, Internet & Telephone. Policy and Procedure

Size: px
Start display at page:

Download "Email, Internet & Telephone. Policy and Procedure"

Transcription

1 A , Internet & Telephone Policy and Procedure MAYLIM LTD Civil Engineering & Hard Landscaping Contractors Wharf Road, G 04 The Wenlock, Islington, London N1 7EU Tel: +44(0) Fax: +44(0)

2 DOCUMENT CONTROL AND REVISION Rev No: Date: Section: Comment: 1 Jan 2012 All Sections New Document 2 Jan 2013 All Sections Management Review No Change 3 Jan 2014 All Sections Management Review No Change GLOSSARY OF ACRONYMS ML Maylim Ltd ML EITPOL Rev3 JAN 2014 Page 2

3 This policy has been produced for the benefit of all users of computer and telephone equipment as well as employees who have access to mobile equipment provided by ML, which includes mobile data devices such as, but not limited to, mobile phones, Blackberry phones, smart phones, pocket PC s, palm tops, satellite navigation systems, etc. This Policy should also be read in conjunction with the ML s Data Protection Policy and your Written Statement of Terms and Conditions of Employment in relation to various clauses that inter relate with this Policy, i.e. Confidentiality and ML Property. The main aims of this policy are to: Ensure that all computers, telephone systems and mobile equipment are as close to a standard configuration as possible, thereby reducing any disruption if equipment needs to be replaced. Minimise the risk of damage to hardware, software or data. To ensure that computer and other systems do not infringe any copyright or licensing laws. To adhere to the ML s corporate image on computer equipment where possible. 1.1 COMPUTERS, AND INTERNET 1. Use of your Computer General Computers and the ML s IT systems are in general terms for ML business and personal use is a privilege and not a necessity and should be used within reason and not interrupt the daily business in any way. Usage can be easily blocked and any misuse or irresponsible behaviour will result in access being withdrawn permanently. You are authorised only to use facilities made available to you when you log onto the system under your allocated user name. You are not permitted to use, change, or give out yours, or any other person s password or ML systems passwords without the express permission of the System Administrator. Also you must not hack into the ML s website or alter it in any way, unless given authority to do so. If you find that someone has made unauthorised use of your account, you should report this immediately to the System Administrator. All data stored on your PC, the network or any disk should only contain information relating to ML business and should be kept in the strictest of confidence. No copies should be taken of the data, other than for back up purposes. You should take all reasonable precautions to ensure that any disks or printouts of your data are secure from theft or copying. No data of any other description should be present on any of the ML s computer systems, with specific regard to pornographic or obscene material, whether pictorial or descriptive. The computer systems may not be used to acquire, display or distribute any content that may be considered offensive to others, including content of a sexual nature. This content is considered to be any programme, image, document, sound or video clip that can be displayed or heard via the computer. Maintaining logs off our and internet systems is a part of our requirement under legislation to ensure that any third party, such as the Police, who are involved in an investigation, can gain access to our systems. Measures are in place that monitor real time access and individual machines. ML has the right to regularly review the contents of any computer and all use, including internet and traffic. Therefore, all machines will be periodically checked and scanned for unauthorised programs and viruses and may be affected without your knowledge. ML reserves the right to review, audit and disclose all matters contained in all s and attachments to: ML EITPOL Rev3 JAN 2014 Page 3

