Information Technology Acceptable Use Policies and Procedures
|
|
|
- Eileen Carter
- 9 years ago
- Views:
Transcription
1 Information Technology Acceptable Use Policies and Procedures The following Information Technology Acceptable Use Policies and Procedures are to be followed by ALL employees, contractors, vendors, and other authorized individuals ( Users ) who utilize any information technology (IT), electronic, or other communication device owned and provided by the City and County of Denver, or who are granted access to any Local Area Network and/or Wide Area Network ( LAN/WAN ) or other service maintained and provided by the City and County of Denver. It is expected that all City and County of Denver agencies and departments will enforce these policies at a minimum. However, the various City and County of Denver agencies and departments may enhance and strengthen these policies and procedures, based on internal business needs. These policies are to be used in conjunction with Career Service Authority Rule (Code of Conduct: Electronic Communications Policy) and Executive Order 16. ANY USER FOUND VIOLATING THESE POLICIES OR PROCEDURES WILL FACE SANCTION WHICH MAY INCLUDE DISCIPLINARY ACTION BASED ON PROVISIONS OF CAREER SERVICE RULES, DEVICE REVOCATION OR SERVICE ACCESS TERMINATION, AND/OR LEGAL ACTION. Ownership of Devices and Services All IT and communication devices and services, including (but not limited to) computers, peripherals, PDA devices, cell phones, pagers, software, files, messages, Internet activity logs, remote access, and any other data or records stored on devices or other media provided by the City and County of Denver regardless of their physical location or the form in which they are maintained, are considered property of the City and County of Denver and are owned exclusively by the City and County of Denver. USERS SHOULD HAVE NO EXPECTATION OF PRIVACY WHEN USING ANY IT OR COMMUNICATION DEVICE, SERVICE, SYSTEM, NETWORK, FILE, OR ANY OTHER DATA (INCLUDING MESSAGES) OWNED BY THE CITY AND COUNTY OF DENVER. The City and County of Denver reserves the right to access, review, delete and/or disclose any files, records, messages, or other data without notice to or authorization from a User, and to seize any IT or communication devices provided by the City and County of Denver. This right continues after the User ceases to have access to a device or service provided by the City and County of Denver. Access to Devices and Services Use of IT or communication devices and access to the LAN/WAN and other services are restricted to those employees who have been authorized by their agency or department supervisor or to those contractors who have been authorized by their contract manager. Users will only be granted access to the resources required to perform job / contractual duties. Page 1 of 8
2 Supervisors or contract managers shall formally request from the appropriate Technology Services personnel all needed IT devices and access rights for new Users. Each new User shall sign the most current version of the Information Technology Acceptable Use Acknowledgement prior to being given access to IT devices or services. Existing Users shall sign an updated Acknowledgement upon any material change being made to these Policies and Procedures. Signed Acknowledgements will be maintained by Technology Services, copies will be provided to the User, and to the employee s Human Resources Department or contractor s contract manager upon request. Users may also have to sign additional Acknowledgements / Agreements required by specific City and County of Denver Agencies and Departments. The User and the User s supervisor or contract manager share responsibility for immediately notifying the appropriate Technology Services personnel of any changes in the User s status, including: name change, transfer to another position, termination of employment or contract, or any changes in the User s responsibilities which would alter the access rights required. For transferring employees, the User s previous supervisor shall immediately notify the appropriate Technology Services personnel of all IT and communication devices, services, and access rights the User has, the name and title of the User s new supervisor, and the date of the transfer. The User s new supervisor must request from the appropriate Technology Services personnel all needed IT and communication devices, services, and access rights now required for the User. For employees who will no longer be working for the City and County of Denver, the User s supervisor shall immediately notify the appropriate Technology Services personnel of all IT and communication devices, services, and access rights the User has and the date the User s access is to be terminated. Upon the termination date, Technology Services will deactivate the User s account. It is the User s responsibility to return any PDA devices, cell phones, pagers, or other portable devices provided by the City and County of Denver to the User s supervisor or appropriate Technology Services personnel. After the User s account has been deactivated, Technology Services will download all messages and files contained on the User s assigned network drive and desktop computer hard drive onto a CD to be handed over to the User s supervisor or contract manager. The User s assigned network drive and desktop computer hard drive will then be overwritten or deleted permanently. It is the supervisor s responsibility to transfer any needed files to another network drive within 30 days, at which time the CD should be destroyed. The City and County of Denver will take reasonable steps necessary to accommodate all Users and ensure compliance with the Americans with Disabilities Act. These accommodations will be provided on a case-by-case basis. Use of Devices and Services Users shall not make unauthorized use of or knowingly permit unauthorized use of IT or communication devices, services, software, files, or any other data or records stored on equipment provided by the City and County of Denver including that on disposable or portable storage media. Except as indicated below, Users may only access, use, disclose, and/or delete files, records, or other data that is created, received, maintained, or transmitted on behalf of the City and County of Denver as required to perform authorized responsibilities. Users shall not use any IT or communication device, service, software, file, or other data or records owned by the City and County of Denver in order to gain personal or financial benefit for the User or anyone else. Page 2 of 8
