STATE OF WYOMING Electronic Mail Policy
|
|
- Baldwin Smith
- 8 years ago
- Views:
Transcription
1 Introduction: STATE OF WYOMING Electronic Mail Policy Pursuant to Executive Order dated the 23rd of December, 1999 Electronic mail ( ) enables the user to send and receive messages, make appointments, or coordinate work schedules rapidly and efficiently. The advantages of e- mail have caused a rapid growth in the use of this technology. With the rapid expansion of throughout Wyoming State agencies, more data are being transmitted between employees without the use of traditional paper documents. This trend increases the possibility of State records being lost before completing their retention cycle, and the messages being subpoenaed for use in litigation. Records contained within the system need to be identified and controlled in the same manner as any other record. This policy shall apply to all State of Wyoming employees whether full-time, part-time, or contract as well as all individuals contracted to perform work for the State. Each agency may develop its own policy provided that, at a minimum, all provisions set forth in this policy are contained in its policy. In such a case, the agency s policy shall take precedence over this policy. Users are cautioned that the use of and attachments thereto may create the need to preserve other forms of data, such as graphics files, digital photographs, sound or wave files and video clips. When using these data forms in conjunction with the system, please consult your agency s policies or computer specialist for advice on the use and preservation of such data. Public records, including those created in , are the property of the State of Wyoming. W.S defines public records for the purposes of those records available for public inspection. W.S defines public records for purposes of management of public records by the Department of State Parks and Cultural Resources. General Notice: A. Electronic mail is an electronic file which is transmitted to other computer users. When transmitted to a recipient, electronic mail may create the sender's electronic file in the recipient's computer system. Deleting electronic mail does not ensure erasure of all copies of the file. Copies of deleted files may be stored remotely for long periods of time, and can be accessed and disclosed. Therefore, employees should not expect their electronic communications to be private, and should not use electronic mail for communications not intended for disclosure to third parties. Although the contents of business-related electronic mail are subject to the same rules of legal privilege as other forms of communication and recordkeeping, employees should treat the electronic mail system as a shared file
2 system, with the expectation that messages sent, received or stored in the system (including individual hard disks) may be subject to access, monitoring and disclosure. Employees should be aware that documents created and sent by electronic mail for official business or as evidence of official acts may constitute official records of the State. B. Nothing in this policy should be construed to waive any claim of privilege or confidentiality for the contents of electronic mail available to the State or to require public disclosure of electronic communications. Definitions: Record: Public records under Wyo. Stat (a)(v) includes... the original and all copies of any paper, correspondence, form, book, photograph, photostat, film, microfilm, sound recording, map, drawing or other document, regardless of physical form or characteristics, that have been made by the State of Wyoming... and by any agencies of the State... or received by them in connection with the transaction of public business, except those privileged or confidential by law. Wyo. Stat also defines public records for purposes of management of public records by the Department of State Parks and Cultural Resources. The definitions are essentially similar, except that W.S does not exclude information privileged or confidential by law. Thus, the Department of State Parks and Cultural Resources may store confidential or privileged information. The Department, however, does not make these confidential documents available to the public. See W.S System: A program designed to create, send, receive, and store messages and other data transmitted electronically between individual users and/or groups of users. File transfer programs are not included in this definition is the electronic transmission of messages and documents. A message may be transmitted within an agency, between agencies of the State or to a destination outside the state system. An message could be a short note or announcement or longer, more formal writing and may include various attachments. An attachment is added electronic data, such as a word processing file, not contained in the main body of the document. General Considerations for Use of 1. Messaging system not a storage system. The State s system is designed for communication by written message. It is not and should not be used as a document storage or management system. 2. Official Business. The State s systems are for official business. All messages sent or received on the system are the property of the State of Wyoming. 3. Expectation of Privacy. Employees should not expect messages in their basic form to be private. is not immune from unauthorized interception, therefore agencies should consider encryption of sensitive information or consider alternative means of communication. Because materials and communications