4 Establishing the existence of facts. Ascertaining compliance with regulatory or self regulatory practices or procedures, rules or codes. Investigating or detecting unauthorised use of the system. Ascertaining and maintaining standards of service and training. Investigating, detecting or preventing crime. Ensuring the effective operation of the system. You should be aware that the deletion of a message or file may not fully eliminate it from the system. Also, you have an obligation under the Data Protection Act (1988) to comply with your responsibilities under this Act and exercise due care when dealing with any personal data. 2. Virus Checking Virus protection and your awareness of virus protection are vital to our day to day ability to operate the ML which is entirely dependent upon its IT structure to operate. A catastrophic failure of the IT structure will potentially render the ML inoperable. Any activity by any individual that contributes to such a potential situation may be subject to disciplinary action. Therefore, all employees are expected to ensure that the anti virus software is up to date and operational at all times to protect the ML s systems. Computer viruses enter network systems by a variety of means, such as: Infected memory sticks Infected CD ROM s Via Internet web browsers Via attachments Attacks from outside if the network has outside connections Attacks from inside ML itself Individual machines can become infected by other machines on the network resulting in particularly virulent strains of a virus eventually infecting the whole system. In severe cases, this can totally destroy the network and cause it to grind to a halt. If you discover a virus at any time you should stop using the computer and notify the System Administrator immediately. You should not save any files that are open, or try to close down your computer as this may cause more damage if a virus is present. a) Memory Sticks Memory sticks are not to be inserted into any drive without first being scanned for viruses. This includes disks with existing data on them and disks that are brought in from home. You may easily have a virus on your machine at home that you don t know about until it is installed on a network. b) CD ROMS As with floppy disks, CD ROMS may easily contain viral material which could be damaging to our network. All CD s must be virus scanned before inserting them into any CD ROM drive on any machine. c) Screen Savers Screen savers are, in fact, executable code the same type of code as a virus. As such, installing a screensaver other than the standard Windows ones can also install a virus along with it. Screensaver ML EITPOL Rev3 JAN 2014 Page 4

5 virus payloads are not around in large numbers at present, but they do exist making them even more dangerous than standard executable code where the user has to physically run the program to execute it. Due to this, screensavers that are not the standard Windows screensavers are not to be installed on any ML machine. It is also possible to install wallpaper to enhance the look of the Windows desktop. This is also dangerous as many virus programs attach themselves to.jpg files. You are asked only to use the standard Windows desktops supplied with the operating system as it is much safer. d) Additional programs Following on from items a) and b), programs are not to be loaded onto any machine by anyone other than by the System Administrator. If a program is deemed to be useful to ML operations, it may be allowed provided it is: Legal Properly license Safe to install This includes any program or routine downloaded from the Internet. Therefore as ML has a defined set of standard software packages that are to be used throughout ML you must only use these standard packages and must not install any non standard software or data, such as games, screen savers, video clips, non work related programmes under any circumstances, unless prior approval by the System Administrator has been given. Any other software additional to the above will be added in agreement with the System Administrator who will ensure the purchase of any necessary software licences. You are also not entitled to make unauthorised copies of any software unless prior approval has been given by the System Administrator. 3. Internet Use You are requested not to download utilities or programs from the Internet as this exposes the relevant machine and subsequent the ML s network to virus attack. Improper use of the internet as listed (although the list is not exhaustive) below is considered Gross Misconduct: Accessing adult/pornographic sites and downloading pornographic or sexually explicit material. Accessing or downloading material that could offend others because of its racist, religious, political, or violent nature, or material deemed to incite hatred, violence or slander towards a specific individual or group. Circulating to other employees or sending externally any of any material as outlined above. Accessing or downloading on line gambling, including games downloading and/or installing unauthorised software. Installing unauthorised software that subsequently destroys part or all of the ML s operating systems. Accessing and using unauthorised internet sites, including chat and social networking sites. Anything that may bring ML or individuals into disrepute. ML EITPOL Rev3 JAN 2014 Page 5

