Central Bedfordshire Council. IT Acceptable Use Policy. Version 1.7 January 2016 Not Protected. Not Protected Page 1 of 11

Size: px
Start display at page:

Download "Central Bedfordshire Council. IT Acceptable Use Policy. Version 1.7 January 2016 Not Protected. Not Protected Page 1 of 11"

Transcription

1 Central Bedfordshire Council IT Acceptable Use Policy Version 1.7 January 2016 Not Protected Not Protected Page 1 of 11

2 Policy Approval Central Bedfordshire Council acknowledges that information is a valuable asset, it is therefore wholly in its interest to ensure that the information it holds, in whatever form, is appropriately governed, in terms of protecting the interests of all of its stakeholders. This policy and its supporting standards and work instructions supersedes any previous policy of the same name and are fully endorsed by the Corporate Management Team and the Executive under authority defined within Central Bedfordshire Councils Constitution, part H3 (SCHEME OF DELEGATION BY THE COUNCIL AND BY THE EXECUTIVE TO DIRECTORS AND OTHER OFFICERS), section , the through the production of these documents and their minuted approval. I trust that all officers, contractors and other relevant parties will, therefore, ensure that these are observed in order that we may contribute to the achievement of the Council s objectives and the delivery of effective services to our community. Chief Information Officer: (Senior Information Risk Owner) Date The current version of the Central Bedfordshire Council s IT Acceptable Use Policy is available from the website at Alternatively, a copy can be obtained by writing to the Information Governance Manager at: Central Bedfordshire Council Priory House Chicksands Shefford SG17 5TQ 1 Information and Communication Technology - To determine and issue to officers general standards and guidelines in the management and use of information technology and systems across the Council. Not Protected Page 2 of 11

3 CONTENTS 1 IT ACCEPTABLE USE POLICY INTRODUCTION PURPOSE INTENDED AUDIENCE SCOPE NON COMPLIANCE TELEPHONY INCOMING PERSONAL CALLS ON CBC PHONES OUTGOING PERSONAL CALLS FROM CBC PHONES MOBILE USE VOICE MAIL INTERNAL TELEPHONE DIRECTORY IDENTIFYING CALLERS SECURITY OF SYSTEMS AND INFORMATION SHARING OF LOGON PASSWORDS PASSWORDS EXCEPTIONS DELEGATING ACCESS TO COLLEAGUES PASSWORD SECURITY PIN SECURITY CLEAR SCREEN TERMINATION OF EMPLOYMENT DATA STORAGE UNAUTHORISED OR UNLICENSED COMPUTER SOFTWARE UNAUTHORISED COMPUTER HARDWARE COMPUTER VIRUSES... 9 NOT FORWARD WARNINGS OF NEW VIRUS OUTBREAKS TO OTHERS SECURITY INCIDENTS WORKING AWAY FROM THE OFFICE REMOTE ACCESS INTERNET AND INTERNET ACCESS BUSINESS PERSONAL USE OF Not Protected Page 3 of 11

4 1 IT Acceptable Use Policy 1.1 Introduction The digital age brings with it advantages as well as threats. If used correctly, computer and telephony services can provide local authorities with the ability to serve our citizens, customers and partners efficiently in an economical, secure, accessible and legally compliant manner. 1.2 Purpose This policy sets out the mandatory measures and requirements applicable to the use of the Council s IT systems It should be read in conjunction with Council policies, procedures and guidance covering: a) Information Governance b) Records Management c) Data Protection d) Freedom of Information e) Remote / teleworking f) Social Media g) Discipline. 1.3 Intended Audience This policy applies to all members, established employees, temporary employees, agency staff, authorised third party employees and consultants/contractors who are provided with access to any council provided IT service not designated as a public facility For the purpose of this policy these people will be termed users. Managers are responsible for ensuring all users under their control are aware of, understand and adhere to this policy. 1.4 Scope The Council provides IT resources to its users for business use. Personal use of IT resources is permitted within the constraints defined in this document, however use of the Councils IT resources to operate a personally owned business or for personal financial gain is unacceptable All access to council IT systems is based upon business need and related to the post held and role undertaken. Managers should satisfy themselves as to the suitability of candidates IT skills during the recruitment process and ensure IT training and skills needs analysis form part of ongoing staff management.. 2 A public website is a public facing facility, where an extranet or the corporate network is not Not Protected Page 4 of 11