3 IT and communication devices and services (including use of and the Internet) are provided to Users to aid in the performance of City business. Limited, occasional or incidental use for personal, non-business purposes is allowed so long as it is of a reasonable duration and frequency, does not interfere with the performance of job duties, does not violate any laws or regulations, and is not in support of a personal business. Personal, non-city business use of IT and communication devices, services, software, , and the Internet shall be limited to use before scheduled work hours, during breaks, lunch, and after scheduled work hours. Users shall use their assigned account in an appropriate manner. Users shall not knowingly transmit, retrieve, or store any communication that is: discriminatory or harassing; derogatory to any individual or group; obscene or pornographic; vulgar or profane; defamatory or threatening; in violation of another User s privacy; used in order to propagate any virus, worm, Trojan horse, or trap-door program code; used to plagiarize or copy copyright-protected material; or used for personal profit or illegal purposes. Users may forward or redistribute messages received by them only when doing so fulfills a legitimate business need of the City and County of Denver. No personal messages, chain letters, or other unauthorized broadcast messages may be forwarded from a User s account. As City and County of Denver messages are not encrypted at this time, Users shall refrain from transmitting external messages that contain personally identifiable information. Social Security Numbers should NEVER be included in external messages. When sending , Users shall take all reasonable steps to confirm the accuracy of all addresses. If a User discovers an has been sent in error, the recipient is to be contacted and requested to delete the message immediately. Users shall ensure that all external messages contain an attached signature with the sender s name, title, phone number, users should also consider the following confidentiality statement, which individual agencies may require: This transmission from the City and County of Denver, and any documents, files, or previous messages attached to it, are intended solely for the individual(s) to whom it is addressed and may contain information that is confidential, legally privileged, and/or exempt from disclosure under applicable law. If you are not the intended recipient, you are hereby notified that any unauthorized review, forwarding, printing, copying, distribution, or use of this transmission or the information it contains is strictly prohibited. A misdirected transmission does not constitute waiver of any applicable privilege. If you received this transmission in error, please immediately notify the sender and delete the original transmission and its attachments. Thank you. Signatures shall not include any photos, pictures, graphics, or other text unless approved by the Denver Marketing Office. Accessing any inappropriate Internet site is prohibited, including sites that are obscene, hateful, harmful, malicious, hostile, threatening, abusive, vulgar, defamatory, profane, or racially, sexually, or ethnically objectionable. Inappropriate use of the Internet also includes participation in chat rooms not related to assigned job responsibilities; playing games; selling, or promoting the sale of merchandise for personal gain; downloading music, games, pictures, video, freeware, or software; or using instant messaging. Users who intentionally visit inappropriate sites or use the Internet in an inappropriate manner will face sanction. (This restriction does not apply to Users who have a legitimate business need to access otherwise prohibited Internet sites and who have approval from their agency or department Executive Director and Technology Services.) The City and County of Denver uses independently supplied software and data as a web filter to block certain inappropriate categories of Internet sites. A User who has a legitimate business need to access a blocked site may submit a written request, approved by the User s agency or department Executive Director, to the Technology Services Security Manager to have the site Page 3 of 8
4 unblocked. The fact that a site is not blocked does not imply that it is acceptable or permissible to access. All User access of the Internet will be recorded in an Internet activity log which is available for review by designated Technology Services personnel upon request by a supervisor or Executive Director. When inappropriate use of the Internet is found, Technology Services will notify the User and the User s supervisor of the inappropriate use. After the third inappropriate use notification, or upon supervisor request, Technology Services shall disable all User Internet access. Access to the Internet may be restored upon written request from the User s agency or department Executive Director to the Technology Services Security Manager. Electronic Records Definition, Electronic Records: are a subset of Records, same in all respects except that their physical form is