6 4. Whilst ML has a fairly relaxed policy on sending personal , the ML s system is for business purposes and personal s are not to be stored on the ML s system. We also ask that this privilege does not interrupt the daily business in any way. All business s that are sent or copied to individuals outside the ML must be written in a professional manner as they are seen as legal communication and if misused ML can be held liable. Therefore the following list sets out how ML wishes s to be managed professionally (although the list is not exhaustive): You must not send out any personal s that contain any ML information and ensure that s do not compromise ML or any employee in any way. This includes giving details, or the registering, of ML addresses for non business purposes. No s, including attached files, should be sent or forwarded (either externally or internally) which may contain confidential, political, libellous, racist, sexist, defamatory, offensive (which means in the eyes of the person receiving it) obscene, threatening, harassing or otherwise in any other way inappropriate, material. It could mean that you and ML could be held legally responsible. No s, including attached files, should contain information, which is derogatory, defamatory, obscene or inappropriate in nature. Keep language appropriate and professional the test being any can be seen by anyone (including a court or tribunal in the worst case). Always include the name of the recipient as a greeting and an appropriate (standard) signoff. Be reasonably accurate with spelling, grammar and layout, ensuring that you re read it through to ensure accuracy and the spell check is used before sending the out. Check that you are sending the to the right person before sending. No show boating by copying in huge audiences unnecessarily. No expanding of any circulation list other than in exceptional circumstances and where any additions and the reason for their introduction are made clear (i.e. I have copied Mr X in so he can action point xyz). Do not extend the circulation of an internal or trail to external third parties. Do not put anything in an that you would not say to the recipient's face or in an open meeting. Do not forward s with sensitive or private information sent to you personally to others, particularly newsgroup mailing lists, without the permission of the originator. Do not send unnecessary messages such as festive greetings or other non work related items by , particularly to several people, unless required as part of the business. Do not participate in chain or pyramid messages or similar schemes. Do not represent yourself as another person. Do not use any other electronic mail system for ML business. If you receive containing material that is offensive or inappropriate, then you must delete it immediately. Under no circumstances should such be forwarded either internally or externally. Only open s that you know the source of and be very wary of unsolicited s with strange subject headers, as this will avoid the system being infected with a virus that may override the ML s anti virus measures. ML EITPOL Rev3 JAN 2014 Page 6

7 You must also bear in mind that viral payloads are most likely to come from personal sources. Most companies have some form of virus protection so from these sources is generally more secure. However, most home users do not have protection so the probability of receiving viruses from these sources is very much higher. If they have a virus, they may not even realise it and some viruses do not activate immediately. Therefore, be very wary of unsolicited s with strange subject headers, as this will avoid the system being infected with a virus that may override the ML s anti virus measures. Merely knowing someone does not mean that they could not be unwittingly passing you a virus. Security measures are in place to remove suspect executable attachments to messages, but this does not mean that you should be complacent. If you re unsure about an attachment that you have received, do not open it and delete it immediately. 5. Health and Safety with Computers You will be responsible for notifying the System Administrator after the initial 'set up' ensuring your workstation conforms to the Display Screen Equipment Regulations, if you feel that any changes make your workstation non compliant. If you detect any hazard at your workstation, including 'noises' from any equipment, trailing cables and flexes then you should report it immediately to the System Administrator. Also, ML has the duty to ensure that regular appropriate eye and eyesight tests are carried out by a competent person for employees carrying out work using display screen equipment. If you are experiencing visual difficulties you must request an appropriate eye and eyesight test. This test should take account of the nature of your work, including the distance at which the screen is viewed. ML will pay for this test. If special corrective glasses are then prescribed for work with display screens ML will pay up to a maximum cost towards the cost of these glasses provided they are solely to be used for this work. 1.2 TELEPHONES All employees are asked to answer all calls as quickly as possible in a professional and polite manner. ML asks employees to limit incoming and outgoing personal calls to urgent needs only and reserves the right to monitor all personal telephone calls and if it finds that calls are unreasonable may ask you to refund such costs. No calls may be made to premium rate or overseas numbers, without prior authorisation. Please be aware that if you have been provided with a ML mobile and you send a text message that contains racist, sexist, defamatory, offensive (which means in the eyes of the person receiving it), or otherwise inappropriate content, you, and ML could be held legally responsible. If you use your ML or personal mobile to make or receive business related calls, you must not use the mobile phone while driving, and must use voic activated settings, a message service or call diversion and to stop regularly to check messages and return calls. Phones may only be used while driving if you use a hands free device that can be activated and deactivated without holding it in your hand at any time. ML will provide these to all employees who are issued with a company car or van, and you are advised to pull over when the phones rings but only if it is safe to do so. You are prohibited to ever use your phone while driving if the phone has to be held in order to operate it, this is illegal and you will be responsible for any fines received for doing this. ML EITPOL Rev3 JAN 2014 Page 7

8

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

School policies and Security Risks

School policies and Security Risks 1) Introduction a) The school expects its computer and telephone systems to be used in a professional manner at all times. The school provides these facilities at its expense for its own business purposes.