3 privileged or confidential by law are not included within the definition of public records set out in the Public Records Act (W.S through ), each agency must have a plan for separating out confidential material sent by , or have a policy that confidential materials and communications will not be sent through this medium. Users should never place any data on the system that they would not want to appear on television or in newspapers. 4. Account. accounts, and the messages contained within these accounts, are important to the business functions of an individual State agency. As such, the messages and accounts are the property of the State of Wyoming and will be managed by individual agencies. In the event of any employee termination or interagency transfer, the employee s account shall remain with the originating agency. All messages may be reviewed and redirected to the employee s successor or otherwise purged of agency-specific content as appropriate. 5. Improper uses. The use of the system to transmit data which is disparaging or harassing to individuals or groups will not be tolerated. Types of data include: writings, drawings or any other form that is degrading or harassing to others based on, but not limited to, race, age, origin, sex, disability, religion or political beliefs, including jokes. may not be used for personal commercial ventures, religious or political causes, endorsement of candidates, or outside organizations. 6. Security. To ensure system integrity and security, each individual must protect his system password from disclosure to others. Passwords should be changed frequently. It is suggested that passwords be constructed of alphanumeric characters that are not recognizable words or patterns. 7. Copies and dissemination. can be copied and forwarded to numerous individuals. Copies of an may be retained by persons unknown to the author long after the intended function has been completed. Both recipients and transmitters need to protect data sent on the system from unauthorized alteration and deletion. 8. Copyright violations. The ability of various systems to include attachments enables the users to forward additional data to other users. The ease of transmitting attachments places the burden of protecting copyrighted material on the transmitter. Protection of copyrights requires the user to make, to the greatest degree possible, a determination of authorship of any data utilized. All copyright laws apply equally to systems. Crimes against intellectual property in Wyoming are defined by W.S Etiquette. Use of etiquette should be observed at all times. Employees represent the State of Wyoming and should act in a professional manner at all times. 10. Viruses and . Simply reading a text based can spread a virus to your computer. This is a relatively new development. Viruses can also be hidden in attachments to mail messages. There is risk from opening attached files to the e- mail message, especially executable files. In addition, other types of file attachments can pose a risk, such as MS-Word documents, Excel spreadsheets, and similar files used by applications that use macros, because these files can be infected with a macro virus. If you receive any unsolicited from unknown
4 sources or untrusted documents or executable programs via an attachment, the file should be saved to the local hard drive and scanned with an anti-virus scanning product (with the latest virus signatures or definitions installed) before the file is opened or run. The MIS person should be contacted for assistance. Be aware that this is not an absolute guarantee that the contents of the file are safe, but it will check for any viruses or malicious code that the scanning software can detect. If there is any doubt (especially if the was sent from an unknown source), deleting unsolicited messages with all attached files is the safest thing to do. Users are requested not to spread unconfirmed warnings about viruses. If you receive an unvalidated warning, do not pass it to others; pass it to your systems administrator to validate first. Access to State System: Employees only. Employees of the State are granted access to the system to carry out their assigned duties. System privileges to non-employees shall be granted only with approval of the agency director or his designee. Access to the e- mail system may be terminated at any time if it has been determined access is no longer needed or there has been abuse of the system. If an agency s policies include retention of electronic records, information contained in an system must remain accessible for reference, as required by the retention guidelines in those policies. To remain accessible, the electronic data must be migrated to new software and storage media as updates occur. Disclosure of All that resides on the message server, on any file server, or on any individual's workstation belongs to the State of Wyoming. The State reserves the right to inspect e- mail at any time. Inspection of is limited to the following entities: State/Agency: Immediate supervisor, division management, agency director, Attorney General, including the Department of Criminal Investigation, or as otherwise statutorily authorized. The Attorney General s access to records of the Public Defender s Office may be subject to common law or statutory privilege. Non-State: Anyone with proper judicial approval Anyone requesting to see certain public records pursuant to the Public Records Act
