Acceptable Use of Information and Communication Systems Policy
|
|
|
- Monica Powell
- 9 years ago
- Views:
Transcription
1 Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help intu employees, agents and third parties understand what they are, and are not, allowed to do using intu systems and services, from both a personal and business point of view. This should be read in conjunction with the Group s Discipline & Capability, Grievance and Dismissal policies. This document is derived from the full Information Security Policy. Adherence to the AUP should be sufficient for day-to-day good practice. If they have any doubts regarding acceptable use of company systems, employees must consult their line manager or an IT Manager who can refer to the full policy for detailed clarification. Scope This policy applies to all employees, contractors and agents authorised to use information and communication technology (ICT) provided by intu, this includes use of networks, servers, PCs, laptops, personal digital assistants (PDAs), smartphones (such as Blackberry), mobile phones, portable storage devices and corporate sessions from a home or cyber café PC. The ICT equipment is provided to enable staff to do their job and to develop understanding of information and communication technology. Some personal use of equipment and services is accepted, however, this must be considered within the bounds of reasonableness which is explained below. This document will be updated as the scope of acceptable use policy extends to other platforms and services or where issues of compliance or legislation impinge upon it. Structure For each functional area of technology or service supplied by intu, there is a specific set of acceptable, unacceptable and expressly forbidden practice or use. The activity listed as acceptable defines the degree of flexibility that intu concedes to all authorised users of company equipment. It recognises that the Group wants people to feel comfortable using new technologies and will help in their development in this key area. It also highlights activity by the Group to manage and monitor compliance with the policy. This is a definition of what intu believes to be unacceptable use of its equipment and services. Any activity undertaken that falls within this definition could render the user liable to disciplinary action. These activities are expressly forbidden. Anyone using company equipment V.1C Page 1 of 6
2 for the purposes identified in this category may be committing gross misconduct. Management access to data It must NOT be assumed that stored information and communication is private: messages can be intercepted or wrongly addressed. All messages to and from intu employees have their recipients, senders and contents logged. Intu reserves the right to inspect the contents of any communications or information stored on Group equipment, for the purpose of confirming compliance with policy. Only authorised personnel can access systems in such circumstances and they will guarantee confidentiality except to the extent that is required to follow up breaches, to comply with court orders or to facilitate criminal investigation. The Group reserve the right to recover the cost of personal use of equipment and will monitor usage and billing detail to identify such use. IT support and Internal Audit may occasionally need to undertake activities that fall into '' category. This is acceptable provided that it is done with the full knowledge and agreement of their Manager and the Group IT Manager. Intu employs monitoring techniques on many of its systems, including and the Internet access, to enable usage trends to be identified and to prevent unacceptable use. It is clear from information that this delivers that the vast majority of users respect acceptable use. Glossary A number of terms are used throughout the Use Policy that may need explanation. These terms are defined below to further aid understanding. Offensive It is not possible to provide a definitive, prescriptive list of 'offensive' material. However the following identifies the type of material that is offensive for the purposes of the acceptable use policy: "Material that is defamatory, racist or discriminatory on grounds of religion, disability, gender or sexual orientation, or alternatively which is designed to harass, victimise or bully, cause pain or distress to individuals." Obscene Literal definitions of obscene describe material that is 'offensive/outrageous or repellent' or material that is ' designed to deprave or corrupt' the audience. For the purpose of this document, any material that will cause extreme offence to an intu employee, business partner or visitor will be considered obscene. Compressed files Compressed files are ordinary files that have been changed so that they take up less space than the original file. These files when uncompressed can become extremely large and take up large amounts of space on the workstation or server. Commonly used compression tools are widely available and create files with a name extension of.zip. V.1C Page 2 of 6
3 Executable code An executable file is one that contains a program, i.e. a particular kind of file that is capable of being executed, that is run, on a computer processor. An executable file usually has a file name extension of.bat,.com, or.exe. 1. Use of telephony The provision of (voice) telephony by the Group is for business purposes only whether on a fixed (land) line or on a mobile telephone or device. While the Group reserves the right to recovery the costs of personal calls and usage this is intrusive and expensive and to avoid this, staff are expected to curtail personal use. Communication in the course of the Group s business Incidental and emergency personal use The Group will monitor call charges and usage logs The Group reserves the right to recover any costs attributable to personal use Persistent, significant, personal use may become a disciplinary issue. Intruding into the working day with personal calls Accessing premium rate services Allowing non employees to make use of the device Ignoring or by-passing security for the device Making passwords or PINs available to unauthorised persons To conduct business other than the Group s business. To disclose confidential information to unauthorised parties To use the telephone to communicate anything discriminatory, abusive, obscene, illegal, offensive, potentially libellous or defamatory 2. Use of the Internet Accessing business related web sites in relation to the user's job Accessing web sites (OTHER than those containing pornographic, offensive or obscene material) for non-business related reasons during lunch hours and before or after the working day Spending any period of the working day looking at non-business related Internet sites; Tying up large proportions of Internet resources on non-business related activity, to the detriment of genuine business Internet usage. This includes:- - Leaving live internet feeds open all day to collect news or sports results; V.1C Page 3 of 6
