Internet Content Filter Standard Version 2.0
|
|
|
- Anne Grant
- 10 years ago
- Views:
Transcription
1 Version 2.0 Please check the HSE intranet for the most up to date version of this standard
2 1.0 Purpose The purpose of this is to define the acceptable use of the HSE s internet services and describe which categories of internet content are accessible to HSE employees and which are filtered (blocked). The standard was formulated and developed by the HSE Information Security Project Board (ISPB) and sanctioned by the Senior Management of the HSE. This standard is mandatory and by accessing internet content from any Information Technology (IT) resources which are owned or leased by the HSE, users are agreeing to abide by the terms of this standard. 2.0 Scope This standard represents the HSE s national position and takes precedence over all other relevant standards which are developed at a local level. The standard applies to: All internet services provided by the HSE; All Information Technology (I.T.) resources provided by the HSE; All HSE employees, clients and third parties that use HSE s I.T. resources. 3.0 Standard For the purpose of managing internet access, internet sites are grouped together into a number of categories and subcategories depending on the content that each site offers. Appendix A contains the list of categories and subcategories used and a description of each. 3.1 Filtered Internet Content The HSE reserves the right to filter and block selected categories of internet content that it considers inappropriate or where access to such categories could lead to legal, security or operational issues. The following categories / sub-categories of internet content are currently filtered and blocked by the HSE: Adult Material Sex Nudity Adult Content Bandwidth PG Internet radio & TV Streaming Media Version June 2011
3 Peer-To-Peer File Sharing Personal Network Storage & Backup MP3 & Audio Download Services Gambling Games Illegal or Questionable Hacking Proxy Avoidance URL Translation Web Hosting Web and Spam Internet Communications General Organisational Web Chat Military & Extremist Miscellaneous Productivity PG Racism & Hate Security PG Social Networking Blogs and Personal Sites Personals & Dating Tasteless Violence Weapons User Defined 3.2 Internet User Access Groups Each HSE employee who has been granted internet access will be assigned to one or more HSE internet user access groups, depending on their role or function within the HSE. The current HSE internet user access groups are: 1) Basic. 2) Custom. 3) Technical Basic User Access Group Each HSE employee who has been granted internet access will by default be assigned to the basic user access group. This group will be allowed to access all unfiltered internet content. The table in Appendix B outlines the categories of internet content that are accessible by the basic user access group. Version June 2011
4 3.2.2 Custom User Access Group A number of special interest custom user access groups will be created to manage the business requirement for access to internet content that is otherwise filtered by the HSE. Each custom user access group will allow access to an additional specific category or subcategory of internet content that is currently filtered. The table in Appendix B outlines the categories of internet content that are accessible by the custom user access groups Technical User Access Group A number of additional special interest technical user access groups will be created to manage the business requirement for access to technical information and software that is otherwise filtered by the HSE for legal or security reasons. Each Technical user access group will allow access to an additional specific category or subcategory of internet content that is currently not available to members of the basic and custom user access groups. The table in Appendix B outlines the categories of internet content that is accessible by the privilege user access groups. Access to the HSE technical user access groups will be restricted to the relevant HSE ICT personnel only. 3.3 Access to Filtered Internet Content Where an individual employee has a valid HSE worked related reason, they may with the signed approval of their line manager (at General Manager level (or equivalent) or above) request membership of one or more of the special interest custom user access groups. All requests must be made in writing using the HSE Internet Content Filter Exemption Request Form ( nd_procedures/forms/). Completed request forms must be faxed or posted to the employee s local ICT helpdesk / call centre. For security reasons open access to third party servers (i.e. General & Organisational ) is prohibited and as such these internet sites are permanently blocked for all HSE users. However employees with a valid HSE business requirement and the signed approval of their line manager (at General Manager level (or equivalent) or above) may apply for access to specific external Health and/or Governmental server(s). All requests must be made in writing using the HSE Internet Content Filter Exemption Request Form ( nd_procedures/forms/). Completed request forms must be faxed or posted to the employee s local ICT helpdesk / call centre. HSE line managers (at General Manager level (or equivalent) or above) approving internet access requests of behalf of HSE employees, have a responsibility to ensure they only approve and sign access requests for Version June 2011