5 1. Litigation and discovery of public records. Any public record (under the definition of public record in W.S , which specifically excludes information privileged or confidential by law) is subject to discovery requests as part of a legal proceeding. Some confidential data might also be subject to discovery, usually with a court order. Discovery can include all data in , including all archived that may pertain to the particular court case. Therefore, it is incumbent upon system users to manage their data in accordance with an approved record retention schedule. Users should purge from the system as soon as its purpose has been served. It is also incumbent upon system users, if confidential communications or information is sent by , to have a system for separating confidential or privileged information from public information. 2. Inspection of public records. Any person may inspect public records at reasonable times subject to any regulation, rule, or exception contained in or allowed by W.S through and W.S If you have questions regarding the inspection of records, contact your Assistant Attorney General. 3. Requests for . Requests to inspect documents should be referred to the agency director. The agency director or his designee should determine, with consultation of the Attorney General s Office if appropriate, if inspection is appropriate and how best to fulfill the inspection request. 4. One week backup only. Each agency may establish its own backup policy, but it is recommended that backup of systems should be for disaster recovery and should be retained no longer than one week. Any requests to inspect backup records should go through the agency director or his designee for processing. Retention of Public Records Created as 5. Types of . , like word processing, is a medium, not a record type. The records are the various documents that are created, sent, and received through the e- mail system. Records in the system should remain in that application for only a short time. documents can be non-records, time limited records, permanent/archival records, or confidential records. 6. Non-record . Non-record messages are created primarily for the communication of information which does not set policy, establish guidelines or procedures, certify a transaction, or become a receipt, and that have no enduring value. Since this type of message is informal, it could be compared to, but not limited to, personal messages, duplicate documents, telephone call notices, scheduled meetings reminders, or other temporary information. This type of message is short lived and should be deleted as soon as its purpose has been completed. 7. Time limited records created as . Time limited records are those which have a legal or administrative value, but are not permanent. records of this classification must be maintained in a usable format in accordance with the agency s retention policy. The forms in which these records are maintained may be hard copy printout, microfilm or may be electronically generated. Internal procedures and system design should protect against document alteration, identify other records related to the same subject, and provide for regular, scheduled disposition. Should a file be identified as a time limited record but not listed in the retention schedule, agencies should contact the
6 State Archives, Records Management Unit, phone for assistance in obtaining disposition authority. 8. Permanent records created as . Permanent/Archival records are those records having legal, administrative or historical value which must be retained indefinitely. These records must be preserved in a medium that can be used by future generations. Since there are no national standards for permanency of the electronic medium on which is maintained and since that medium is not considered permanent, these electronic records are not considered acceptable for permanent record storage. It is recognized that there are constant changes in technology. If or when standards for permanence of become a reality, and the medium is judged permanent, this policy will be re-evaluated and appropriate changes will be made. records appraised as permanent must be converted to paper, microfilm, or another acceptable medium for permanent record retention. 9. Preservation of sender, recipient and date information. that is identified as a record must at a minimum contain the senders, recipients, and time/date of transmission or receipt. 10. Electronic calendar records. Although not directly an e- mail function, many e- mail software packages provide calendaring capabilities. Offices using the calendaring feature to document affected agency public hearings or regulatory meetings must retain calendar records for the period of time identified in the State of Wyoming General Schedules Executive Branch or as specified by a separate retention schedule. 11. Retention schedules. If a retention schedule needs to be developed, contact the State Archives, Records Management Unit, phone for assistance. 12. Retention of digital data. Public records may include digital data such as graphics files, digital photographs, sound or wave files and video clips. If appropriate, such digital data may need to be preserved or converted to hard copy for retention purposes.
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
More informationEFFECTIVE DATE: JULY 1, 2010
Town of Florence POLICY TITLE: EMAIL RETENTION POLICY RESPONSIBLE DEPARTMENT: Town Clerk Office APPROVAL: EFFECTIVE DATE: JULY 1, 2010 AP / RESOLUTION NO.: 2010-02 REFERENCES: TOWN MANAGER SIGNATURE: TOWN
More informationVillage of Hastings-on-Hudson Electronic Policy. Internal and External Email Policies and Procedures
Village of Hastings-on-Hudson Electronic Policy Internal and External Email Policies and Procedures Effective February 2012 1 1. Table of Contents 1. General Policies... 3 1.1 Establishment and upkeep
More information2.82.010 Government records findings--recognition of public policy.
