STATE OF WYOMING Electronic Mail Policy

Size: px
Start display at page:

Download "STATE OF WYOMING Electronic Mail Policy"

Transcription

1 Introduction: STATE OF WYOMING Electronic Mail Policy Pursuant to Executive Order dated the 23rd of December, 1999 Electronic mail ( ) enables the user to send and receive messages, make appointments, or coordinate work schedules rapidly and efficiently. The advantages of e- mail have caused a rapid growth in the use of this technology. With the rapid expansion of throughout Wyoming State agencies, more data are being transmitted between employees without the use of traditional paper documents. This trend increases the possibility of State records being lost before completing their retention cycle, and the messages being subpoenaed for use in litigation. Records contained within the system need to be identified and controlled in the same manner as any other record. This policy shall apply to all State of Wyoming employees whether full-time, part-time, or contract as well as all individuals contracted to perform work for the State. Each agency may develop its own policy provided that, at a minimum, all provisions set forth in this policy are contained in its policy. In such a case, the agency s policy shall take precedence over this policy. Users are cautioned that the use of and attachments thereto may create the need to preserve other forms of data, such as graphics files, digital photographs, sound or wave files and video clips. When using these data forms in conjunction with the system, please consult your agency s policies or computer specialist for advice on the use and preservation of such data. Public records, including those created in , are the property of the State of Wyoming. W.S defines public records for the purposes of those records available for public inspection. W.S defines public records for purposes of management of public records by the Department of State Parks and Cultural Resources. General Notice: A. Electronic mail is an electronic file which is transmitted to other computer users. When transmitted to a recipient, electronic mail may create the sender's electronic file in the recipient's computer system. Deleting electronic mail does not ensure erasure of all copies of the file. Copies of deleted files may be stored remotely for long periods of time, and can be accessed and disclosed. Therefore, employees should not expect their electronic communications to be private, and should not use electronic mail for communications not intended for disclosure to third parties. Although the contents of business-related electronic mail are subject to the same rules of legal privilege as other forms of communication and recordkeeping, employees should treat the electronic mail system as a shared file

2 system, with the expectation that messages sent, received or stored in the system (including individual hard disks) may be subject to access, monitoring and disclosure. Employees should be aware that documents created and sent by electronic mail for official business or as evidence of official acts may constitute official records of the State. B. Nothing in this policy should be construed to waive any claim of privilege or confidentiality for the contents of electronic mail available to the State or to require public disclosure of electronic communications. Definitions: Record: Public records under Wyo. Stat (a)(v) includes... the original and all copies of any paper, correspondence, form, book, photograph, photostat, film, microfilm, sound recording, map, drawing or other document, regardless of physical form or characteristics, that have been made by the State of Wyoming... and by any agencies of the State... or received by them in connection with the transaction of public business, except those privileged or confidential by law. Wyo. Stat also defines public records for purposes of management of public records by the Department of State Parks and Cultural Resources. The definitions are essentially similar, except that W.S does not exclude information privileged or confidential by law. Thus, the Department of State Parks and Cultural Resources may store confidential or privileged information. The Department, however, does not make these confidential documents available to the public. See W.S System: A program designed to create, send, receive, and store messages and other data transmitted electronically between individual users and/or groups of users. File transfer programs are not included in this definition is the electronic transmission of messages and documents. A message may be transmitted within an agency, between agencies of the State or to a destination outside the state system. An message could be a short note or announcement or longer, more formal writing and may include various attachments. An attachment is added electronic data, such as a word processing file, not contained in the main body of the document. General Considerations for Use of 1. Messaging system not a storage system. The State s system is designed for communication by written message. It is not and should not be used as a document storage or management system. 2. Official Business. The State s systems are for official business. All messages sent or received on the system are the property of the State of Wyoming. 3. Expectation of Privacy. Employees should not expect messages in their basic form to be private. is not immune from unauthorized interception, therefore agencies should consider encryption of sensitive information or consider alternative means of communication. Because materials and communications

