AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY " POLICY" Executive Director (AK) [J50]

Size: px
Start display at page:

Download "AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Executive Director (AK) [J50]"

Transcription

1 AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY " POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1 To consider a recommendation from the Standards Committee that the Council's ' Policy' should be reviewed and ensure that this includes clear retention rules for Members and Officers (both s received and sent). 1.2 The recommendation was made by the Standards Committee after consideration of the report from the Standards Board Ethical Standards Officer Report - SBE M. 2.0 RECOMMENDATION 2.1 It is recommended that the Executive Director (AK) is instructed to review the Council's existing policy and that the revised policy is submitted to this Committee for adoption having gone through the Council's agreed consultation processes. 3.0 BACKGROUND 3.1 The Council's ' and the Internet, Good Practice and Acceptable Usage Guide' (Appendix 1) was last revised in September The Council has recently established document retention guidelines for any documents scanned into the Council's Document Management System (DMS). Similar retention guidelines need to be established for s (sent and received). 4.0 OPTIONS 4.1 The Committee may accept, reject, or amend the recommendation. 5.0 ARGUMENTS/CONCLUSIONS 5.1 The Council has embarked on establishing retention timescales for documents scanned into the Council's corporate scanning system. Agenda Item 14 - page 1 commlive/p&r/ Rec Standards Cttee Mtg Policy

2 5.2 It has always been envisaged that this should be extended to include the establishment of retention periods for s and appropriate storage solutions. 5.3 This fits into the Council's overall aim of having a Corporate Document Retention Policy covering both electronic and paper (hard copy) documents. 5.4 The Council's existing policy document " and the Internet, Good Practice and Acceptable Usage Guide" was due to be reviewed in September With the agreement of this Committee, the review can be brought forward to respond to the recommendation of the Standards Committee. 5.6 The proposed revisions to the policy will need to go through the Council's agreed consultation processes (ie. the Joint Consultative Committee). 6.0 FINANCIAL IMPLICATIONS 6.1 Any financial implications (potentially the need to increase the Council's electronic storage capacity) will be ascertained as part of the review. 7.0 APPENDICES 7.1 Appendix 1 - ' and the Internet, Good Practice and Acceptable Usage Guide - September 2007' Background Documents Standards Committee Minute No. 51 of meeting 22 nd April reconvened 12 th May 2009 Location Room 119 The Grange, Ely Contact Officer Andrew Killington Executive Director (01353) andrew.killington@eastcambs.gov.uk Agenda Item 14 - page 2 commlive/p&r/ Rec Standards Cttee Mtg Policy

3 APPENDIX 1 EAST CAMBRIDGESHIRE DISTRICT COUNCIL AND THE INTERNET POLICY, GOOD PRACTICE AND ACCEPTABLE USAGE GUIDE SEPTEMBER 2007

4 AND THE INTERNET POLICY, GOOD PRACTICE AND ACCEPTABLE USAGE GUIDE SEPTEMBER 2007 (REVISED) CONTENTS PAGE INTRODUCTION 2 OVERALL APPROACH 2 WHY HAVE A POLICY? 2 ADVANTAGES OF ELECTRONIC COMMUNICATIONS 3 CHALLENGES OF ELECTRONIC COMMUNICATIONS 3 RESPONSIBILITIES OF USERS 3-8 Inappropriate Use Use of Disclaimer Care Data Protection Freedom of Information Act 2000 Security System/Desktop Management Usage and Style Confidentiality Receipt of Unsolicited/Unwanted Dealing with in your absence The Internet Downloading Software and Files From the Internet RESPONSIBILITIES OF THE COUNCIL 9 Relationship with the Council's Disciplinary Policy and Procedure 9 1