Chapter 2.82 RECORDS MANAGEMENT 2.82.010 Government records findings--recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake County
More informationChapter 2.82 - RECORDS MANAGEMENT Sections:
Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake
More informationLOUISIANA COMMUNITY & TECHNICAL COLLEGE SYSTEM Policy # 7.005. Title: EMAIL USAGE POLICY
LOUISIANA COMMUNITY & TECHNICAL COLLEGE SYSTEM Policy # 7.005 Title: EMAIL USAGE POLICY Authority: Board Action Original Adoption: 12/13/2006 Effective Date: 12/13/2006 Last Revision: N/A 1.0 Purpose The
More informationMARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
More informationPOLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS
POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS 1. Purpose Establish and clarify a records management policy for municipal officers with respect
More informationFARMINGTON PUBLIC SCHOOLS 2410
FARMINGTON PUBLIC SCHOOLS 2410 Administration Retention of Electronic Records and Information I. POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the
More informationCOLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
More informationResponsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
More informationOLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
More informationGuidelines. Managing E-mail Records. Office of the Secretary of State. Approved and Recommended by the State Records Commission February 22, 2001
Guidelines Managing E-mail Records Approved and Recommended by the State Records Commission February 22, 2001 Office of the Secretary of State Introduction Most everyone would agree that e-mail has changed
More informationAppendix G District Email Policies and Procedures
Appendix G District Email Policies and Procedures I. Introduction Email has become one of the most used communications tools in both homes and work places and is now an integral part of all Joshua ISD
More informationTOWN OF COTTESLOE POLICY EMAIL MANAGEMENT
EMAIL MANAGEMENT POLICY STATEMENT Town of Cottesloe email accounts are intended for business transactions in support of the Town s strategic goals and objectives. Accordingly any email transmission residing
More informationCity of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
More informationCOMPUTER USE POLICY City of Proctor
COMPUTER USE POLICY City of Proctor Purpose This policy serves to protect the security and integrity of the city s electronic communication and information systems by educating employees about appropriate
More informationLINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
More informationELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
More informationState of Montana E-Mail Guidelines
State of Montana E-Mail Guidelines A Management Guide for the Retention of E-Mail Records for Montana State Government Published by the: Montana State Records Committee Helena, Montana September 2006 Based,
More informationElectronic Records Management Guidelines
Electronic Records Management Guidelines I. Objectives The employees of the Fort Bend Independent School District (the District ) routinely create, use, and manage information electronically in their daily
More informationUSE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
More informationHow To Preserve Email Records In Mississippi
EMAIL MANAGEMENT GUIDELINES FOR COUNTIES AND MUNICIPALITIES 1. Purpose The purpose of these guidelines is to ensure that the electronic mail records of county and municipal government officials and employees
More informationPierce County Policy on Computer Use and Information Systems
Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail
More informationLa Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy
LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology
More informationRules of the Road for Users of Smithsonian Computers and Networks
Rules of the Road for Users of Smithsonian Computers and Networks Introduction Smithsonian systems, networks and other computer resources are shared among Smithsonian employees, interns, visiting scholars,
More informationPreservation and Production of Electronic Records
Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces
More informationTable of Contents. Chapter No. 1. Introduction 1. 2. Objective 1. 3. E-mail Use Compliance 1. 4. Definitions 2. 5. Roles and Responsibilities 2
Table of Contents Chapter Subject Page No. 1. Introduction 1 2. Objective 1 3. E-mail Use Compliance 1 4. Definitions 2 5. Roles and Responsibilities 2 6. Creation and Use of E-mails 3 7. Managing E-mails
More informationGUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
More informationArizona State Library, Archives and Public Records
Arizona State Library, Archives and Public Records RECORDS MANAGEMENT DIVISION 1919 West Jefferson Phoenix, Arizona 85009 (602) 542-3741 Managing Public Records Sent and Received Via Electronic Mail These
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More informationTAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
More informationExecutive Vice President of Finance and
Name of Policy: Policy Number: Electronic mail services policy. 3364-65-01 Approving Officer: Administration Executive Vice President of Finance and Responsible Agent: Vice President of Information Technology
More informationDepartment of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE
Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE I. Purpose This directive establishes Department of Homeland Security (DHS) policy
More informationInformation Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