5 1.4.3 In order to ensure the effective operation of this policy and to safeguard the organisation s greater interests, the Council reserves the right to use automated tools and selected manual intervention, where appropriate and necessary, to monitor usage of business IT systems and services in accordance with the Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations All devices issued by CBC IT are for company use only with only incidental use in exceptional cases for personal needs. 1.5 Non Compliance Non Compliance with this framework and/or abuse of any electronic information, IT resources or breach of any of the IT Acceptable Use Policy clauses, may include disciplinary action up to and including termination of employment for staff. Sanctions imposed by the Council do not preclude possible criminal prosecution under relevant legislation. 2 Telephony The Council may provide users with a variety of telephony services, such as, desktop phones, mobiles, PDAs 3 /smart phones and voice mail services. 2.2 Incoming personal calls on CBC phones It may be necessary, on occasion, to receive incoming personal calls during work time. Providing the nature, frequency, call length or other aspects do not reach an unacceptable level that affect your performance in your role or that of your colleagues, this is acceptable. 2.3 Outgoing personal calls from CBC phones Council provided phones (fixed or mobile) may be utilised for outgoing personal use, subject to usage not becoming excessive. Users must not divert their office or mobile phone to their personal mobile Mobile use Users of Mobiles/smart-phones shall: a) Avoid the use of their personal devices for undertaking Council business in situations in which this is clearly inappropriate 5 b) Avoid using a mobile to discuss sensitive information in public places where possible 2.5 Voice Mail Users shall not: a) Leave messages containing sensitive information on voice mail. 3 Personal Digital Assistant 4 Due to the cost of forwarding calls across the mobile network 5 For example, if use of personal phone/number would lead to a failure to maintain appropriate professional boundaries between service users and staff Not Protected Page 5 of 11

6 b) Use it to screen incoming calls or to avoid answering calls unless there is a genuine need Internal Telephone Directory All users are provided with access to the internal telephone directory and are expected to ensure that their own entry is kept accurate. 2.7 Identifying Callers When using any voice communications, beware divulging sensitive information of a business or personal nature, unless you are: a) Sure of the other person s identity b) Confident you cannot be overheard by people other than work colleagues 3 Security of Systems and Information 3.1 Sharing of Logon Passwords Users shall: a) Keep their password secret b) Not write down their password c) Not allow anyone else to use a computer whilst logged on under their name d) Not attempt to access a computer system for which they have no authorised access Passwords Exceptions In emergency circumstances, access to an individual s account may be granted to their line manager, Internal Audit or other appropriate party (via password reset or other methods). The following controls shall apply: a) Written authorisation by an Assistant Director or Chief Officer giving a clear business justification for the access will be required b) The party gaining access to the account must abide by all relevant legislation, policies and guidance and only use the access for the specific purpose given in their justification IT administrators may have passwords and PINs that cannot be changed due to technology limitation. An emergency record of the password must be securely retained. 3.3 Delegating Access to Colleagues Managers must not divulge their personal passwords to their secretary or PA (Personal Assistant) as a means of delegating system access 6 This is important in providing good customer service for both internal and external facing roles alike 7 This is a criminal offence as defined in the Computer Misuse Act 1990 Not Protected Page 6 of 11

7 3.4 Password Security Computers identify an individual by their username and password. As the username is usually known or easily discoverable, the password is critical in authenticating 8 the user to the system. Users are therefore expected to take all reasonable steps to ensure that their password remains known only to them Personal passwords shall be: a) Changed at least every 42 days b) Changed whenever prompted by the system c) A mixture of upper and lower case letters and numbers d) A minimum of 8 characters in length e) Not obvious PIN Security Personal identification numbers may be issued with some mobile devices or authentication tokens to improve security. PINs shall be: a) Changed, where possible, from the default to something memorable b) Not simple ascending or descending sequences c) Not all the same digit Where the device allows the use of a password the measures for personal passwords shall apply. 3.6 Clear Screen Where possible Computer screens must be positioned on desks to avoid being overlooked by unauthorised persons A password protected screen save must be used by staff when they are away from their desk Staff must log off and shut down their machine at the end of the working day. 3.7 Termination of Employment Line managers must request that the IT Service Desk disables logon accounts in a timely manner for users that leave the organisation. 3.8 Data Storage 8 Authentication is the process to confirm the identity of an individual user as true, genuine and valid. For example a secret password known only to its user. 9 An attacker may try to recover a users password by guessing it based on their knowledge of the user or by using a dictionary based attack based on common names and words. Not Protected Page 7 of 11

