LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Policy V1.3
|
|
- Jonah Elliott
- 8 years ago
- Views:
Transcription
1 LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Policy V1.3
2 Document Control Reference V1.3 Policy Date 17 July 2015 Author Approved by Version History David Ingham Judith Hetherington Smith - Chief Information Officer Date Version Revision Notes Author Number 18 February 14 V 0.1 Initial Draft David Ingham 10 April 14 V 0.2 Minor amendments release for comment David Ingham 14 April 14 V 1 Amendments following HoIMT review David Ingham 4 June 14 V 1.1 Minor amendments following CIO review. David Ingham Addition of BPSS requirement 10 June 2015 V 1.2 Minor text corrections. David Ingham Para 4.5 amended. Clarification of forwarding and OWA access included Para 5.4 added. Para 14 added delegate access. Para 15 added accessing ex-employee accounts 17 July 2015 V1.3 Minor text amendments following CIO comment. Added para 17. David Ingham Contents Document Control Aim Introduction Scope General Principles confidentiality GCSX LCC Secure LCC standard Spam Virus transmission Unacceptable Use Personal Use Generic Accounts Delegate Access Accessing accounts of ex-employees management Further Information Document Reference: V1.3 Policy Page 2
3 1. Aim 1.1. The aim of this policy is to ensure that individuals are aware of their responsibilities when using Council This policy forms part of the LCC Information Security Policy Framework which contains a set of policies, procedures and standards designed to protect Council information and information assets. 2. Introduction 2.1. Electronic mail ( ) systems are provided by the Council to allow employees to communicate on behalf of the Council in an effective, efficient and timely manner However, can put the Council at risk from a number of threats. These range from information being obtained by unauthorised people, introduction of malicious software, and legal action caused by inappropriate use of the systems It is the responsibility of those who use Council to ensure that this technology is used for Council purposes in a manner which does not compromise the Council or its Users in any way. 3. Scope 3.1. The policy applies to every individual using Council provided including employees, members, contractors, consultants, suppliers, partnerships, and volunteers. 4. General Principles must not be considered to be any less formal than memos or letters that are sent out from the Council must not contain any material which would reflect poorly on the Council s reputation or its relationship with third parties Personal web-based accounts or home accounts must not be used to conduct Council business must not be auto-forwarded to non LCC corporate addresses as security of alternative addresses cannot be assured When using Outlook Web Access to access corporate information must not be transferred to/stored on a non LCC device. This is to ensure all corporate information is subject to corporate security controls. Document Reference: V1.3 Policy Page 3
4 4.6. Requests for information under the Data Protection Act or Freedom of Information Act may require that an is made public and therefore the confidentiality and privacy of s cannot be guaranteed s must only be transmitted by individuals using their own authorised account s which form part of a record must be subject to the Records Management Policy and must be subject to the appropriate retention and disposal schedules attachments should be stored within corporate systems i.e. IMP, Mosaic, and deleted from s Attempts to all LCC users will be blocked and automatically diverted to the Internal Communications team who are responsible for approving corporate s. 5. confidentiality 5.1. When sending an to more than one recipient and it is necessary to protect addresses the BCC (blind carbon copy) feature must be used i.e. when sending an external to multiple members of the public or multiple suppliers Care must be taken when addressing s and checks must be undertaken to ensure any /attachment is transmitted to the intended recipient Particular care must be taken if the client software auto-completes an address as the user begins typing the recipient's name s which contain personal data or information which can be defined as sensitive by the Council (information you would not want to be published in the public domain) must not be sent external to the Council unless a secure solution is used. Secure solutions are described below in paragraph 6 and In addition to using secure , attachments containing personal data or other sensitive information must be password protected where possible. This will prevent casual access if an is sent to the incorrect recipient Any incoming marked using the governments classification scheme e.g. Official must have their markings preserved and respected for any onward communication. 6. GCSX GCSX must be used to securely send personal data or sensitive information via to Government organisations that have a designated GCSX or equivalent address. Document Reference: V1.3 Policy Page 4