3 privileged or confidential by law are not included within the definition of public records set out in the Public Records Act (W.S through ), each agency must have a plan for separating out confidential material sent by , or have a policy that confidential materials and communications will not be sent through this medium. Users should never place any data on the system that they would not want to appear on television or in newspapers. 4. Account. accounts, and the messages contained within these accounts, are important to the business functions of an individual State agency. As such, the messages and accounts are the property of the State of Wyoming and will be managed by individual agencies. In the event of any employee termination or interagency transfer, the employee s account shall remain with the originating agency. All messages may be reviewed and redirected to the employee s successor or otherwise purged of agency-specific content as appropriate. 5. Improper uses. The use of the system to transmit data which is disparaging or harassing to individuals or groups will not be tolerated. Types of data include: writings, drawings or any other form that is degrading or harassing to others based on, but not limited to, race, age, origin, sex, disability, religion or political beliefs, including jokes. may not be used for personal commercial ventures, religious or political causes, endorsement of candidates, or outside organizations. 6. Security. To ensure system integrity and security, each individual must protect his system password from disclosure to others. Passwords should be changed frequently. It is suggested that passwords be constructed of alphanumeric characters that are not recognizable words or patterns. 7. Copies and dissemination. can be copied and forwarded to numerous individuals. Copies of an may be retained by persons unknown to the author long after the intended function has been completed. Both recipients and transmitters need to protect data sent on the system from unauthorized alteration and deletion. 8. Copyright violations. The ability of various systems to include attachments enables the users to forward additional data to other users. The ease of transmitting attachments places the burden of protecting copyrighted material on the transmitter. Protection of copyrights requires the user to make, to the greatest degree possible, a determination of authorship of any data utilized. All copyright laws apply equally to systems. Crimes against intellectual property in Wyoming are defined by W.S Etiquette. Use of etiquette should be observed at all times. Employees represent the State of Wyoming and should act in a professional manner at all times. 10. Viruses and . Simply reading a text based can spread a virus to your computer. This is a relatively new development. Viruses can also be hidden in attachments to mail messages. There is risk from opening attached files to the e- mail message, especially executable files. In addition, other types of file attachments can pose a risk, such as MS-Word documents, Excel spreadsheets, and similar files used by applications that use macros, because these files can be infected with a macro virus. If you receive any unsolicited from unknown

4 sources or untrusted documents or executable programs via an attachment, the file should be saved to the local hard drive and scanned with an anti-virus scanning product (with the latest virus signatures or definitions installed) before the file is opened or run. The MIS person should be contacted for assistance. Be aware that this is not an absolute guarantee that the contents of the file are safe, but it will check for any viruses or malicious code that the scanning software can detect. If there is any doubt (especially if the was sent from an unknown source), deleting unsolicited messages with all attached files is the safest thing to do. Users are requested not to spread unconfirmed warnings about viruses. If you receive an unvalidated warning, do not pass it to others; pass it to your systems administrator to validate first. Access to State System: Employees only. Employees of the State are granted access to the system to carry out their assigned duties. System privileges to non-employees shall be granted only with approval of the agency director or his designee. Access to the e- mail system may be terminated at any time if it has been determined access is no longer needed or there has been abuse of the system. If an agency s policies include retention of electronic records, information contained in an system must remain accessible for reference, as required by the retention guidelines in those policies. To remain accessible, the electronic data must be migrated to new software and storage media as updates occur. Disclosure of All that resides on the message server, on any file server, or on any individual's workstation belongs to the State of Wyoming. The State reserves the right to inspect e- mail at any time. Inspection of is limited to the following entities: State/Agency: Immediate supervisor, division management, agency director, Attorney General, including the Department of Criminal Investigation, or as otherwise statutorily authorized. The Attorney General s access to records of the Public Defender s Office may be subject to common law or statutory privilege. Non-State: Anyone with proper judicial approval Anyone requesting to see certain public records pursuant to the Public Records Act

