NC DPH: Computer Security Basic Awareness Training

NC DPH: Computer Security Basic Awareness Training NC DPH: Computer Security Basic Awareness Training Introduction and Training Objective Our roles in the Division of Public Health (DPH) require us to utilize our computer resources in a manner that protects

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages

More information

Data Protection and Privacy Policy

Data Protection and Privacy Policy Data Protection and Privacy Policy 1. General This policy outlines Conciliation Resources commitments to respect the privacy of people s personal information and observe the relevant data protection legislation.

More information

LCC xdsl Usage Policy

LCC xdsl Usage Policy LCC xdsl Usage Policy 1. Introduction For the Internet to operate in a manner that satisfies the majority of its users, all users need to observe some rules and etiquette governing their use of it. These

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information