5 6.2. Equivalent addresses include: Local Government *gcsx.gov.uk NHS/Health *.nhs.net The Police National Network/Criminal Justice Service/Ministry of Justice *.pnn.police.uk *scn.gov.uk *cjsm.net Central Government *.x.gsi.gov.uk *.gsi.gov.uk *.gse.gov.uk 6.3. Users must be aware that sending an from a GCSX account to an address which does not meet the above criteria is insecure and must not be used to send personal data or sensitive information LCC Secure must be used as an alternative to GCSX when Government authorities or private organisations do not have access to a GCSX account or equivalent GCSX Mail must only be available from LCC corporate devices s delivered to GCSX accounts must not be auto forwarded to another account Applications for a GCSX account must be completed using the online GCSX e-form available on the Information Governance page on George Applications for a GCSX generic account must be completed by a Manager using the generic request e-form available on the Information Governance page on George Only staff with individual GCSX accounts must be allocated access to a generic GCSX account All users of GCSX (a PSN service) must be validated against the Baseline Personal Security Standard before an account is provided. 7. LCC Secure LCC Secure service must be used to transmit s containing personal data or sensitive information to external addresses when the recipient does not have access to a GCSX address or equivalent. Document Reference: V1.3 Policy Page 5
6 7.2. All Users must familiarise themselves with the LCC Secure service instructions before using it. Failure to do so may result in an being sent insecurely All Users must ensure intended recipients are provided with LCC Secure service instructions on initial use Instructions on the use of LCC Secure are available on the Information Governance Intranet page. 8. LCC standard LCC standard accounts i.e. lincolnshire.gov.uk must only be used to exchange personal data or sensitive information with other internal LCC standard addresses LCC standard accounts must not be used to send personal data or other sensitive information external to the Council. 9. Spam Spam , also known as junk , is unsolicited sent to numerous accounts. It can be used as a method of delivering malicious software by convincing a User to click on an executable attachment or on a link to a malicious website which has been quarantined by the technical controls on the Council Network must only be released if the User is confident it is a legitimate A User must not open an attachment or click on any link within any unless confident the is legitimate Spam must be deleted and must not be forwarded Users must not reply to spam nor must they attempt to remove the Council address from the mailing list as this confirms the existence of an address following a speculative Users must consider the consequences of providing an official Council address to a third party e.g. commercial website, as this can lead to spam Council addresses must only be provided for legitimate Council business purposes Technical measures will be implemented and maintained by the Council to prevent inbound s which contain executable files e.g. attachment. Document Reference: V1.3 Policy Page 6
7 10. Virus transmission is the most common way that viruses are transmitted between computers. The most common mechanism for this is in the form of an attachment to the message A User must not open an attachment or click on any link within any unless confident the is legitimate A User must be vigilant to malicious software when receiving attachments which contain compressed file formats, such as.zip and.rar. If in doubt a User must not open the attachment and must seek advice from the IT Service Desk A User must not forward any they suspect of containing a virus A User must contact the IT Service Desk if they believe they have received a virus via or a virus is present on their device If a virus is confirmed as being present on your device you must follow the instructions provided by the IT Service Desk. 11. Unacceptable Use Users must not unsolicited commercial or advertising material, chain letters, or other junk-mail of any kind, internally or to other organisations Users must not undertake activities that unreasonably waste staff effort or use networked resources, or activities that unreasonably serve to deny the service to other users Users must not create or transmit any offensive, obscene or indecent images, data, or other material, or any data capable of being resolved into obscene or indecent images or material Users must not create or transmit material which is designed or likely to cause annoyance, inconvenience or needless anxiety Users must not create or transmit material that is abusive or threatening to others, or serves to harass or bully others Users must not create or transmit material that either discriminates or encourages discrimination on racial or ethnic grounds, or on grounds of gender, sexual orientation, marital status, disability, political or religious beliefs Users must not create or transmit defamatory material Users must not create or transmit material which brings the Council into disrepute. Document Reference: V1.3 Policy Page 7
8 11.9. Users must not broadcast global s. This must be coordinated by the Council's communications team. 12. Personal Use You must not use corporate to send personal outside of the Council. Internal personal use of corporate must be reasonable, proportionate, and occasional, and must not interfere with the performance of your role or the performance of the system Personal use must not impact or interfere with your own performance at work or that of others Personal use must not include the use of personal accounts for Council business Personal use of must not conflict with "Unacceptable Use" as described in paragraph The Council may monitor usage to ensure compliance with this policy. 13. Generic Accounts A generic account for shared access must be provided only when a business case exists A generic account must have a designated owner who will be responsible for the account and for granting/revoking access rights to the account A generic account must only be used to send when there is a business need to do so as individual accounts must be used as the preferred method of communication. 14. Delegate Access Delegate access can allow another person to read, create or have full control over items in a User's inbox and is most commonly used between a manager and the relevant support staff. In this instance access must be provided following the identification of a clear business need Delegate access to accounts in other instances e.g. long term absence, must only be provided following a clear business need and only when authority is provided by the account owner or in their absence an appropriate senior manager Requests for delegate access must be documented by the authoriser Delegate access must not be provided by supplying details of a User account i.e. Username and password. Document Reference: V1.3 Policy Page 8
