PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
|
|
|
- Cora Hodge
- 9 years ago
- Views:
Transcription
1 PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is to define employee responsibilities for the proper, secure, and lawful use of the Pinal County electronic mail ( ) system. APPLICATION: This policy applies to all Pinal County employees and employees of the Superior Courts, including temporary employees, contractors, and third parties who have access to the Pinal County electronic mail system. DEFINITIONS: 1. Electronic Mail ( ) is any transmission of messages, including attachments and imbedded objects, across the County computer information network by electronic means, including but not limited to commercial and electronic mail applications, operating systems messaging capabilities, and Internet mail. 2. Electronic Mail Administrator is the person responsible within the Management Information Systems department (MIS) for maintaining departmental electronic mail applications and/or directories. 3. Formal Communications are communications of any kind pertaining to public business, which must be preserved as a public record. 4. Intellectual Property means rights to, and/or products of the mind or intellect, arising under any law, including, but not limited to, trade secrets, trademarks,, copyrights, and Unfair Competition. This includes any body of work developed by an employee working on County business. 5. IT is the Information Technology Department responsible for the maintenance and administration of the County s electronic mail system. 1. ELECTRONIC MAIL AND SCHEDULING SYSTEM POLICY The Pinal County Electronic Mail and Scheduling System is designed to facilitate County business communication among employees and other business associates for messages or memoranda. Since no computer system is completely secure, the system is not intended to transmit sensitive materials, such as personnel decisions and other similar information that may be more appropriately communicated by written memorandum or personal conversation. The system is County property and intended for County business. The system is not to be used for employee personal gain or to support or advocate for non-county related business or purposes. The contents of all electronic mail messages are the property of Pinal County. Additionally, all data, messages composed, sent, or received on the electronic mail system are and remain the property of Pinal County. messages that are County records need to adhere to the employee s department s data retention schedules (see: Retention of , below). In addition, an elected official or the County Manager may authorize or direct managers and supervisors the right to review or monitor the contents of employees communications on all such devices on the County computer network when necessary for County business purposes. No electronic messages may be monitored, reviewed, audited, intercepted, accessed, or disclosed without authorization of the specific elected official, the County Manager or his/her designee.
2 Page 2 of 5 Employees shall not intentionally intercept, eavesdrop, record, read, alter, or receive other persons' messages without proper authorization. All communications, including text, images, and attachments may be disclosed to law enforcement or other third parties without the consent of the sender or the receiver, except for communications covered by a legal privilege. Misrepresenting, obscuring or concealing the sender, receiver or routing of or encrypting with the intent to disguise, hide or prevent detection or violation of this policy is prohibited. The misuse of privileges is subject to disciplinary action, as determined by the elected official or county manger, in accordance with the Human Resource Personnel Rules, and/or other applicable standards, policies, rules or laws. 2. General Information on Passwords A. While you have a confidential password, users should be aware that this does not suggest that the system is for personal confidential communication, nor does it suggest that is the property right of the employee. The use of the system is for County business. Passwords should be periodically changed to ensure security of the system. Users should not share their password with anyone else. The confidentiality of any message should not be presumed. The use of passwords for security does not guarantee confidentiality. 3. Prohibited Uses of include, but are not limited to: A. Soliciting or recruiting membership for commercial ventures, religious or political purposes, outside organizations, or other non- county related solicitations. B. Creating any offensive or disruptive messages that contain sexual matters or comments that offensively address race, color, religion, gender, national origin, ancestry, marital status, sexual orientation, age, physical or mental disability, medical condition, or veteran status. C. Transmitting pictures or other images in electronic mail that are not related to County business. D. Issuing or forwarding serial or chain mail type messages or advertisements of any commercial nature, except notices of officially approved or sponsored organizations that concern County employees, i.e., the Wellness Coalition, Alcoholics Anonymous, employee educational scholarships, Weight Watchers. E. Sending (uploading) or receiving (downloading) copyrighted materials, trade secrets, proprietary financial information, or similar materials without prior authorization. F. Retrieving or reading any electronic mail messages that are not sent to them unless authorized by the recipient or attempting to gain access to another employee=s messages or files without his/her permission. G. Any activity that violates established County or department policy. 4. Public Records A. A record, as defined in the Arizona Public Records law, that is made by a public official or employee in the pursuance of a duty, the immediate purpose of which is to disseminate information to the public, or to serve as a memorial of official transactions for public reference. B. A record that is required by law to be kept or necessary to be kept in discharge of a duty imposed by law to serve as a memorial and evidence of something written, said, or done. C. A written record of transactions of a public official in his/her office, which is an appropriate method of discharging his/her duties, and is kept by this employee as such in the course of business.