8 3.8.1 Removable media represent a high risk with regard to virus infections, unauthorised data removal/transfer and data loss The Council shall actively restrict the availability of removable media by technical and physical controls Users shall : a) Store files on the network and not on local drives or removable media as these are not backed up b) Never store data on an unencrypted laptop drive or unencrypted removable media c) Hold information at a level of security appropriate to its classification d) Use their home drive (H:) on the network to store information to which access has to be restricted to their personal logon id e) Not attempt to use personally owned removable media Unauthorised or Unlicensed Computer Software Only approved, legal computer software may be used with Council IT systems. a) All requests to use new software products and Services must be raised through via the IT Service Desk b) All software must be purchased and approved by the IT service unless written permission is given to the contrary by the CIO 11 c) Users must not attempt to purchase, download or install software themselves on CBC IT equipment 12 d) The use of Microsoft Access within the organisation is forbidden, unless explicitly authorised in writing by IT Unauthorised Computer Hardware Only hardware approved by IT may be used with the Councils IT systems Users shall not: a) Attempt to purchase or install hardware themselves, irrespective of how it is intended to be used b) Connect any personally owned equipment to Council equipment, including USB ports and network ports. c) Attempt to access services on the PSN network from a personally owned device 10 Contact the IT Service Desk for authorised encrypted media if a business requirement exists 11 This is to ensure that the product is compatible with the Councils technical infrastructure. It may prove impossible for IT to support software that has not been checked by IT for compatibility 12 This includes commercial demos/trials, screensavers, shareware / freeware / OpenSource or software downloaded from the internet (including unlicensed music or video material) or drivers to connect devices (such as ipod s or phones) to your computer. Not Protected Page 8 of 11

9 Where there is a corporate need to connect devices to equipment, this must be approved by IT and will usually be performed by IT. For example, exceptions will be made to allow third party IT solution/support providers to install hardware and software on behalf of the Council Computer Viruses To protect the Council from disruption caused by malicious software all computers shall have anti virus software installed and actively running Users shall: a) Never attempt to disable the anti virus protection b) Report viruses and suspected virus incidents to the IT Service Desk c) Follow any instructions given by IT regarding not using a PC/laptop with a suspected virus infection whilst it contains the infection d) Virus check any removable media from an external source before transferring any data from it onto a council systems 3.12 Not forward warnings of new virus outbreaks to others Security Incidents If staff detect, suspect or witness an incident that may be a breach of this IT acceptable use policy, a loss of confidentiality, a near miss or an obvious security weakness then they must report it to the IT Service Desk and their line manager, stating clearly that they believe it to be a security incident Working Away From the Office Users shall: a) Not take council equipment or data offsite without good reason b) Ensure that they sign for any portable/mobile equipment that they require to undertake their role c) Ensure that they have appropriate authorisations to transport, transfer or transmit data d) Ensure that any sensitive data on CBC portable equipment or media is encrypted Make a note of the make model and serial number of portable equipment and keep this separate from the equipment itself 13 e) Report all losses/thefts of portable equipment to your line manager and the IT Service Desk promptly. Also report the incident to the Police if the equipment was lost / stolen whilst off site Remote Access Remote working increases the risk of theft, loss, damage to equipment, tampering, interception of communications and access by unauthorised parties, therefore additional safeguards, proportionate to the increased risk must be implemented and observed. 13 This includes information on laptop hard drives, transferred by or removable media (CD-Rs, DVD-Rs, diskettes, USB memory sticks, SD cards etc) Not Protected Page 9 of 11

10 Remote users must: a) Not use personally owned IT equipment to access CBC systems except via a CBC IT approved remote access solution to the corporate network b) Not store their two factor authentication token with the equipment used to access the CBC network remotely, especially when mobile c) Use 3G broadband rather than use public WiFi hotspots to access the CBC network when mobile working using a CBC supplied laptop 14 d) Ensure that CBC laptops are kept physically secure when unattended e) Co-operate on returning equipment to IT in the event that problems cannot be fixed remotely Users must not: a) Take CBC IT equipment out of the UK or attempt to access the CBC network from a foreign country b) Move CBC provided thin clients (A thin client (sometimes also called a lean, zero or slim client) is a computer or a computer program that depends heavily on another computer (its server) to fulfill its computational roles) to another part of their home without the prior consent of their manager 15 c) Allow other members of their household to use any of the CBC provided equipment. This includes, but is not limited to thin clients, PCs, laptops, routers, printers, encrypted media, scanners and faxes d) Unplug any CBC provided home router and substitute their own e) Attempt to use their own computer equipment to access Council systems that contain personal data for which the Council is not identified as the data controller. 4 Internet and 4.1 Internet Access Unacceptable internet usage shall be only that which is in breach of the officer s code of conduct and/or the Council s constitution IT may block some sites in order to protect the organisation or its staff, such as those hosting malicious software or that are illegal to view Business is not a secure means of communication. It does not provide immediate or guaranteed delivery. All s sent or received from the Council s systems are the property of the Council. All messages will be unpacked and scanned for viruses as they arrive or leave the Council. 14 It is acceptable to use a WiFi enabled router with WPA or WPA2 encryption at home 15 Moving equipment has implication for compliance with health and safety regulations, security and can create unnecessary IT support work 16 Some site may be illegal to view under existing UK legislation Not Protected Page 10 of 11