9 14.5. Delegate access must not allow the delegated person to write s from the delegated account. Responses to s must be sent from the delegates own account It must be the responsibility of the authoriser (owner of the account or senior manager) to request the removal of delegate access when a business need no longer exists Delegate access must be implemented as a temporary solution only based on business need unless it meets Accessing accounts of ex-employees There are occasions when access to business s of ex-employees is required and in each instance a robust business case must be provided Authority to access an ex-employees account must be provided by an appropriate manager and recorded by the IT Service Desk Unless the business case requires otherwise access must be time limited to 30 days The person accessing s must take reasonable precautions to avoid opening private s. If it becomes readily apparent that an is of a personal nature the reader must not open it or stop immediately if the has been opened Access must be provided by transferring s into a container of the relevant persons client Forwarding or redirecting s from an ex-employees account must be avoided management The use of a signature facility must be included as a sign off on s to ensure the recipient understands who they are communicating with and to provide additional contact details A message will automatically generate on s sent externally to the Council which includes a disclaimer. It must provide guidance to recipients should an be received in error The Out of Office assistant must be activated if you are unable to answer s. Alternative contact details must be provided for a line manager or colleague accounts must be managed by account holders to ensure the size of the mail box remains manageable. Document Reference: V1.3 Policy Page 9
10 16.5. All s which are corporate records must be moved to the appropriate corporate resource and must not be stored in personal accounts. 17. Further Information For further information or guidance please contact the Information Governance Team by at Document Reference: V1.3 Policy Page 10
Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:
Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury
More informationIslington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014
A council-wide information technology policy Version 0.9 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution
More informationABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)
ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved
More informationEmail Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
More informationInternet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
More informationSTRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
More informationWORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
More informationEmail Services Policy
Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages
More informationEmail Policy For Staff and Students
Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management
More informationUSE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
More informationUNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More informationLINCOLN COLLEGE INTERNET, E-MAIL, AND COMPUTER ACCEPTABLE USE POLICY
LINCOLN COLLEGE INTERNET, E-MAIL, AND COMPUTER ACCEPTABLE USE POLICY POLICY IT/PO/1 SPONSOR IT Manager Last formal review date: March 2012 Next formal review date: March 2013 Impact Assessed 17 April 2012
More informationCOMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
More informationE-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:
E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:
More informationEmail Usage Policy Document Profile Box
Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee
More informationEmail & Internet Policy
Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible
More informationGCSx Email Guide for Internal Users. How to send sensitive business and personal information securely
GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status
More informationConditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
More informationINTERNET AND EMAIL POLICY
Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy
More informationDEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE
2 of 10 2.5 Failure to comply with this policy, in whole or in part, if grounds for disciplinary actions, up to and including discharge. ADMINISTRATIVE CONTROL 3.1 The CIO Bureau s Information Technology
More informationRules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
More informationInformation Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
More informationHull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08
Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable
More informationE-Mail and Internet Policy
E-Mail and Internet Policy Document reference Title: E-Mail and Internet Policy Product ID: Version Number: 8.0 Status: Live Distribution / Issue date: 12 November 2014 Author: K. Fairbrother Review Period:
More informationSchool policies and Security Risks
1) Introduction a) The school expects its computer and telephone systems to be used in a professional manner at all times. The school provides these facilities at its expense for its own business purposes.