5 1. Litigation and discovery of public records. Any public record (under the definition of public record in W.S , which specifically excludes information privileged or confidential by law) is subject to discovery requests as part of a legal proceeding. Some confidential data might also be subject to discovery, usually with a court order. Discovery can include all data in , including all archived that may pertain to the particular court case. Therefore, it is incumbent upon system users to manage their data in accordance with an approved record retention schedule. Users should purge from the system as soon as its purpose has been served. It is also incumbent upon system users, if confidential communications or information is sent by , to have a system for separating confidential or privileged information from public information. 2. Inspection of public records. Any person may inspect public records at reasonable times subject to any regulation, rule, or exception contained in or allowed by W.S through and W.S If you have questions regarding the inspection of records, contact your Assistant Attorney General. 3. Requests for . Requests to inspect documents should be referred to the agency director. The agency director or his designee should determine, with consultation of the Attorney General s Office if appropriate, if inspection is appropriate and how best to fulfill the inspection request. 4. One week backup only. Each agency may establish its own backup policy, but it is recommended that backup of systems should be for disaster recovery and should be retained no longer than one week. Any requests to inspect backup records should go through the agency director or his designee for processing. Retention of Public Records Created as 5. Types of . , like word processing, is a medium, not a record type. The records are the various documents that are created, sent, and received through the e- mail system. Records in the system should remain in that application for only a short time. documents can be non-records, time limited records, permanent/archival records, or confidential records. 6. Non-record . Non-record messages are created primarily for the communication of information which does not set policy, establish guidelines or procedures, certify a transaction, or become a receipt, and that have no enduring value. Since this type of message is informal, it could be compared to, but not limited to, personal messages, duplicate documents, telephone call notices, scheduled meetings reminders, or other temporary information. This type of message is short lived and should be deleted as soon as its purpose has been completed. 7. Time limited records created as . Time limited records are those which have a legal or administrative value, but are not permanent. records of this classification must be maintained in a usable format in accordance with the agency s retention policy. The forms in which these records are maintained may be hard copy printout, microfilm or may be electronically generated. Internal procedures and system design should protect against document alteration, identify other records related to the same subject, and provide for regular, scheduled disposition. Should a file be identified as a time limited record but not listed in the retention schedule, agencies should contact the

6 State Archives, Records Management Unit, phone for assistance in obtaining disposition authority. 8. Permanent records created as . Permanent/Archival records are those records having legal, administrative or historical value which must be retained indefinitely. These records must be preserved in a medium that can be used by future generations. Since there are no national standards for permanency of the electronic medium on which is maintained and since that medium is not considered permanent, these electronic records are not considered acceptable for permanent record storage. It is recognized that there are constant changes in technology. If or when standards for permanence of become a reality, and the medium is judged permanent, this policy will be re-evaluated and appropriate changes will be made. records appraised as permanent must be converted to paper, microfilm, or another acceptable medium for permanent record retention. 9. Preservation of sender, recipient and date information. that is identified as a record must at a minimum contain the senders, recipients, and time/date of transmission or receipt. 10. Electronic calendar records. Although not directly an e- mail function, many e- mail software packages provide calendaring capabilities. Offices using the calendaring feature to document affected agency public hearings or regulatory meetings must retain calendar records for the period of time identified in the State of Wyoming General Schedules Executive Branch or as specified by a separate retention schedule. 11. Retention schedules. If a retention schedule needs to be developed, contact the State Archives, Records Management Unit, phone for assistance. 12. Retention of digital data. Public records may include digital data such as graphics files, digital photographs, sound or wave files and video clips. If appropriate, such digital data may need to be preserved or converted to hard copy for retention purposes.