11 4.2.2 Users of Council shall: a) Except for Not Protected s clearly indicate the sensitivity of their message content in the subject line of all to indicate to the recipient how you expect them to handle the information b) Use the delegation functionality in to grant or rescind access c) Use Private calendar appointments where the subject of meeting indicates confidentiality is of concern d) Treat as permanent written records which may be read by persons other than the addressee e) Review their mailbox regularly and delete unnecessary messages f) Treat unsolicited s from unknown sources with suspicion g) Electronically retain relevant s in a structured manner according to their retention schedule h) Treat both s and attachments in the same way, where corporate decisions or advice are being given or discussed Users of Council shall not: a) Send outbound from generic accounts set up to receive incoming only b) Forward chain or joke s to others c) Rename attachments 18 or password protect attachments to evade malicious software scanning. d) Use non GCSx where use of GCSx is clearly appropriate e) Not seek to gain access to another users mailbox without either their consent or the written approval of an Assistant Director 4.3 Personal use of Staff may use the corporate system for personal use, provided such use does not breach the officer s code of conduct and/or the Council s constitution. DECLARATION I confirm that I have read and understood and will abide by the Central Bedfordshire Council IT Acceptable Use Policy and the Information Security Procedures. I accept that my usage of IT systems will be monitored and that I have no expectation of privacy as a result of any such usage. I understand that breach of these policies could result in disciplinary action. Name:... Signed:... Date: Such information is often subject to disclosure under the Freedom of Information Act until any formal specified destruction date is reached under an approved retention schedule. 18 Sometimes referred to as attachment spoofing Not Protected Page 11 of 11

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Information Security Code of Conduct

Information Security Code of Conduct Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

SECURITY POLICY REMOTE WORKING

SECURITY POLICY REMOTE WORKING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices

More information

Remote Access and Home Working Policy London Borough of Barnet

Remote Access and Home Working Policy London Borough of Barnet Remote Access and Home Working Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Remote Access and Home Working Policy Document Description This policy applies to home and

More information

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review

More information

ABERDARE COMMUNITY SCHOOL

ABERDARE COMMUNITY SCHOOL ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

How To Behave At A School

How To Behave At A School THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Information Security Incident Management Policy

Information Security Incident Management Policy Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

IT ACCESS CONTROL POLICY

IT ACCESS CONTROL POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

Acceptable Use Guidelines

Acceptable Use Guidelines Attachment to the Computer and Information Security and Information Management Policies Acceptable Use Guidelines NZQA Quality Management System Supporting Document Purpose These Acceptable Use Guidelines

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6

More information

School Information Security Policy

School Information Security Policy School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

HIPAA Privacy & Security Health Insurance Portability and Accountability Act

HIPAA Privacy & Security Health Insurance Portability and Accountability Act HIPAA Privacy & Security Health Insurance Portability and Accountability Act ASSOCIATE EDUCATION St. Elizabeth Medical Center Origin and Purpose of HIPAA In 2003, Congress enacted new rules that would

More information

PS177 Remote Working Policy

PS177 Remote Working Policy PS177 Remote Working Policy January 2014 Version 2.0 Statement of Legislative Compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data Protection

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

Information security and paper-based data storage and disposal. INFORMATION SECURITY POLICY Version 2.2

Information security and paper-based data storage and disposal. INFORMATION SECURITY POLICY Version 2.2 Information security and paper-based data storage and disposal NOT PROTECTIVELY MARKED INFORMATION SECURITY POLICY Version 2.2 Title Subject Version Date Author Protective Marking Classification INFORMATION