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationSample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
More informationPolicy No: 2-B8. Originally Released: 2001. Date for Review: 2016
Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for
More informationAcceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
More informationComputer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
More informationDigital Device LOAN CHARTER
Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to
More informationAcceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
More informationEmail policy and practice
Email policy and practice This policy applies to all staff (including agency workers, casual and temporary staff), visitors, contractors, students, alumni and researchers of Anglia Ruskin University, and
More informationB. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
More informationUNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
More informationTITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06. REFERENCE: Board Rule 2.16 PAGE 1 OF 6
LAKE-SUMTER COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06 REFERENCE: Board Rule 2.16 PAGE 1 OF 6 1. General Information a. LSCC Information Systems (IS)
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More informationCity of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
More informationPolicy Document Control Page
Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version
More informationElectronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
More informationCode - A Date Approved: July 24/01
Page 1 of 10 Date Last Revision: Feb 12/08 POLICY STATEMENT AND PURPOSE The County of Elgin provides employees, elected officials, and other organizations and individuals with access to computer and network
More informationEmail Acceptable Use Policy
Email Acceptable Use Policy Document Owner : SCC Chief Information Officer Version : 3.2 Date : May 2011 We will on request produce this policy/procedure, or particular parts of it, in other languages
More informationE-Mail Management Policy
Information Management Standards & Procedures E-Mail Management Policy Appendices: A. Decision Matrix For Email Records Management 1 st December 2009 Document Version: 1.0 Page 1 of 14 Contents 1.0 Document
More informationJANET ACCEPTABLE USE POLICY
Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assesment Ref: Assessed: 12/03/10 30/01/11 25/02/15 JANET ACCEPTABLE USE POLICY 1 BACKGROUND AND DEFINITIONS 1 JANET is the
More informationITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
More informationINTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
More informationCCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils
CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils Contents 1. Scope 2 2. Use of IT Facilities 2 3. Monitoring of IT Facilities 5 4. Maintenance & Repairs 6 5. Copyright and Licence Agreements
More informationTOWN OF COTTESLOE POLICY EMAIL MANAGEMENT
EMAIL MANAGEMENT POLICY STATEMENT Town of Cottesloe email accounts are intended for business transactions in support of the Town s strategic goals and objectives. Accordingly any email transmission residing
More informationCommonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
More informationEmbedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
More informationAPPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES
APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,
More informationDundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
More information13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
More informationPOLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES)
Policy Document POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES) For the definitions of terms used in this policy document refer to the Delegations of
More informationAGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Executive Director (AK) [J50]
AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1
More informationThe City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
More informationSocial Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy
Social Media Responsible officer: Director Community and Corporate Services Key Result Area: Governance and Decision Making Document type: Policy Reference: 10/01/0004 Approved by: Council Date approved:
More informationTITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY
TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY Council Resolution No 313/03 adopted at the Ordinary Meeting of Council on 19 August 2003. PURPOSE
More information2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:
POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,
More informationCellular/Smart Phone Use Procedure
Number 1. Purpose This procedure is performed as a means of ensuring the safe and efficient use of cell/smart phones throughout West Coast District Health Board (WCDHB) facilities. 2. Application This
More informationDelaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
More informationAcceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
More informationStudent Laptop User Charter
Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both
More informationAcceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
More informationThe Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
More informationInternet and Social Media Policy
Internet and Social Media Policy Page 1 of 19 Review and Amendment Log / Control Sheet Responsible Officer: Chief Officer Clinical Lead: Author: Date Approved: Committee: Version: Review Date: Medical
More informationPOLICY ON USE OF INTERNET AND EMAIL
POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic
More informationAcceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
More informationIM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&TPP No. 2 Email Policy Version 3.04
More informationTerms of Service. This online privacy policy applies only to information collected through our website and not to information collected offline.
Terms of Service Privacy Policy Mahavitaran (mahadiscom) respects and protects the privacy of the individuals that access the information and use the services brought through them. Individually identifiable
More informationICT Acceptable Use Policy. August 2015
ICT Acceptable Use Policy August 2015 Document title ICT Acceptable Use Policy August 2015 Document author and department Responsible person and department Robbie Walker, Information Security Architect,
More informationStrathfield Girls High School Bring your Own Device User Charter
Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.
More informationPolicy Document Control Page. Updated to include new NHS mail encryption feature
Policy Document Control Page Title Title: Electronic Mail Policy Version: 6 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version
More informationInstruction. Neoga Community Unit School District #3 Page 1 of 5
Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each
More informationSenior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES
Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the
More informationInternet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
More informationLa Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy
LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More informationMedina County Policy Manual
Medina County Policy Manual Policy: Computer & Network Usage Section: Work Rules Number: 7.015 Issued: 09/17/07 Reviewed/Revised: Page #: 1 of 5 A. It is the intent of Medina County to provide local, network,
More informationInformation Systems Acceptable Use Policy for Learners
Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs
More informationE-mail & Internet Policy
E-mail & Internet Policy Recommending Committee: Approving Committee: Clinical Standards & Focus Council Trust Governance Board Signature: Designation: Chief Executive Date: Version Number: 02 Date: August
More informationEMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards
EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data
More informationMobile Phone Device Policy
Version 2.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
More informationEvidence additional element appendix 47. Records Management Guidance for the management of emails
Records Management Guidance for the management of emails 2010 1 Document Control Sheet Name of Document: Guidelines for the Management of Emails as Records 2010 Author: Consultees Description of Content:
More informationAcceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
More informationInformation Management and Security Policy
Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail
More informationInformation Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More informationTerms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
More informationTERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )
TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide
More informationMARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
More informationRecommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
More informationSydney Technical High School
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
More informationBring Your Own Device Program: User Charter
Bring Your Own Device Program: User Charter Turramurra High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. The wireless network and
More informationPakistan Education & Research Network (PERN)
Pakistan Education & Research Network (PERN) Access Usage Policy (AUP) Version 1.1 Released 1st April 2007 1. Definitions 1.1 PERN is the acronym of the Pakistan Education & Research Network. The revolutionary
More informationSTUDENT WEBMAIL. User Guide. Realise Your Potential
STUDENT WEBMAIL User Guide Realise Your Potential Email acceptable usage policy & safety tips Email is a wonderful tool for sending and receiving information quickly and securely to tutors, teachers or
More informationUniversity of Maryland Baltimore Information Technology Acceptable Use Policy
The UMB School of Nursing follows and adheres to the UMB Campus Information Technology Acceptable Use Policy. The UMSON further defines Authorized User to also include any person who receives a password
More informationAcceptable Usage Policy
Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY
More informationGENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES Version 3.0 17/05/2012 CONTENTS 1. Introduction and Scope... 3 2. Data Protection Act 1998... 4 3. Licence Registration and Prevention of Piracy...
More information