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

How To Behave At A School

How To Behave At A School THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY

TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY Council Resolution No 313/03 adopted at the Ordinary Meeting of Council on 19 August 2003. PURPOSE

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information

Acceptable Use Policy - NBN Services

Acceptable Use Policy - NBN Services OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:

More information

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 (Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011 West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Acceptable Use of Information and Communication Systems Policy

Acceptable Use of Information and Communication Systems Policy Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.

Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the

More information

Internet, E-mail and SMS Texting Usage Policy Group Policy

Internet, E-mail and SMS Texting Usage Policy Group Policy Internet, E-mail and SMS Texting Usage Policy Group Policy Scope: This Orbit Housing Group Limited ( Group ) policy provides a set of guidelines for all users within the Group on the proper usage of the

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,

More information

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Use of the Internet and E-Mail Policy

Use of the Internet and E-Mail Policy Use of the Internet and E-Mail Policy This procedural documentsupersedes : Use of the Internet and E-Mail Policy CORP/EMP 16 v.4 Name and title of author/reviewer Samantha Francis HR Advisor Date revised

More information

ICT Security Policy for Schools

ICT Security Policy for Schools WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information. and Communication Systems Policy Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,

More information

Using Public Computer Services in Somerset Libraries

Using Public Computer Services in Somerset Libraries Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

SAS TRUSTEE CORPORATION ( STC )

SAS TRUSTEE CORPORATION ( STC ) SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

Electronic Communications and. Guidance note and template policy

Electronic Communications and. Guidance note and template policy Electronic Communications and Internet policy Guidance note and template policy When employing staff it is useful to create a policy which sets out your standards and requirements of your staff when they

More information

Internet, Social Media and Email Policy

Internet, Social Media and Email Policy West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...

More information

THE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES

THE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES THE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES In summary the telephone, fax, E-mail and Internet should NOT be used: For personal gain or profit. To represent yourself as someone else. To send, post,

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is

More information

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review:

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review: POLICY DOCUMENT Burton Hospitals NHS Foundation Trust INFORMATION SECURITY POLICY Approved by: Executive Management Team On: 16 January 2014 Review Date: December 2015 Corporate / Directorate Clinical

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

Responsible Computer Use Policy for Students

Responsible Computer Use Policy for Students Responsible Computer Use Policy for Students Introduction By using the Sheldon College Network and ICT Services students agree to accept the terms and conditions outlined in this document. This policy

More information

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Revelstoke Board of Education Policy Manual

Revelstoke Board of Education Policy Manual Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

With the increasing popularity of social media you need a Social Media Policy to protect your company.

With the increasing popularity of social media you need a Social Media Policy to protect your company. Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not

More information

CARRAMAR PUBLIC SCHOOL

CARRAMAR PUBLIC SCHOOL CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school

More information

Acceptable Use Policy Internet and Email - Students

Acceptable Use Policy Internet and Email - Students Acceptable Use Policy Internet and Email - Students Ref HR01 Acceptable Use Policy Internet and Email - Students Review Date: August 2016 North East Scotland College All rights reserved INTRODUCTION Information

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

E-Safety Policy & Procedures

E-Safety Policy & Procedures E-Safety Policy & Procedures Version Policy Originator: Equality Impact Assessed: Approved by: SMT Date Approved: April 2015 Review Interval: Annually Last Review Date: - Next Review Date: April 2016 Audience:

More information

TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS

TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated

More information

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement 111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use

More information