5 employees, once they are satisfied that all categories and subcategories of internet content requested by the employee are appropriate, necessary and relevant to the employees current role within the HSE. Each special interest user access group will operate independent of the others, and hence, a user s membership of one of the special interest user access groups will not automatically confer membership of the other special interest user access groups. (For example a user, who is a member of the gambling custom user access group, will not be automatically granted membership of the adult material, military or extremist custom user access groups). 3.4 Internet Content Evaluation Group The HSE Internet Content Evaluation Group (ICEG) will be created to 1) Evaluate all other internet access requests which are not covered by the HSE Internet Filter Standard or existing HSE policies 2) Carry out sample audit of approved internet access requests on a quarterly basis to ensure that internet access is granted in accordance with this standard. 3) Report the results of the sample audits to the ISPB. 3.5 Monitoring The HSE reserves the right to monitor, record and report on any or all uses of its internet services, in order to: 1) Help trace and resolve technical faults. 2) Protect and maintain network and system security. 3) Maintain system performance and availability. 4) Investigate actual and suspected security incidents. 5) Prevent, detect or minimize inappropriate use. 6) Ensure compliance with HSE policies, current legislation and applicable regulations. The ICT Directorate will produce monthly reports on internet usage for each HSE region and distribute these to the relevant RDO s and the HSE management team. While the HSE will not routinely monitor an individual user s use of its internet services, it reserves the right to do so when a breach of its policies or illegal activity is suspected. This monitoring may include, but is not limited to, internet sites visited, total time spent on the internet, and attempts to access filtered (blocked) internet content. The monitoring of an individual user s internet activity must be authorised by the HR Directorate and the individuals line manager (General Manager level or above). The results of all monitoring will be stored securely and will only be shared with those authorised to have access to such information. Version June 2011
6 3.6 Withdrawal of Internet Services HSE employees who are found to have abused their internet access rights may have their internet access withdrawn by the HSE and, depending on the nature of the abuse, could be subject to disciplinary action, including suspension and dismissal as provided for in the HSE disciplinary procedures. The ICT Directorate reserves the right (without prior notification) to restrict or block access to certain categories or subcategories of internet content, which are identified as having a negative impact on the performance of HSE network, information systems and/or equipment. Version June 2011
7 Appendix A HSE Internet Categories & Subcategories Abortion: Sites with neutral or balanced presentation of abortion. Pro-Choice: Sites that provide information about or are sponsored by organizations that support legal abortion or that offer support or encouragement to those seeking the procedure. Pro-Life: Sites that provide information about or are sponsored by organizations that oppose legal abortion or that seek increased restriction of abortion. Adult Material: Sites which provide adult material. Adult Content - Sites that display full or partial nudity in a sexual context, but not sexual activity; erotica; sexual paraphernalia; sex-oriented businesses as clubs, nightclubs, escort services; and sites supporting the online purchase of such goods and services. Lingerie and Swimsuit - Sites that offer images of models in suggestive but not lewd costume, with semi nudity permitted. Includes classic 'cheese-cake,' calendar, and pinup art and photography (Includes site s offering lingerie or swimwear for sale). Nudity - Sites that offer depictions of nude or semi-nude human forms, singly or in groups, not overtly sexual in intent or effect. Sex - Sites that depict or graphically describe sexual acts or activity, including exhibitionism; also, sites offering direct links to such sites. Sex Education - Sites that offer information about sex and sexuality, with no pornographic intent. Advocacy Groups: Sites that promote change or reform in public policy, public opinion, social practice, economic activities, and relationships. Business and Economy: Sites sponsored by or devoted to business firms, business associations, industry groups, or business in general. Financial Data and Services: Sites that offer news and quotations on stocks, bonds, and other investment vehicles, investment advice, but not online trading (Includes banks, credit unions, credit cards, and insurance). Hosted Business Applications: Sites that provide access to business-oriented web applications and allow storage of sensitive data, excluding those for web collaboration. Version June 2011