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY Version Author Date Approved by Board 2009-1 Gillian Kirkup 24 March 2010 Page 1 of 8 THE RICE MARKETING BOARD FOR

More information

REGION 19 HEAD START. Acceptable Use Policy

REGION 19 HEAD START. Acceptable Use Policy REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

SECURITY ORGANISATION Security Awareness and the Five Aspects of Security

SECURITY ORGANISATION Security Awareness and the Five Aspects of Security SECURITY ORGANISATION Security Awareness and the Five Aspects of Security Shift Security simply used to protect information vs. Enabling business initiatives with security Bolt-on/add-on structure to business

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Remote Working and Portable Devices Policy

Remote Working and Portable Devices Policy Remote Working and Portable Devices Policy Policy ID IG04 Version: V1 Date ratified by Governing Body 29/09/13 Author South Commissioning Support Unit Date issued: 21/10/13 Last review date: N/A Next review

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

DATA PROTECTION AND DATA STORAGE POLICY

DATA PROTECTION AND DATA STORAGE POLICY DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether

More information

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data

More information

NETWORK AND INTERNET SECURITY POLICY STATEMENT

NETWORK AND INTERNET SECURITY POLICY STATEMENT TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004

More information

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

Kenmore State High School Student Laptop Charter

Kenmore State High School Student Laptop Charter Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6

More information

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY Putting Barnsley People First BARNSLE CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLIC Version: 2.0 Approved By: Governing Body Date Approved: Feb 2014 (initial approval), March

More information

Information Security Incident Management Policy and Procedure

Information Security Incident Management Policy and Procedure Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure

More information

Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users

Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency

More information

Information Governance Framework. June 2015

Information Governance Framework. June 2015 Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review

More information

IT Security Procedure

IT Security Procedure IT Security Procedure 1. Purpose This Procedure outlines the process for appropriate security measures throughout the West Coast District Health Board (WCDHB) Information Systems. 2. Application This Procedure

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Policy for Associates and Contractors Version: 1.12 Status: Issued Date: 30 July 2015 Reference: 61418080 Location: Livelink Review cycle: Annual Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

Working Practices for Protecting Electronic Information

Working Practices for Protecting Electronic Information Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that

More information

Information Technology Acceptable Usage Policy

Information Technology Acceptable Usage Policy Information Technology Acceptable Usage Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly

More information

UTC Cambridge ICT Policy

UTC Cambridge ICT Policy UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions

More information

Information Security Policy. Policy and Procedures

Information Security Policy. Policy and Procedures Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable

More information

Somerset County Council - Data Protection Policy - Final

Somerset County Council - Data Protection Policy - Final Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council

More information

Hang Seng HSBCnet Security. May 2016

Hang Seng HSBCnet Security. May 2016 Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information. and Communication Systems Policy Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,

More information

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

Policy Document. IT Infrastructure Security Policy

Policy Document. IT Infrastructure Security Policy Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

Data Protection and Information Security Policy and Procedure

Data Protection and Information Security Policy and Procedure Data Protection and Information Security Policy and Procedure Document Detail Category: Data Protection Authorised By: Full Governing Body Author: School Business Manager Version: 1 Status: Approved May

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

LSE PCI-DSS Cardholder Data Environments Information Security Policy

LSE PCI-DSS Cardholder Data Environments Information Security Policy LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project

More information

Data Transfer Policy. Data Transfer Policy London Borough of Barnet

Data Transfer Policy. Data Transfer Policy London Borough of Barnet Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).

More information

Cellular/Smart Phone Use Procedure

Cellular/Smart Phone Use Procedure Number 1. Purpose This procedure is performed as a means of ensuring the safe and efficient use of cell/smart phones throughout West Coast District Health Board (WCDHB) facilities. 2. Application This

More information

ICT Acceptable Use Policy

ICT Acceptable Use Policy ICT Acceptable Use Policy Document Management Document Disclaimer This document is issued only for the purpose for which it is supplied. Document Owner This document is produced and owned by Staffordshire

More information

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most

More information

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Corporate Information Security Policy

Corporate Information Security Policy Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives

More information

Email Usage Policy Document Profile Box

Email Usage Policy Document Profile Box Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee

More information

SAS TRUSTEE CORPORATION ( STC )

SAS TRUSTEE CORPORATION ( STC ) SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...

More information

POLICY ON USE OF INTERNET AND EMAIL

POLICY ON USE OF INTERNET AND EMAIL POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic

More information

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network... Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless

More information

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information