electronic. The term includes all original , documents, papers, letters, books, maps, photographs, sound or video recordings or other information that are created or received by the City and County of Denver in the exercise of City functions in electronic form, regardless of whether public access to them is open or restricted under the laws of the State of Colorado. The term Electronic Record is subject to the Public Records Act as set forth in C.R.S. as amended, Section through 206. Users shall save all Electronic Records and other necessary files to an assigned network drive or other encrypted electronic media that is designated and approved by User s department or agency. Files saved to desktop computer hard drives will not be backed up or protected and may be lost in the event of a computer failure or other event. Users must save and delete Electronic Records and in accordance with Executive Order 64. Any electronic documents that are not considered to be Electronic Records or otherwise necessary to do business shall not be retained. Users will be held accountable and face possible discipline for any unauthorized files saved on their assigned network drive, other shared drives, or desktop computer hard drive, including (but not limited to) pictures, audio clips, video files, and copyright-protected material owned by another party. Users may save information on disposable or portable media (floppy disks, CDs, external drives, DVDs, zip disks, removable thumb drives, flash memory drives, USB memory drives) if necessary for a business purpose, upon supervisor approval, and only for as long as is necessary based on the retention requirements of the information type stored per Executive Order 64. Confidential information should be saved in an encrypted form or to encrypted media. Disposable media containing information that is the property of the City and County of Denver must be stored in a locked area, may only be removed from the user s office location if authorized by the User s supervisor to do so, and must be destroyed if no longer useful once the retention deadline is met. Security of Devices and Services All City and County of Denver agency and department computer hardware, PDA or other portable device, and other peripheral device purchases must be coordinated with Technology Services to maintain system compatibility throughout the City and County of Denver network. Users shall not attempt to install or attach any unauthorized external device to a City and County of Denver computer without prior written authorization from Technology Services. All hardware upgrades and additions must be installed by Technology Services personnel. Users shall not attempt any network-related computer repairs without Technology Services Page 4 of 8
5 authorization. Technology Services personnel may disconnect or otherwise disable any device that poses a threat to the City and County of Denver network. Attaching modems to City and County of Denver computers will only be done by exception and only with authorization from Technology Services. Computers may either be plugged into the LAN/WAN or a phone line but not both simultaneously. Only software licensed to the City and County of Denver may be installed on City and County of Denver computers, PDA devices, or other peripheral devices. Users shall not attempt to install, add, or use any unauthorized software of any kind (including screen savers) on City and County of Denver computers, PDA devices, or other peripheral devices. Users shall not copy, duplicate, distribute, delete, or modify any proprietary or other software licensed to the City and County of Denver, or related documentation, without written authorization from the vendor and Technology Services. Users shall not use any IT device that another User has already logged onto and shall not use another User s User ID and password to log onto a workstation computer for any reason. The only exception will be for appropriate Technology Services personnel providing requested technical support. In the event that a User suspects another person knows and/or has used his/her User ID and password, the User must notify his/her supervisor, the appropriate Technology Services personnel, and any other appropriate departmental personnel immediately. Users shall practice adequate password management by keeping all passwords confidential. Users shall keep all passwords physically secure and not place a written list of passwords in plain view or anywhere easily discoverable (for example, posted under a computer keyboard). Users shall not disclose system passwords to anyone, for any reason. Users must contact their supervisor, appropriate Technology Services personnel, and any other appropriate departmental personnel immediately if anyone asks for, or attempts to verify a User s password. Users should not choose passwords that can be easily guessed by a third party or that are related to the User s job or personal life. For example, a car license plate, a spouse s name, or a home address should not be used. Passwords should not follow a consistent pattern (January2006, February2006, March2006, etc.) Under no circumstances should a Social Security Number be used as a password. Users shall construct passwords with at least eight (8) characters, including three of the following four character types: upper case alphabetic, lower case alphabetic, numeric, special characters (symbols, punctuation marks). For additional security, Users are recommended to create pass phrases that contain at least fifteen (15) characters. Passwords are case sensitive. Passwords will expire after 90 days and Users will not be permitted to reuse any of the last fifteen (15) passwords used. After five (5) failed login attempts, the User s account will be disabled. The User must then personally contact Technology Services to manually reset their account. Users shall not disclose their voice mail passwords unless it is a shared phone line, unless a supervisor requests access to a voice mailbox in support of specific business operations, or unless someone is covering a phone for the User for a specific, temporary length of time. In the latter case, the voice mail password must be changed immediately upon the period ending. Users shall not leave any IT device logged into the network and unattended for an extended period of time. When leaving a work area, Users must log out or invoke a password-protected screen saver on any IT devices in that area that are under the User s control. All City and County of Denver workstation computers will automatically launch a screensaver after fifteen Page 5 of 8
6 (15) minutes of nonuse. Users are encouraged to force their computers into a screensaver (Ctrl +Tab) if they know they are leaving the computer unattended for any period of time. Users shall log off workstation computers at the conclusion of each work day. City and County of Denver servers and network equipment shall be located in limited-access areas that are only accessible to certain authorized Technology Services personnel. All City and County of Denver servers will be backed-up daily and all information stored on servers will be retained for fourteen (14) days, or such other period as may be determined by Technology Services, before permanent deletion. All scheduled archival back-up media will be stored securely in an off-site location. The City and County of Denver Technology Services Division shall automatically check and implement system security patches as necessary. Servers will be protected by a comprehensive firewall. Servers will be scanned on a regular basis and maintain up to date anti-virus software that will constantly monitor for active viruses. Updates will be unobtrusively deployed. An activity log will be created by the City and County of Denver system that contains sufficient information for after-the-fact investigation of unauthorized activity or loss. The system will securely log all significant computer security-related events. Log entries will provide sufficient data to support comprehensive audits of the effectiveness of, and compliance with these policies and procedures. Examples of computer security-related events may include: successful and unsuccessful session log-ins; identification and authentication failures; security administration activity; all activities performed by privileged users; and failed attempts to access information. Information captured for each logged event may include: User ID, network address, information or system accessed, date and time of access, type of event, result of event, and reason for failure. Authentication information, such as passwords, must never appear as part of an activity log. For critical or sensitive applications or resources, logs should be generated for all access, additions, modifications, and deletions whether authorized or unauthorized. Logs will be reviewed periodically for anomalies, or as part of a security incident response. Before a workstation computer is transferred to a new user, surplused, or disposed of, all data files on the hard drive will be overwritten or destroyed by the appropriate Technology Services personnel. Operable hard drives must be overwritten prior to being provided to a new user. If the hard drive is to be removed from City service entirely, it must be overwritten to Department of Defense standards or physically destroyed. The City and County of Denver Technology Services Division has the right to update the system and/or network at any time. Remote Access All Information Technology Acceptable Use Policies and Procedures within this document apply equally to desktop IT and communication devices and services as well as to laptops, peripheral devices, and other portable devices used outside of a City and County of Denver office or building. Users requesting laptop computers, cell phones, or other portable devices must have written approval from an agency or department Executive Director and must coordinate the purchase of remote devices with Technology Services to maintain system compatibility throughout the City and County of Denver network. Laptop computers, cell phones, or other portable devices provided to staff for use out of a City and County of Denver office site are to be used primarily for City business. Page 6 of 8
7 Users shall not save any public records, personally identifiable information, or other files to a laptop or peripheral hard drive for any longer than absolutely necessary. All such information must be saved to the User s assigned City and County of Denver network drive as soon as possible. Laptops and portable media such as USB drives or portable hard disks pose a security risk in that they are easily stolen or lost. As a result, extra precautions must be taken with such devices and should not be left unattended or in a non-secured environment. Users shall provide appropriate security at their remote sites, including updated anti-virus software, must not have a split tunnel configuration, and those installations with Cable/DSL/T- 1 or other high speed connections must have a firewall. (Split Tunnel Configuration: A computer that is accessing the City and County of Denver network is itself accessible on the Internet. Many Cable/DSL connections are configured this way. Users should check with their network administrator for instructions on how to block this.) Any vendor requesting remote access to a City and County of Denver server must utilize current virus protection, security updates and patches, and robust firewall software on the vendor s computers and/or server that will be used to access the network. If malicious code such as viruses, Trojans, worms, or backdoors are introduced by the vendor and compromise or put at risk the City and County of Denver s proprietary information, the City and County of Denver will seek any civil and criminal remedy available. Vendors with remote access to a City and County of Denver server must keep strictly confidential any records, proprietary information, and technology provided to them, and must use such information solely for the purpose the information has been provided. The termination of the vendor s contract with the City and County of Denver does not relieve the vendor from this obligation. The Technology Services Helpdesk will provide User assistance remotely as requested. However, it is not the responsibility or duty of Technology Services to physically assist User s in their homes in order to gain remote access to the City and County of Denver network. Technology Services personnel may revoke a User s remote access privileges at any time and without warning if a threat to the City and County of Denver network is found or suspected. Violations Users shall immediately report any violations, or suspected violations of these Information Technology Acceptable Use Policies and Procedures to a supervisor, the Technology Services Helpdesk, the Technology Services Security Administrator, and/or any other appropriate departmental personnel. City employees who violate these Information Technology Acceptable Use Policies and Procedures may be subject to disciplinary action based on provisions of Career Service Rules, device revocation or service access termination, and/or legal action. Devices, services, systems, networks, files, or any other data owned by the City and County of Denver must not be used knowingly to violate the laws and regulations of the United States or any other nation, or the laws and regulations of any state, city, province, or other jurisdiction in any material way. Use of any resources owned by the City and County of Denver for illegal activity is grounds for immediate dismissal. The City and County of Denver will cooperate fully with any legitimate law enforcement inquiry in this regard. Other Technology Services shall publish the most current version of this document on an annual basis and provide to all Users. The City and County of Denver reserves the right to revise and modify this document at any time. Page 7 of 8
8 Information Technology Acceptable Use Acknowledgment By signing this Acknowledgement, the User named below consents and agrees to be bound by all current Information Technology Acceptable Use Policies and Procedures. The User understands that any failure to adhere to the Policies and Procedures may result in disciplinary action based on provisions of Career Service Rules, device revocation or service access termination, and/or legal action. This Acknowledgement applies to any IT and communication devices and services the User is provided by the City and County of Denver, including (but not limited to) computers, peripherals, PDA devices, cell phones, and pagers; software; files; messages; Internet activity logs; remote access; and any other data or records stored on or created with devices provided by the City and County of Denver. The User shall sign this Acknowledgement and be provided a copy of the most current Policies and Procedures prior to being given access to any IT or communication device or service by the City and County of Denver, and shall sign an updated Acknowledgement upon any material change being made to the Policies and Procedures. Refusal to sign this Acknowledgement will result in no IT or communication device or service being provided by the City and County of Denver. Refusal to sign this Acknowledgement or updated Acknowledgement may result in disciplinary action based on provisions of Career Service Rules, device revocation or service access termination, and/or legal action. DATE: USER LEGAL NAME: USER SIGNATURE: DEPT / AGENCY: EMPLOYEE ID NUMBER (if known): TERMINATION OF ACCESS DATE (if applicable): Original: Technology Services Copy: User Copy: Human Resources (upon request) Page 8 of 8
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Appropriate Use Policy Technology & Information
CLACKAMAS COUNTY EMPLOYMENT POLICY & PRACTICE (EPP) EPP # 59 Implemented: 05/20/10 Clerical Update: Appropriate Use Policy Technology & Information PURPOSE: To establish rules governing use of County information
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
CITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
Appendix H: End User Rules of Behavior
Appendix H: End User Rules of Behavior 1. Introduction The Office of Management and Budget (OMB) has established the requirement for formally documented Rules of Behavior as set forth in OMB Circular A-130.
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
JHSPH Acceptable Use Policy
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
Sample Policies for Internet Use, Email and Computer Screensavers
Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies
Franciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
Electronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
All Users of DCRI Computing Equipment and Network Resources
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
Desktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
Acceptable Use Policy
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator
POLICIES AND PROCEDURES NEW JERSEY EARLY INTERVENTION SYSTEM No: NJEIS-17 Subject: Computers & Electronic Records Effective Date: May 1, 2011 Responsible Party: Part C Coordinator I. Purpose To protect
City of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
PINE BLUFF POLICE DEPARTMENT POLICY/PROCEDURES MANUAL
PINE BLUFF POLICE DEPARTMENT POLICY/PROCEDURES MANUAL SUBJECT: Computer Security CHAPTER: ADMINISTRATION & PERSONNEL ISSUED By: Chief of Police John Howell POLICY NUMBER 118 ISSUE DATE 02/19/2008 EFFECTIVE