3 Page 3 of 5 D. All electronic mail messages that meet the criteria of the definition of a public record must be made available to the public upon request under the Public Records Law (ARS ) during the required retention period, unless the content of the message falls under one of the exceptions contained in the law or in any other statute, regulation, policy, or rule of court. E. Electronic mail messages are presumed to be Public Records. The confidential (or similar) stamp provided by individual electronic mail systems should be used to mark electronic mail messages that should be reviewed for editing in the event of a public records request. Note: The fact an electronic mail message has been marked confidential does not remove the message from the public records arena, but it will facilitate the review of data for legally permissible editing and dissemination purposes. 5. Personal Use A. In addition to the use of electronic mail in the performance of their job duties, employees may make limited personal use of electronic mail under the following circumstances: a. Scheduling of personal appointments as an effective extension of one s over all time management, i.e., lunches, meetings, etc. b. Sharing of event driven information and planning of work-related social events where the intent is to enhance employee morale, i.e., birthdays, marriages, births, etc. Attachment or sharing of photographs in messages is limited to this authorized personal use. c. Other limited uses that do not violate County or departmental policy. d. Employees may not use external accounts (Yahoo, Gmail, Hotmail, etc.) to conduct County business. External web hosting sites will be blocked from County networks. Limited access will be made available to the Information Technology department for testing purposes only. 6. Retention Schedules A. Electronic mail communications will be preserved pursuant to this policy, applicable federal and state laws, and relevant Pinal County and departmental record retention and disposition schedules. B. Formal communications transmitted or received through electronic mail shall be either printed, and preserved in the appropriate department file in permanent paper format pursuant to each department s records retention and disposition schedule, or saved to an electronic file and preserved pursuant to each department s records retention and disposition schedule and policies. Once communications have been preserved as documents in the appropriate format, the documents shall be deleted from the electronic mail system. C. Routine electronic mail communications shall be deleted after the required action is taken. a. Routine Electronic Mail Communications include: i. Scheduling routine meetings and conference calls. ii. Notification of legal and policy issues to be resolved in more formal communication. iii. Requests for information or directives to complete tasks. iv. Notification of employees whereabouts, i.e., vacations, conferences, out-of-office work. v. Requests for advice and assistance. D. Records retention for litigation purposes is the responsibility of County departments, in consultation with the County Attorney s Office. If your department is involved in any litigation or claims against the County, the E- mails in your department may constitute evidence, or have other legal value, and must be preserved for possible disclosure in connection with the litigation or claim. Such s shall be preserved in hard copy form or in another electronic database or format to ensure retention.
4 Page 4 of 5 E. Communications subject to an existing public records request, a litigation hold requested by the County Attorney s Office or an attorney representing the County, or subject to formal discovery in ongoing litigation will be preserved in the appropriate file or word processing system. F. Records maintained by public entities are presumed to be public records and are subject to inspection on request. There are, however, exceptions to the disclosure requirement where nondisclosure of public records may be necessary to protect important public or privacy interests. In addition, privileged information such as attorney-client records maintained by the Public Defender, County Attorney or other County legal counsel are privileged and may not be subject to inspection or disclosure. 7. Electronic Mail Backups A. The Information Technology Department will create backups of and archived only for system recovery in the event of disasters and/or system failures. Server backups will be kept for system recovery purposes only and will be retained for a period of one full week. The Arizona State Library, Archives and Public Records Department does not recognize server backups as a public record. B. server backup schedule: Daily full backups Monday thru Friday. The following week s backup will overwrite the previous Monday through Friday backup tapes. C. Archive on network share: Daily full backups Monday Thru Friday. The following week s backup will overwrite the previous Monday through Friday backup tapes. 8. AUTHORITY AND RESPONSIBILITY: A. Employees are responsible for: a) Understanding and adhering to the electronic mail policy. b) Using common sense and good judgment in the use of electronic mail as determined by this County Policy and the Director of Information Technology. c) Managing their electronic mail accounts by appropriately marking as confidential, preserving and/or deleting electronic mail messages from their folders as instructed by this policy. d) Advising Management of breaches of this policy. e) Maintaining reasonable precautions to safeguard their electronic mail from unauthorized entry or use. f) The electronic Mail system is not a document repository and is not be used to store critical documents for long periods of time. B. Management is responsible for: a) Understanding this policy, and related policies and documents. b) Advising their employees about this policy and appropriate use. c) Notifying the Human Resources Director when circumstances warrant monitoring of an employee s electronic mail. d) Establishing retention schedules in accordance with applicable statutes, County and organizational policies. C. In their respective positions, either the Elected Official or the Human Resources Director is responsible for: a) Confirming that reported circumstances warrant monitoring. b) Notifying (in the case of an elected official) or obtaining authorization (in the case of the Human Resources Director) from the County Manager or designee before monitoring specific activity. c) Coordinating with the Director of Information Technology to effect the monitoring.
5 Page 5 of 5 d) Reporting violations of this policy to the employee s Appointing Authority for further investigation and disciplinary action as appropriate. e) Facilitating the use of external resources including civil or criminal investigators, as appropriate. PROCEDURES: 1. The Human Resources Department will provide all employees with a copy of this electronic mail policy during new employee orientation and ensure the employees acknowledge and sign a policy acknowledgment. 2. Mass archiving to thumb drives and non-network hard drives is prohibited. archives must be stored within the County s network archive location. Storage quotas will be enforced based upon available resources, technology enhancements, recovery time objectives, and recovery point objectives. 3. If a violation of this policy occurs or is suspected, the appointing authority or designee should: a) Document the circumstances. b) Confirm with the Human Resources Director that monitoring electronic mail is appropriate. c) Monitor the employee=s mail in a manner consistent with the circumstances of the policy violation. d) Initiate disciplinary action, as appropriate under the circumstances. 4. Any employee who violates this policy or uses the electronic mail system for improper purposes shall be subject to discipline, up to and including discharge. 5. Any employee who discovers a violation of this Policy shall notify his/her Appointing Authority, who may request an investigation by the Human Resources Director. FORMS: Pinal County Employee Electronic Mail Policy Acknowledgment.
COLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
Administrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
EFFECTIVE DATE: JULY 1, 2010
Town of Florence POLICY TITLE: EMAIL RETENTION POLICY RESPONSIBLE DEPARTMENT: Town Clerk Office APPROVAL: EFFECTIVE DATE: JULY 1, 2010 AP / RESOLUTION NO.: 2010-02 REFERENCES: TOWN MANAGER SIGNATURE: TOWN
STATE OF WYOMING Electronic Mail Policy
Introduction: STATE OF WYOMING Electronic Mail Policy Pursuant to Executive Order 1999-4 dated the 23rd of December, 1999 Electronic mail (e-mail) enables the user to send and receive messages, make appointments,
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9
ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,
13.19 ETHICS REPORTING POLICY AND PROCEDURE
13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
FIDELITY APPLICANT PRIVACY AND PROTECTION NOTICE
FIDELITY APPLICANT PRIVACY AND PROTECTION NOTICE Last Updated: November 2012 FMR LLC and its affiliated entities ( Fidelity ) value your trust and are committed to the responsible management, use and protection
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
Approved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
Southern Law Center Law Center Policy #IT0004. Title: Email Policy
Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy
LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Data Compliance. And. Your Obligations
Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection
ACCEPTABLE USE OF TECHNOLOGY
IIBE Page 1 ACCEPTABLE USE OF TECHNOLOGY Internet and computer network and non-network access is available to authorized students, teachers, and other staff in the. Albemarle County Public Schools primary
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This
Electronic Records Management Guidelines
Electronic Records Management Guidelines I. Objectives The employees of the Fort Bend Independent School District (the District ) routinely create, use, and manage information electronically in their daily
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT
Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT I. Purpose This directive provides Department of Homeland
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4
Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
Public Information Program
Public Information Program Public Records Policy Purpose This policy is adopted pursuant to the Government Records Access and Management Act Utah Code Ann. 63G-2-701 ( GRAMA ) and applies to District records
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Internet usage Policy
Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
U.S. Chemical Safety and Hazard Investigation Board
BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1
Lisbon School District 15 Newent Road Lisbon, CT 06351
Pur pose The purpose of this policy is to establish direction, procedures, requirements, and responsibilities to ensure the appropriate protection of the Lisbon Public Schools computer and telecommunication
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Village of Hastings-on-Hudson Electronic Policy. Internal and External Email Policies and Procedures
Village of Hastings-on-Hudson Electronic Policy Internal and External Email Policies and Procedures Effective February 2012 1 1. Table of Contents 1. General Policies... 3 1.1 Establishment and upkeep
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
FDOH Information and Privacy Awareness Training Learner Course Guide
Florida Department of Health FDOH Information and Privacy Awareness Training Learner Course Guide To protect, promote & improve the health of all people in Florida through integrated state, county, & community
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
Code - A Date Approved: July 24/01
Page 1 of 10 Date Last Revision: Feb 12/08 POLICY STATEMENT AND PURPOSE The County of Elgin provides employees, elected officials, and other organizations and individuals with access to computer and network
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
NM Counseling and Therapy Practice Board Code of Ethics
TITLE 16 CHAPTER 27 PART 18 OCCUPATIONAL AND PROFESSIONAL LICENSING COUNSELORS AND THERAPISTS CODE OF ETHICS 16.27.18.1 ISSUING AGENCY: Regulation and Licensing Department Counseling and Therapy Practice
16.27.18.1 ISSUING AGENCY: Regulation and Licensing Department Counseling and Therapy Practice Board [16.27.18.1 NMAC- Rp 16 NMAC 27.14.
TITLE 16 CHAPTER 27 PART 18 OCCUPATIONAL AND PROFESSIONAL LICENSING COUNSELORS AND THERAPISTS CODE OF ETHICS 16.27.18.1 ISSUING AGENCY: Regulation and Licensing Department Counseling and Therapy Practice
Virginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
Niagara County Community College
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
Electronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
Human Resources Policies and Procedures
SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
How To Preserve Email Records In Mississippi
EMAIL MANAGEMENT GUIDELINES FOR COUNTIES AND MUNICIPALITIES 1. Purpose The purpose of these guidelines is to ensure that the electronic mail records of county and municipal government officials and employees
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
Our vision. A company where the best people want to work.
Code of Conduct Our vision A company where the best people want to work. The world leader in chemical distribution, providing unparalleled connectivity between customers and suppliers. 2 Univar s guiding
REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
ACCESS, PRODUCTION AND RETENTION OF CITY RECORDS
1.05-3 1 of 6 I. PURPOSE This directive prescribes the rules regarding access, production, and retention of City records. II. POLICY A. All records and other matters in City offices are presumed to be
INFORMATION SYSTEM GENERAL USAGE POLICY
PURPOSE The Information System General Usage Policy ("Policy") establishes appropriate uses of Devon s Information Systems. Devon provides secure Information Systems in accordance with the Information
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