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

EFFECTIVE DATE: JULY 1, 2010

EFFECTIVE DATE: JULY 1, 2010 Town of Florence POLICY TITLE: EMAIL RETENTION POLICY RESPONSIBLE DEPARTMENT: Town Clerk Office APPROVAL: EFFECTIVE DATE: JULY 1, 2010 AP / RESOLUTION NO.: 2010-02 REFERENCES: TOWN MANAGER SIGNATURE: TOWN

More information

Village of Hastings-on-Hudson Electronic Policy. Internal and External Email Policies and Procedures

Village of Hastings-on-Hudson Electronic Policy. Internal and External Email Policies and Procedures Village of Hastings-on-Hudson Electronic Policy Internal and External Email Policies and Procedures Effective February 2012 1 1. Table of Contents 1. General Policies... 3 1.1 Establishment and upkeep

More information

2.82.010 Government records findings--recognition of public policy.

2.82.010 Government records findings--recognition of public policy. Chapter 2.82 RECORDS MANAGEMENT 2.82.010 Government records findings--recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake County

More information

Chapter 2.82 - RECORDS MANAGEMENT Sections:

Chapter 2.82 - RECORDS MANAGEMENT Sections: Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake

More information

LOUISIANA COMMUNITY & TECHNICAL COLLEGE SYSTEM Policy # 7.005. Title: EMAIL USAGE POLICY

LOUISIANA COMMUNITY & TECHNICAL COLLEGE SYSTEM Policy # 7.005. Title: EMAIL USAGE POLICY LOUISIANA COMMUNITY & TECHNICAL COLLEGE SYSTEM Policy # 7.005 Title: EMAIL USAGE POLICY Authority: Board Action Original Adoption: 12/13/2006 Effective Date: 12/13/2006 Last Revision: N/A 1.0 Purpose The

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS

POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS 1. Purpose Establish and clarify a records management policy for municipal officers with respect

More information

FARMINGTON PUBLIC SCHOOLS 2410

FARMINGTON PUBLIC SCHOOLS 2410 FARMINGTON PUBLIC SCHOOLS 2410 Administration Retention of Electronic Records and Information I. POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the

More information

COLLINS CONSULTING, Inc.

COLLINS CONSULTING, Inc. COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

OLYMPIC COLLEGE POLICY

OLYMPIC COLLEGE POLICY TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,

More information

Guidelines. Managing E-mail Records. Office of the Secretary of State. Approved and Recommended by the State Records Commission February 22, 2001

Guidelines. Managing E-mail Records. Office of the Secretary of State. Approved and Recommended by the State Records Commission February 22, 2001 Guidelines Managing E-mail Records Approved and Recommended by the State Records Commission February 22, 2001 Office of the Secretary of State Introduction Most everyone would agree that e-mail has changed

More information

Appendix G District Email Policies and Procedures

Appendix G District Email Policies and Procedures Appendix G District Email Policies and Procedures I. Introduction Email has become one of the most used communications tools in both homes and work places and is now an integral part of all Joshua ISD

More information

TOWN OF COTTESLOE POLICY EMAIL MANAGEMENT

TOWN OF COTTESLOE POLICY EMAIL MANAGEMENT EMAIL MANAGEMENT POLICY STATEMENT Town of Cottesloe email accounts are intended for business transactions in support of the Town s strategic goals and objectives. Accordingly any email transmission residing

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

COMPUTER USE POLICY City of Proctor

COMPUTER USE POLICY City of Proctor COMPUTER USE POLICY City of Proctor Purpose This policy serves to protect the security and integrity of the city s electronic communication and information systems by educating employees about appropriate

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the

More information

State of Montana E-Mail Guidelines

State of Montana E-Mail Guidelines State of Montana E-Mail Guidelines A Management Guide for the Retention of E-Mail Records for Montana State Government Published by the: Montana State Records Committee Helena, Montana September 2006 Based,

More information

Electronic Records Management Guidelines

Electronic Records Management Guidelines Electronic Records Management Guidelines I. Objectives The employees of the Fort Bend Independent School District (the District ) routinely create, use, and manage information electronically in their daily