More informationEMPLOYEE BEHAVIOR & EXPECTATIONS CITY OF PORTLAND HUMAN RESOURCES ADMINISTRATIVE RULES 4.08 INFORMATION TECHNOLOGIES
CITY OF PORTLAND HUMAN RESOURCES ADMINISTRATIVE RULES EMPLOYEE BEHAVIOR & EXPECTATIONS Purpose The City of Portland provides information technologies to its employees to use in the course of doing their
More informationVICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
More informationAPHIS ELECTRONIC MAIL USE, SECURITY, AND PRIVACY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.2 2/28/2013 APHIS ELECTRONIC MAIL USE, SECURITY, AND PRIVACY POLICY
More informationMEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
More informationTown of Brunswick. Computer Use Policy
Town of Brunswick Computer Use Policy Town of Brunswick Computer Use Policy Table of Contents 1. General 1 2. Access 1 3. Acceptable Use 1 4. E-Mail 1 5. E-Mail Attachments 2 6. Internet & Websites 2 7.
More informationAll Users of DCRI Computing Equipment and Network Resources
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
More informationCommonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
More informationElectronic Records Management Guidelines
Electronic Records Management Guidelines Contents Section 1: Authority... 1 Section 2: Purpose and Scope... 1 Section 3: Records Custodian Responsibilities... 2 Section 4: Information Systems that produce,
More informationCOUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9
ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,
More informationELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
More informationBoard of County Commissioners Leon County, Florida
10.03 Board of County Commissioners Leon County, Florida Title: Public Records Law, E-mail, Social Media/Networking, and Archiving Date Adopted: April 12, 2011 Effective Date: April 12, 2011 Reference:
More informationUNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY
DOC. T99-061 Passed by the BoT 8/4/99 UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY The President of the University shall adopt guidelines to require that each campus
More informationSUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
More informationTITLE: SCCD ELECTRONIC INFORMATION RESOURCES
SEATTLE COMMUNITY COLLEGE DISTRICT PROCEDURE NUMBER: 259.10-40 TITLE: SCCD ELECTRONIC INFORMATION RESOURCES 259.10 Definitions: 259.10.01 Electronic Information Resources (EIRs). All electronic hardware,
More informationAPPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES
APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,
More informationDelaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
More informationAcceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
More information13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
More informationPolicy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
More informationCity of Prescott Data Integrity Policy
City of Prescott Data Integrity Policy Table of Contents Document History... 1 General Archive System Design... 1 Data Archiving Guidelines... 2 Archive Server Design... 2
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationState of Michigan Records Management Services. Frequently Asked Questions About E mail Retention
State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other
More informationMISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
More informationACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
More informationPolicy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
More informationCITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION
CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION AP 3723 ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION 1.0 Purpose Citrus Community College District electronic mail (email) services support the
More informationEthical and Responsible Use of EagleNet 03/26/14 AMW
Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of
More informationAdministrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
More informationAcceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
More informationUnion County. Electronic Records and Document Imaging Policy
Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability
More information------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
More informationComputer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
More informationThe Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
More informationTenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014
Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology
More information39C-1 Records Management Program 39C-3
39C-1 Records Management Program 39C-3 Sec. 39C-1. Sec. 39C-2. Sec. 39C-3. Sec. 39C-4. Sec. 39C-5. Sec. 39C-6. Sec. 39C-7. Sec. 39C-8. Sec. 39C-9. Sec. 39C-10. Sec. 39C-11. Sec. 39C-12. Sec. 39C-13. Sec.
More informationCOMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) The Middletown City School District provides an electronic communications network that allows District-authorized individuals internal access
More informationPolicy Description: Use of Internet, Email, and Other IT Resources Policy Policy No: ODT IT 001. Pages: 9 Pages
Policy Description: Use of Internet, Email, and Other IT Resources Policy Policy No: ODT IT 001 Authorities: Ohio IT Policy ITP E.8 ODT HR - 011 ODT HR 015 IRS Publication 1075 Divisions With Primary Responsibility:
More informationSample Policies for Internet Use, Email and Computer Screensavers
Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies
More information1. Each employee is responsible for managing college records in a responsible and professional manner.