4 - Downloading images, video or audio streams for non-business related purposes; - Making repeated attempts to access web sites that, because of their inappropriate content, have been automatically blocked Making your password available for other people to use the Internet service on your behalf; Using someone else's personal id and password to access the Internet; Downloading any copyright material without the owner's permission Downloading software used for hacking or cracking passwords. Deliberately accessing sites containing pornographic, offensive or obscene material Downloading pornographic, offensive or obscene material. 3. Use of Communication in connection with company business Occasional personal use during lunch hours and before or after the working day Management access to read employees' mail boxes where there is a legitimate business need to do so (e.g. if a person is absent and important is expected.) Using for personal, non-business related communication during working hours. Overuse of services for personal, non-business related communication during break times or after hours, e.g: > 5 non-business related items per day OR Sending non-business related directly to large distribution groups OR Sending files with attachments (e.g. compressed files, executable code, video streams, audio streams, or graphical images) to internal or external parties Subscribing to non-business related mailing lists Sending messages or files through internal , or via the external mail gateways that contain discriminatory, abusive, pornographic, obscene, illegal, offensive, potentially libellous or defamatory content. NOTE: Unsolicited receipt of discriminatory, abusive, pornographic, obscene, illegal, offensive, or defamatory is clearly not a disciplinary offence, although anyone who receives such material should inform either their manager, an IT manager or HR immediately. V.1C Page 4 of 6
5 4. Use of servers, PCs, notebook PCs, PDAs, Smartphones and portable storage devices Note that the majority of equipment is now leased. Intu is accountable to the leasing company for the care and whereabouts of the equipment and, in turn, employees are accountable for the safe keeping of IT equipment issued to them Storing corporate data Running company supplied software Loading text and images in connection with normal business Storing limited amounts of personal data Reporting any accidental damage or loss immediately to the IT Helpdesk Loading unauthorised or untested software, i.e. software not supplied through the formal procurement process by Group IT. Loading any software without the prior consent of Group IT Storing corporate data solely on local drives or devices (which are not backed up) Making your password(s) available for other people Using someone else's personal id and password Moving (static) equipment without agreement from the IT Helpdesk Re-allocating equipment to other members of staff other than through the IT Helpdesk Surrender of equipment not in working order, with undue wear and tear or with accessories missing Connecting devices (including USB devices flash storage, cameras etc) to IT equipment or the network that have not been supplied through the formal procurement process with Group IT Loading files containing discriminatory, abusive, pornographic, obscene, illegal or offensive content, whether in text, image, video or audio format. Physical abuse or wilful neglect of equipment 5. Use Policy for the 40 Broadway Cyber Café PCs The cyber café PCs are not part of the corporate network and are available for legitimate personal use of the Internet. Legitimate personal internet use Use of personal (hot) mail account and ISPs. (Take care to log off properly). Personal shopping, banking and services at the user s own risk. Available at anytime in your own time Use by visitors who accept this section of the policy V.1C Page 5 of 6
6 Use for company (intu) business Use of the cyber café to the detriment of your working day Hogging the PCs at the inconvenience of other staff Storing personal information on the Cyber PCs As detailed elsewhere: Downloading software used for hacking or cracking passwords. Deliberately accessing sites containing pornographic, offensive or obscene material Downloading pornographic, offensive or obscene material, whether in text, image, video or audio format. Abusive, obscene, discriminatory, illegal, offensive or defamatory messages Illegal or illicit trading of any kind. 6. Use Policy for Electronic Bulletin Boards Advertising unwanted goods, for sale by intu employees Publicising events which may be of interest to other members of staff Text only messages Notices containing pictures, video clips or other multimedia elements that unnecessarily use up large amounts of expensive resources. Business advertisements or trade sales, Sale of any goods purchased with the sole intention of making a profit, Interactive chat or quizzes, Repeatedly advertising the same items within a working week Abusive, obscene, discriminatory, illegal, offensive or defamatory messages Illegal or illicit trading of any kind, e.g. - Trading non-original or pirated copies of games console software, P.C. software, videos, DVDs or CDs / tapes, - Disposal or sale of goods purchased Tax Free, - Goods marked "Not for re-sale", or similar, - Sale of alcohol / cigarettes etc purchased in bulk from outlets outside the UK. V.1C Page 6 of 6
HUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
Information Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Internet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES Version 3.0 17/05/2012 CONTENTS 1. Introduction and Scope... 3 2. Data Protection Act 1998... 4 3. Licence Registration and Prevention of Piracy...
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
CARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
POLICY ON USE OF INTERNET AND EMAIL
POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.
Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes
Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
Information & Communications Technology Usage Policy Olive AP Academy - Thurrock
Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
Acceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
INTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Virginia Primary School Learning Together, Learning for our Future
Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of
Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
INTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
Dulwich College ICT Acceptable Use Policy
Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
LCC xdsl Usage Policy
LCC xdsl Usage Policy 1. Introduction For the Internet to operate in a manner that satisfies the majority of its users, all users need to observe some rules and etiquette governing their use of it. These
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
Angard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
Kenmore State High School Student Laptop Charter
Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6
Information Security Code of Conduct
Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
John of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the
Acceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
With the increasing popularity of social media you need a Social Media Policy to protect your company.
Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not
Marion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
UTC Cambridge ICT Policy
UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions