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

How To Preserve Email Records In Mississippi

How To Preserve Email Records In Mississippi EMAIL MANAGEMENT GUIDELINES FOR COUNTIES AND MUNICIPALITIES 1. Purpose The purpose of these guidelines is to ensure that the electronic mail records of county and municipal government officials and employees

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology

More information

Rules of the Road for Users of Smithsonian Computers and Networks

Rules of the Road for Users of Smithsonian Computers and Networks Rules of the Road for Users of Smithsonian Computers and Networks Introduction Smithsonian systems, networks and other computer resources are shared among Smithsonian employees, interns, visiting scholars,

More information

Preservation and Production of Electronic Records

Preservation and Production of Electronic Records Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces

More information

Table of Contents. Chapter No. 1. Introduction 1. 2. Objective 1. 3. E-mail Use Compliance 1. 4. Definitions 2. 5. Roles and Responsibilities 2

Table of Contents. Chapter No. 1. Introduction 1. 2. Objective 1. 3. E-mail Use Compliance 1. 4. Definitions 2. 5. Roles and Responsibilities 2 Table of Contents Chapter Subject Page No. 1. Introduction 1 2. Objective 1 3. E-mail Use Compliance 1 4. Definitions 2 5. Roles and Responsibilities 2 6. Creation and Use of E-mails 3 7. Managing E-mails

More information

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network

More information

Arizona State Library, Archives and Public Records

Arizona State Library, Archives and Public Records Arizona State Library, Archives and Public Records RECORDS MANAGEMENT DIVISION 1919 West Jefferson Phoenix, Arizona 85009 (602) 542-3741 Managing Public Records Sent and Received Via Electronic Mail These

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic

More information

Executive Vice President of Finance and

Executive Vice President of Finance and Name of Policy: Policy Number: Electronic mail services policy. 3364-65-01 Approving Officer: Administration Executive Vice President of Finance and Responsible Agent: Vice President of Information Technology

More information

Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE

Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE I. Purpose This directive establishes Department of Homeland Security (DHS) policy

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

EMPLOYEE BEHAVIOR & EXPECTATIONS CITY OF PORTLAND HUMAN RESOURCES ADMINISTRATIVE RULES 4.08 INFORMATION TECHNOLOGIES

EMPLOYEE BEHAVIOR & EXPECTATIONS CITY OF PORTLAND HUMAN RESOURCES ADMINISTRATIVE RULES 4.08 INFORMATION TECHNOLOGIES CITY OF PORTLAND HUMAN RESOURCES ADMINISTRATIVE RULES EMPLOYEE BEHAVIOR & EXPECTATIONS Purpose The City of Portland provides information technologies to its employees to use in the course of doing their

More information

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems. VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0

More information

APHIS ELECTRONIC MAIL USE, SECURITY, AND PRIVACY POLICY

APHIS ELECTRONIC MAIL USE, SECURITY, AND PRIVACY POLICY United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.2 2/28/2013 APHIS ELECTRONIC MAIL USE, SECURITY, AND PRIVACY POLICY

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

Town of Brunswick. Computer Use Policy

Town of Brunswick. Computer Use Policy Town of Brunswick Computer Use Policy Town of Brunswick Computer Use Policy Table of Contents 1. General 1 2. Access 1 3. Acceptable Use 1 4. E-Mail 1 5. E-Mail Attachments 2 6. Internet & Websites 2 7.

More information

All Users of DCRI Computing Equipment and Network Resources

All Users of DCRI Computing Equipment and Network Resources July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform

More information

Commonwealth Office of Technology

Commonwealth Office of Technology Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline

More information

Electronic Records Management Guidelines

Electronic Records Management Guidelines Electronic Records Management Guidelines Contents Section 1: Authority... 1 Section 2: Purpose and Scope... 1 Section 3: Records Custodian Responsibilities... 2 Section 4: Information Systems that produce,

More information

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,

More information

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT

More information

Board of County Commissioners Leon County, Florida

Board of County Commissioners Leon County, Florida 10.03 Board of County Commissioners Leon County, Florida Title: Public Records Law, E-mail, Social Media/Networking, and Archiving Date Adopted: April 12, 2011 Effective Date: April 12, 2011 Reference:

More information

UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY

UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY DOC. T99-061 Passed by the BoT 8/4/99 UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY The President of the University shall adopt guidelines to require that each campus

More information

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing

More information

TITLE: SCCD ELECTRONIC INFORMATION RESOURCES

TITLE: SCCD ELECTRONIC INFORMATION RESOURCES SEATTLE COMMUNITY COLLEGE DISTRICT PROCEDURE NUMBER: 259.10-40 TITLE: SCCD ELECTRONIC INFORMATION RESOURCES 259.10 Definitions: 259.10.01 Electronic Information Resources (EIRs). All electronic hardware,

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

Policy for the Acceptable Use of Information Technology Resources

Policy for the Acceptable Use of Information Technology Resources Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...

More information

City of Prescott Data Integrity Policy

City of Prescott Data Integrity Policy City of Prescott Data Integrity Policy Table of Contents Document History... 1 General Archive System Design... 1 Data Archiving Guidelines... 2 Archive Server Design... 2

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention

State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy

More information

CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION

CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION AP 3723 ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION 1.0 Purpose Citrus Community College District electronic mail (email) services support the

More information

Ethical and Responsible Use of EagleNet 03/26/14 AMW

Ethical and Responsible Use of EagleNet 03/26/14 AMW Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of

More information

Administrative Procedure 3720 Computer and Network Use

Administrative Procedure 3720 Computer and Network Use Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

Union County. Electronic Records and Document Imaging Policy

Union County. Electronic Records and Document Imaging Policy Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability

More information

------------------- COMPUTER NETWORK AGREEMENT FORM

------------------- COMPUTER NETWORK AGREEMENT FORM COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.

More information

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014 Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology

More information

39C-1 Records Management Program 39C-3

39C-1 Records Management Program 39C-3 39C-1 Records Management Program 39C-3 Sec. 39C-1. Sec. 39C-2. Sec. 39C-3. Sec. 39C-4. Sec. 39C-5. Sec. 39C-6. Sec. 39C-7. Sec. 39C-8. Sec. 39C-9. Sec. 39C-10. Sec. 39C-11. Sec. 39C-12. Sec. 39C-13. Sec.

More information

COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)

COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) The Middletown City School District provides an electronic communications network that allows District-authorized individuals internal access

More information

Policy Description: Use of Internet, Email, and Other IT Resources Policy Policy No: ODT IT 001. Pages: 9 Pages

Policy Description: Use of Internet, Email, and Other IT Resources Policy Policy No: ODT IT 001. Pages: 9 Pages Policy Description: Use of Internet, Email, and Other IT Resources Policy Policy No: ODT IT 001 Authorities: Ohio IT Policy ITP E.8 ODT HR - 011 ODT HR 015 IRS Publication 1075 Divisions With Primary Responsibility:

More information

Sample Policies for Internet Use, Email and Computer Screensavers

Sample Policies for Internet Use, Email and Computer Screensavers Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies

More information

1. Each employee is responsible for managing college records in a responsible and professional manner.

1. Each employee is responsible for managing college records in a responsible and professional manner. Policy O-6.2 Approved By: College Executive Team Approval Date: February 26, 2003 Amendment Date: November 25, 2009 Policy Holder: VP Administration & CFO Purpose / Rationale RECORD MANAGEMENT The purpose

More information

Valdosta State University. Information Resources Acceptable Use Policy

Valdosta State University. Information Resources Acceptable Use Policy Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE

More information

E-MAIL RETENTION BEST PRACTICE. Issue Date: April 20, 2011. Intent and Purpose:

E-MAIL RETENTION BEST PRACTICE. Issue Date: April 20, 2011. Intent and Purpose: E-MAIL RETENTION BEST PRACTICE Issue Date: April 20, 2011 Intent and Purpose: The intent of this best practice is for county officials to have an educational mechanism to explain requirements for maintaining

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Network Usage Guidelines Contents

Network Usage Guidelines Contents Network Usage Guidelines Contents Network Usage...2 Peer to Peer and File Sharing...2 Servers or Server Technologies...2 Routers...2 Wireless...2 Network Storage...2 Security and Privacy...3 Security...3

More information

Practice Resource. Sample internet and email use policy. Foreword. Policy scope. By David J. Bilinsky 1

Practice Resource. Sample internet and email use policy. Foreword. Policy scope. By David J. Bilinsky 1 Practice Resource Sample internet and email use policy By David J. Bilinsky 1 Foreword Use of email and the Internet can result in a huge productivity increase for a law practice. Through email, lawyers

More information

State of Michigan Records Management Services. Guide to E mail Storage Options

State of Michigan Records Management Services. Guide to E mail Storage Options State of Michigan Records Management Services Guide to E mail Storage Options E mail is a fast, efficient and cost effective means for communicating and sharing information. However, e mail software is

More information

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information

More information

section 15 Computers, Email, Internet, and Communications

section 15 Computers, Email, Internet, and Communications section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property

More information

ANTRIM COUNTY COMPUTER, NETWORK SYSTEM AND INTERNET USE POLICY

ANTRIM COUNTY COMPUTER, NETWORK SYSTEM AND INTERNET USE POLICY ANTRIM COUNTY COMPUTER, NETWORK SYSTEM AND INTERNET USE POLICY Amended July 9, 2009 This policy describes Antrim County's guidelines and rules with regard to the use of cell phones, computers, network

More information

Instruction. Neoga Community Unit School District #3 Page 1 of 5

Instruction. Neoga Community Unit School District #3 Page 1 of 5 Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each

More information

State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009

State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009 State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN January 2010 December 2012 DECEMBER 31, 2009 Florida Department of State State Library and Archives of Florida 850.245.6750 http://dlis.dos.state.fl.us/recordsmanagers

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Email Policy For Staff and Students

Email Policy For Staff and Students Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management

More information

ACCESS, PRODUCTION AND RETENTION OF CITY RECORDS

ACCESS, PRODUCTION AND RETENTION OF CITY RECORDS 1.05-3 1 of 6 I. PURPOSE This directive prescribes the rules regarding access, production, and retention of City records. II. POLICY A. All records and other matters in City offices are presumed to be

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

Applicability: All Employees Effective Date: December 6, 2005; revised January 27, 2009 Source(s):

Applicability: All Employees Effective Date: December 6, 2005; revised January 27, 2009 Source(s): Title: Category: Administration Information Management Policy No.: B5010 Replaces: B5010 Applicability: All Employees Effective Date: December 6, 2005; revised January 27, 2009 Source(s): Approval: (President

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

Prosecuting Attorneys Council of Georgia

Prosecuting Attorneys Council of Georgia 1. Purpose: This policy is intended to help personnel determine what information sent or received by email should be retained and for how long. The information covered in this policy includes, but is not

More information

Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources

Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources Southern Law Center Law Center Policy #IT0014 Title: Privacy Expectations for SULC Computing Resources Authority: Department Original Adoption: 5/7/2007 Effective Date: 5/7/2007 Last Revision: 9/17/2012

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of

More information

Data Compliance. And. Your Obligations

Data Compliance. And. Your Obligations Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection

More information

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY Effective August 24, 2004 Overview: The Fresno County Employees Retirement Association (FCERA) provides access to the Internet

More information

CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006)

CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006) CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006) WHAT IS THE PURPOSE OF RECORDS MANAGEMENT? 1. To implement a cost-effective Department-wide program that provides for adequate and proper documentation

More information

Riverside Community College District Policy No. 3720 General Institution

Riverside Community College District Policy No. 3720 General Institution Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall

More information