8 Bandwidth PG: Sites providing bandwidth intensive services Internet Radio and TV - Sites whose primary purpose is to provide radio or TV programming on the Internet. Internet Telephony - Sites that enable users to make telephone calls via the Internet or to obtain information or software for that purpose. Peer-to-Peer File Sharing - Sites that provide client software to enable peerto-peer file sharing and transfer. (Accessible to the relevant ICT Personnel Only) Personal Network Storage and Backup - Sites that store personal files on Internet servers for backup or exchange. (Accessible to the relevant ICT Personnel Only) Streaming Media - Sites that primarily provide streaming media content, such as movie trailers (Including Youtube.com) Drugs: Sites the provide information about regulated and unregulated drugs Abused Drugs - Sites that promote or provide information about the use of prohibited drugs, except marijuana, or the abuse or unsanctioned use of controlled or regulated drugs; also, paraphernalia associated with such use or abuse. Marijuana - Sites that provide information about or promote the cultivation, preparation, or use of marijuana. Prescribed Medications - Sites that provide information about approved drugs and their medical use. Supplements and Unregulated Compounds - Sites that provide information about or promote the sale or use of chemicals not regulated by the FDA (such as naturally occurring compounds). Education: Sites that provide educational information Cultural Institutions - Sites sponsored by museums, galleries, theatres (but not movie theatres), libraries, and similar institutions; also, sites whose purpose is the display of artworks. Educational Institutions - Sites sponsored by schools and other educational facilities, by non-academic research institutions, or that relate to educational events and activities. Educational Materials - Sites that provide information about or that sell or provide curriculum materials or direct instruction; also, learned journals and similar publications. Version June 2011
9 Reference Materials - Sites that offer reference-shelf content such as atlases, dictionaries, encyclopaedias, formularies, white and yellow pages, and public statistical data. Entertainment: Sites that provide information about or promote motion pictures, non-news radio and television, books, humor, and magazines. MP3 and Audio Download Services - Sites that support downloading of MP3 or other sound files or that serve as directories of such sites. Gambling: Sites that provide information about or promote gambling or support online gambling, involving a risk of losing money. Games: Sites that provide information about or promote electronic games, video games, computer games, role-playing games, or online games (Includes sweepstakes and giveaways). Government: Sites sponsored by branches, bureaus, or agencies of any level of government, except for the armed forces. Military - Sites sponsored by branches or agencies of the armed services. Political Organizations - Sites sponsored by or providing information about political parties and interest groups focused on elections or legislation. Health: Sites that provide information or advice on personal health or medical services, procedures, or devices, but not drugs (Includes self-help groups). Illegal or Questionable: Sites that provide instruction in or promote non-violent crime or unethical or dishonest behavior or the avoidance of prosecution. Information Technology: Sites sponsored by or providing information about computers, software, the Internet, and related business firms, including sites supporting the sale of hardware, software, peripherals, and services. (Accessible to the relevant ICT Personnel Only) Computer Security - Sites that provide information about or free downloadable tools for computer security. Hacking - Sites that provide information about or promote illegal or questionable access to or use of computer or communication equipment, software, or databases. (Accessible to the relevant ICT Personnel Only) Proxy Avoidance - Sites that provide information about how to bypass proxy serve features or to gain access to URLs in any way that bypasses the proxy server. (Accessible to the relevant ICT Personnel Only) Version June 2011
10 Search Engines and Portals - Sites that support searching the Web, news groups, or indices or directories thereof. URL Translation Sites - Sites that offer online translation of URLs. These sites access the URL to be translated in a way that bypasses the proxy server, potentially allowing unauthorized access. (Accessible to the relevant ICT Personnel Only) Web & Spam - Sites whose links are sent in unsolicited commercial , either as part of campaigns to promote products or services, or to entice readers to click through to surveys or similar sites. Also included are sites that display comment spam. (Accessible to the relevant ICT Personnel Only) Web Collaboration - Sites that provide virtual workspace for purposes of collaboration and conferencing, which may include sites that enable authorized access to a computer or network from a remote location Web Hosting - Sites of organizations that provide hosting services, or toplevel domain pages of Web communities. (Accessible to the relevant ICT Personnel Only) Internet Communication: Sites that support or provide information about internet communication. (Permanently blocked for all HSE user groups) Web Chat - Sites that host web chat services or that support or provide information about chat via HTTP or IRC. General - Sites that provide services open to general use. (Permanently blocked for all HSE user groups) Organizational - Login sites for corporate or institutional systems. (Permanently blocked for all HSE user groups) Text and Media Messaging - Sites that enable the sending of messages and other content via SMS, EMS, MMS, or similar protocols. Job Search: Sites that offer information about or support the seeking of employment or employees. Militancy and Extremist: Sites that offer information about or promote or are sponsored by groups advocating antigovernment beliefs or action. Miscellaneous: Content Delivery Networks - Commercial hosts that deliver content to subscribing Web sites. Dynamic Content - URLs that are generated dynamically by a Web server. Version June 2011
11 File Download Servers - Web servers whose primary function is to deliver files for download. (Accessible to the relevant ICT Personnel Only) Image Servers - Web servers whose primary function is to deliver images. Images (Media) - URLs ending with image filenames. Network Errors - URLs with hosts that do not resolve to IP addresses. (Accessible to the relevant ICT Personnel Only) Private IP Addresses - IP addresses defined in RFC 1918, 'Address Allocation for Private Intranets. (Accessible to the relevant ICT Personnel Only) Uncategorized- Sites not categorized in the Websense Master Database. News and Media: Sites that offer current news and opinion, including those sponsored by newspapers, general-circulation magazines, or other media. Alternative Journals - Online equivalents to supermarket tabloids and other fringe publications. Productivity PG: Sites that offer access to advertising and internet forums Advertisements - Sites that provide advertising graphics or other ad content files. Freeware and Software Download - Sites whose primary function is to provide freeware and software downloads. (Accessible to the relevant ICT Personnel Only) Instant Messaging - Sites that enable instant messaging. Message Boards and Forums - Sites that host message boards, bulletin boards, and other unaffiliated discussion forums. Online Brokerage and Trading - Sites that support active trading of securities and management of investments. Pay-to-Surf - Sites that reward users for Internet activity such as viewing Web Sites, advertisements, or . (Accessible to the relevant ICT Personnel Only) Racism and Hate: Sites that promote the identification of racial groups, the denigration or subjection of groups, or the superiority of any group. Version June 2011
12 Religion: Sites that promote or offer views on religion Non-Traditional Religions and Occult and Folklore - Sites that provide information about or promote religions not specified in Traditional Religions or other unconventional, cultic, or folkloric beliefs and practices. Traditional Religions - Sites that provide information about or promote Bahai, Buddhism, Christian Science, Christianity, Hinduism, Islam, Judaism, Mormonism, Shinto, and Sikhism, as well as atheism. Security PG: Sites that contain potentially harmful content Botnets - sites that host the command-and-control centers for networks of bots that have been infiltrated into users' computers. Excludes Web crawlers. (Accessible to the relevant ICT Personnel Only) Keyloggers - Sites or pages that download programs that run in the background recording all keystrokes, and which may also send those keystrokes (potentially including passwords or confidential information) to an external party. (Accessible to the relevant ICT Personnel Only) Malicious Embedded Link - Sites that are infected with a malicious link. (Accessible to the relevant ICT Personnel Only) Malicious Embedded iframe - Sites that are infected with a malicious iframe. (Accessible to the relevant ICT Personnel Only) Malicious Web sites - Sites that contain code that may intentionally modify end-user systems without their consent and cause harm. (Accessible to the relevant ICT Personnel Only) Phishing and Other Frauds - Sites that counterfeit legitimate business sites for the purpose of eliciting financial or other private information from users. (Accessible to the relevant ICT Personnel Only) Potentially Unwanted Software - Sites that use technologies that alter the operation of the user's hardware, software, or network in ways that diminish control over the user experience, privacy, or the collection and distribution of personal information. (Accessible to the relevant ICT Personnel Only) Spyware - Sites or pages that download software that, without the user's knowledge, generate HTTP traffic (other than simple user identification and validation). (Accessible to the relevant ICT Personnel Only) Suspicious Embedded Link - Sites suspected of being infected with a malicious link. (Accessible to the relevant ICT Personnel Only) Shopping: Sites that support the online purchase of consumer goods and services except: sexual materials, lingerie, swimwear, investments, medications, educational Version June 2011
13 materials, computer software or hardware, alcohol, tobacco, travel, vehicles and parts, weapons. Internet Auctions - Sites that support the offering and purchasing of goods between individuals. Real Estate - Sites that provide information about renting, buying, selling, or financing residential real estate. Society and Lifestyles: Sites that provide information about matters of daily life, excluding entertainment, health, hobbies, jobs, sex, and sports. Alcohol and Tobacco - Sites that provide information about, promote, or support the sale of alcoholic beverages or tobacco products or associated paraphernalia. Blogs and Personal Sites - Sites that host blogs and personal sites. Gay or Lesbian or Bisexual Interest - Sites that provide information about or cater to gay, lesbian, or bisexual lifestyles, but excluding those that are sexually or issue-oriented. Hobbies - Sites that provide information about or promote private and largely sedentary pastimes, but not electronic, video, or online games. Personals and Dating - Sites that assist users in establishing interpersonal relationships, excluding those intended to arrange for sexual encounters. Restaurants and Dining - Sites that list, review, advertise, or promote food, dining, or catering services. Social Networking - Sites of web communities that provide users with means for expression and interaction (For example Facebook.com etc). Special Events: Sites devoted to a current event that requires separate categorization. Sports: Sites that provide information about or promote sports, active games, and recreation. Sport Hunting and Gun Clubs - Sites that provide information about or directories of gun clubs and similar groups, including war-game and paintball facilities. Tasteless: Sites with content that is gratuitously offensive or shocking, but not violent or frightening. Includes sites devoted in part or whole to scatology and similar topics or to improper language, humor, or behavior. Travel: Sites that provide information about or promote travel-related services and destinations. Version June 2011
14 Vehicles: Sites that provide information about or promote vehicles, including those that support online purchase of vehicles or parts. Violence: Sites that feature or promote violence or bodily harm, including selfinflicted harm; or that gratuitously display images of death, gore, or injury; or that feature images or descriptions that are grotesque or frightening and of no redeeming value. Weapons: Sites that provide information about, promote, or support the sale of weapons and related items. User-Defined: User-defined category. Version June 2011
15 Appendix B Category Sub category Basic Custom Technical Abortion Pro-Life Pro-Choice Adult Material X X Sex X X Nudity X X Adult Content X X Lingerie and Swimsuit Sex Education Advocacy Groups Business and Economy Financial Data and Services Hosted Business Applications Bandwidth PG X X Internet Radio and TV X X Streaming Media X X Peer-to-Peer File Sharing X X Personal Network Storage and Backup X X Internet Telephony Drugs Marijuana Abused Drugs Supplements and Unregulated Compounds Prescribed Medications Education Reference Materials Cultural Institutions Educational Institutions Educational Materials Entertainment MP3 and Audio Download Services X X Version June 2011
16 Category Sub category Basic Custom Technical Gambling X X Games X X Government Military Political Organizations Health illegal or Questionable X X Information Technology Internet Communication Search Engines and Portals Computer Security Web Collaboration Hacking X X Proxy Avoidance X X URL Translation Sites X X Web Hosting X X Web and Spam X X **(Permanently blocked for all groups) X X X General **(Permanently blocked for all groups) Organisational X X X X X X **(Permanently blocked for all groups) Web Chat X X Text / Media Messaging Job Search Militancy & Extremist X X Version June 2011
17 Category Sub category Basic Custom Technical Miscellaneous X X Images (Media) X X Dynamic Content X X Image Servers X X Private IP Addresses X X File Download Servers X X Network Errors X X Content Delivery Networks Uncategorized News and Media Alternative Journals Productivity PG X X Message Boards and Clubs X X Advertisements X X Online Brokerage and Trading X X Instant Messaging X X Freeware and Software Download X X Pay-to-Surf X X Racism & Hate X X Religion Traditional Religions Non-Traditional Religions and Occult and Folklore Security PG X X Spyware X X Malicious Web Sites X X Keyloggers X X Phishing and Other Frauds X X Potentially Unwanted Software X X Bot Networks X X Suspicious Embedded Link X X Malicious Embedded iframe X X Malicious Embedded Link X X Shopping Internet Auctions Real Estate Version June 2011