Policy O-6.2 Approved By: College Executive Team Approval Date: February 26, 2003 Amendment Date: November 25, 2009 Policy Holder: VP Administration & CFO Purpose / Rationale RECORD MANAGEMENT The purpose
More informationValdosta State University. Information Resources Acceptable Use Policy
Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE
More informationE-MAIL RETENTION BEST PRACTICE. Issue Date: April 20, 2011. Intent and Purpose:
E-MAIL RETENTION BEST PRACTICE Issue Date: April 20, 2011 Intent and Purpose: The intent of this best practice is for county officials to have an educational mechanism to explain requirements for maintaining
More informationHuman Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More informationNetwork Usage Guidelines Contents
Network Usage Guidelines Contents Network Usage...2 Peer to Peer and File Sharing...2 Servers or Server Technologies...2 Routers...2 Wireless...2 Network Storage...2 Security and Privacy...3 Security...3
More informationPractice Resource. Sample internet and email use policy. Foreword. Policy scope. By David J. Bilinsky 1
Practice Resource Sample internet and email use policy By David J. Bilinsky 1 Foreword Use of email and the Internet can result in a huge productivity increase for a law practice. Through email, lawyers
More informationState of Michigan Records Management Services. Guide to E mail Storage Options
State of Michigan Records Management Services Guide to E mail Storage Options E mail is a fast, efficient and cost effective means for communicating and sharing information. However, e mail software is
More informationINFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
More informationsection 15 Computers, Email, Internet, and Communications
section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property
More informationANTRIM COUNTY COMPUTER, NETWORK SYSTEM AND INTERNET USE POLICY
ANTRIM COUNTY COMPUTER, NETWORK SYSTEM AND INTERNET USE POLICY Amended July 9, 2009 This policy describes Antrim County's guidelines and rules with regard to the use of cell phones, computers, network
More informationInstruction. Neoga Community Unit School District #3 Page 1 of 5
Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each
More informationState of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009
State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN January 2010 December 2012 DECEMBER 31, 2009 Florida Department of State State Library and Archives of Florida 850.245.6750 http://dlis.dos.state.fl.us/recordsmanagers
More informationTechnology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
More informationEmail Policy For Staff and Students
Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management
More informationACCESS, PRODUCTION AND RETENTION OF CITY RECORDS
1.05-3 1 of 6 I. PURPOSE This directive prescribes the rules regarding access, production, and retention of City records. II. POLICY A. All records and other matters in City offices are presumed to be
More informationB. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
More informationApplicability: All Employees Effective Date: December 6, 2005; revised January 27, 2009 Source(s):
Title: Category: Administration Information Management Policy No.: B5010 Replaces: B5010 Applicability: All Employees Effective Date: December 6, 2005; revised January 27, 2009 Source(s): Approval: (President
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationProsecuting Attorneys Council of Georgia
1. Purpose: This policy is intended to help personnel determine what information sent or received by email should be retained and for how long. The information covered in this policy includes, but is not
More informationSouthern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources
Southern Law Center Law Center Policy #IT0014 Title: Privacy Expectations for SULC Computing Resources Authority: Department Original Adoption: 5/7/2007 Effective Date: 5/7/2007 Last Revision: 9/17/2012
More informationResponsible Use of Technology and Information Resources
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
More informationE-SAFETY POLICY 2014/15 Including:
E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable
More informationGENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of
More informationData Compliance. And. Your Obligations
Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection
More informationFRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY
FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY Effective August 24, 2004 Overview: The Fresno County Employees Retirement Association (FCERA) provides access to the Internet
More informationCHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006)
CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006) WHAT IS THE PURPOSE OF RECORDS MANAGEMENT? 1. To implement a cost-effective Department-wide program that provides for adequate and proper documentation
More informationRiverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
More information