18 Category Sub category Basic Custom Technical Social Organizations Service and Philanthropic Organizations Social and Affiliation Organizations Professional and Worker Organizations Society & Lifestyles Alcohol and Tobacco Hobbies Restaurants and Dining Gay or Lesbian or Bisexual Interest Social Networking X X Blogs and Personal Sites X X Personals and Dating X X Special Events Sports Sport Hunting and Gun Clubs Tasteless X X Travel Vehicles Violence X X Weapons X X User Defined X X ** For security reasons open access to third party servers (General & Organisational ) is not allowable. However individuals with a valid HSE business requirement may apply for access to specific external Health and/or Irish Governmental server(s) Version June 2011
Internet Content Filter Exemption Request Form
Internet Content Filter Exemption Request Form Version 2.0 This form maybe updated at anytime (without notice) to ensure changes to the HSE Internet Content Filter Standard and/or business practices are
Domains belonging to a domain name registration service or a holder of domain names of unused websites.
Olfeo s list of categories International database Secure / Optimize / Analyze Internet usage Legal Risk Theme Category Description Security Risk Child/Teenage Pornography Counterfeiting and Copyright Infringement
Why Websense Enterprise Beats SurfControl Web Filter VS
Why Websense Enterprise Beats SurfControl Web Filter VS Websense A Proven Enterprise Solution Founded in 1994, Websense is the world s leading Web filtering provider and is the preferred vendor of the
Bucksgfl Internet Web Filtering Policy
Bucksgfl Internet Web Filtering Introduction The requirement to ensure that children and young people are able to use the internet and related communications technologies appropriately and safely is addressed
Olfeo's list of categories
Olfeo's list of categories Contents Legal Risk... 3 Security Risk... 5 Adult Content... 6 Risk of Unauthorized Disclosure... 7 Bandwidth... 8 Leisure and Social Activities...9 Education... 11 Consumer
Websense Web Filter to Blue Coat WebFilter Migration Guide
Websense Web Filter to Blue Coat WebFilter Migration Guide October 2011 Websense Web Filter to Blue Coat WebFilter Migration Guide Table of Contents URL Category Map: Websense Web Filter to Blue Coat WebFilter...3
CyberPatrol SiteSURV Web Filtering User Manual
CyberPatrol SiteSURV Web Filtering User Manual Page 1 Table of Contents Table of Contents Overview... 3 Product Diagram... 3 How it Works... 3 Managing Internet Access... 4 Activating Your Account... 5
DriveLock Websecurity
Whitepaper DriveLock Websecurity Cloud-based internet security CenterTools Software GmbH 2015 Contents 1 DRIVELOCK WEBSECURITY... 2 1.1 WEBSECURITY CLOUDBASIERTE INTERNETSICHERHEIT... 2 1.2 KONFIGURATION
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
Configuring Web (HTTP) and File Transfer (FTP) Traffic
CHAPTER 4 Configuring Web (HTTP) and File Transfer (FTP) Traffic This chapter describes how to make HTTP and FTP traffic configuration updates, and includes the following sections: Default Web and FTP
Configuring Web (HTTP) and File Transfer (FTP) Traffic
CHAPTER 4 Configuring Web (HTTP) and File Transfer (FTP) Traffic This chapter describes how to make HTTP and FTP traffic configuration updates, and includes the following sections: Default Web and FTP
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
F-Secure Mobile Security. Android
F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from
Access Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)
INTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
U.S. Chemical Safety and Hazard Investigation Board
BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
Web DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. TRITON - Web Security is automatically configured to
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
RIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
Web DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. The Web Security manager is automatically configured
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
BBB, EDC, EDC-RA, EGI-RA, EHC-RA, IGS, JFA, JFA-RA, JHF-RA, JOA-RA, KBA-RB, KBB Superintendent of Schools
REGULATION Related Entries: Responsible Office: MONTGOMERY COUNTY PUBLIC SCHOOLS IGT-RA BBB, EDC, EDC-RA, EGI-RA, EHC-RA, IGS, JFA, JFA-RA, JHF-RA, JOA-RA, KBA-RB, KBB Superintendent of Schools User Responsibilities
McAfee Web Gateway Categories and Filtering Policy Settings for Student and Staff Filters Great Neck Public Schools Revised 12/3/13
McAfee Web Gateway Categories and Filtering Policy Settings for Student and Staff Filters Great Neck Public Schools Revised 12/3/13 Key: Plain Text = Allowed Categories; Italics = Blocked Categories; Bold
State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.
Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
THE SCHOOL DISTRICT OF PHILADELPHIA
No. 815 SECTION: OPERATIONS THE SCHOOL DISTRICT OF PHILADELPHIA TITLE: ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES ADOPTED: March 15, 2012 REVISED: August 21, 2014 815. ACCEPTABLE USE OF
Terms and conditions of use
Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
Red Cloud Community Schools Acceptable Use and Internet Safety Policy
Red Cloud Community Schools Acceptable Use and Internet Safety Policy The Red Cloud Community School system maintains quality technology systems (hardware, software, and services) for the purposes of enhancing
ACSI Advertising Guidelines Advertising Philosophy
ACSI Advertising Guidelines Advertising Philosophy Thank you for helping fund the work of the Association of Christian Schools International (ACSI) by advertising with us. Please be aware that ACSI will
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
West Sussex Schools and Academies Internet Filtering Policy
Schools and Academies Internet Filtering Policy Schools and Academies Internet Filtering Policy Contents Page 1.1 General Overview of Filtering 1 1.2 WebScreen Categories 2-8 1.3 School / Academy Policies
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
Chatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320
ACCEPTABLE USE OF VOICE, VIDEO AND DATA NETWORK Policy Code: 3225/7320 Chatham County Schools offers electronic network access for students, teachers, and staff within the school system. A component of
MYACCLAIM PRIVACY POLICY
MYACCLAIM PRIVACY POLICY 1. Introduction MyAcclaim is an online collaboration tool that allows users to annotate video. MyAcclaim s mission is to allow its users, with ease and simplicity, to unleash the
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and
Geyserville New Tech Academy Student Technology Acceptable Use Policy
Geyserville New Tech Academy Student Technology Acceptable Use Policy Overview. The (GUSD) makes a variety of communications and information technologies available to students through computer/network/internet
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures Purpose The purpose of the ACH Network Acceptable Use Procedures is to provide the procedures, rules, guidelines,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) The Middletown City School District provides an electronic communications network that allows District-authorized individuals internal access
CENTRAL CAMBRIA SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS CENTRAL CAMBRIA SCHOOL DISTRICT TITLE: NETWORK USAGE AND SAFETY ADOPTED: March 2, 2009 REVISED: 815. NETWORK USAGE AND SAFETY ENCOMPASSING LOCAL, INTRANET AND INTERNET NETWORKS
Commonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
BOARD OF EDUCATION Cherry Hill, New Jersey
BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to
STUDENTS 5118.5. Children s Internet Protection Act, Pub. Law 106-554, codified at 47 USC 254(h) Conn. Gen. Stat. 53a-182b; 53a-183; 53a-250
STUDENTS 5118.5 Student Use of Computer Systems and Internet Safety Computers, computer networks, Internet Access, and e-mail are effective and important technological resources in today s educational
Acceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
Leadbolt Classification Policy
The purpose of the Leadbolt Classification Policy is to clearly define the appropriate classification of your Ads and help you, our advertisers, define which content categories you wish to target and which
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate.
Quick Start Guide 2 The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Going online for youngsters is fun, creative and exciting but it