5 INTRODUCTION The Council has developed extensive internal and external facilities and Internet access through the Council s Internet Service Producer (Cambridgeshire County Council, the Cambridgeshire Community Network). This is a key part of the Council s ICT/e-Government strategy to ensure that Council Members and staff have the tools at their disposal to work as effectively as possible. Access to information technology has been acknowledged by Members and Management Team as a key priority to enable Members and staff to carry out their duties more effectively. Members and staff should also expect relevant training and technical back-up. With these rights and expectations come responsibilities for you as users of and the Internet. The purpose of this policy and guide is to set out the main responsibilities of users when accessing and utilising these and other associated technologies. This document has been drawn up in consultation with UNISON through the Joint Consultative Committee. The policy is applicable to all members of staff and those Members who use Council provided ICT facilities. OVERALL APPROACH The Council expects and the Internet to be used primarily for business purpose; nevertheless, the Council recognises in promoting a co-operative working environment, limited personal use is expected and acknowledged. This flexible policy again puts the onus on the user to act in a responsible fashion in a similar way to the use of the telephone for personal use. sent or received on the Council's system are not private property. They form part of the administrative records of the Council and are subject to the requirements of the Freedom of Information Act and the Data Protection Act. WHY HAVE A POLICY? A clearly formulated policy can help ensure that decisions made within the organization, which affect staff: are well thought out, understood by all users, are consistent and fairly applied; take full account of their effect on all areas of activity; satisfy legal requirements; contribute to good employment relations between the Council, Unison and staff. Setting out rights, responsibilities and limitations on the use of ICT facilities should help the Council prevent any unauthorized or careless use, which could result in the Council or staff creating a legal risk. 2

6 ADVANTAGES OF ELECTRONIC COMMUNICATIONS The advantages and benefits of electronic communications include: speed of communication, with the ability to contact a specified group of people at the same time if required. This should generally improve internal and external communications, although it does not follow that a reply will be received as quickly; creating greater opportunities for flexible working, allowing easy contact with remote workers; the opportunities the internet offers for learning and research, commercial transactions and the provision of a 'shop-window' for the Council via the website. CHALLENGES OF ELECTRONIC COMMUNICATIONS In introducing electronic communications the Council has needed to consider: is not necessarily an informal and transient form of communication; deleting a message does not mean it is unrecoverable; intensive use of and unnecessarily wide 'broadcasting' can lead to information overload; the ease and speed of can lead to inadequate thought going into a message, and the possibility of the words or tone being misinterpreted by the recipient; sites visited via the internet are traceable; there are a number of laws, which cover electronic communications, therefore the issue of potential legal liabilities requires consideration. RESPONSIBILITIES OF USERS This policy and guide explains the rules concerning the use of and the Internet and must be signed by all users, either when they join the Council or retrospectively for existing users. Your actions as users of and the Internet can have implications individually as an employee in the course of employment and for the Council as an employer. Failure to comply with the code could lead to action under the Council's Disciplinary Policy and Procedure. is not an informal communication tool as it has the same authority as any other communication to and from the Council. should be regarded as published information. 3

7 The purpose of this policy and guide is to protect as well as empower the user and the Council. Users should take into account the following issues in their use of and the Internet: Inappropriate Use When composing s ensure that proper due care is taken. Do not make statements on your own behalf or on behalf of the Council, which do or may deface, libel or damage the reputation of any person. You should not engage in any activity that is illegal, distasteful or likely to have negative repercussions for the Council. You must not upload, download, use, retain, distribute or disseminate any images, text, software or other electronic material which: - could be considered to be indecent, obscene, pornographic or illegal - could be offensive, defamatory or abusive in that its context is or could be considered to be a personal attack, harassment, rude or personally critical, sexist, racist or generally distasteful. - Involve activities outside of the scope of your responsibilities - for example, unauthorized selling/advertising of goods and services - could affect or have the potential to affect the performance of, damage or overload the Council's system, network and/or external communications in any way - could be defamatory or incur liability on the part of the Council or adversely impact on the image of the Council - could be a breach of copyright or licence provision with respect to both programs and data. The following activities are expressly forbidden: - The introduction of any form of computer virus - Seeking to gain access to restricted areas of the network or other hacking activities - Forgery or attempts to read other users or access their system without their express permission All expressions of fact, intention and opinion via can be held against you and/or the Council in the same way as verbal and written expressions. s both in hard copy and electronic form are admissible in a court of law. Disclaimer All s sent to outside bodies will contain a disclaimer, as below, which is sent automatically and is the responsibility of the Principal ICT Officer (Technical): Private and Confidential Notice The information contained in this is intended for the named recipients only. If you are not the intended recipient, you must not copy, distribute or take any action or reliance on it. If you have received this in error, please notify the sender immediately by using the address or by telephoning the Council s ICT Service Desk on

8 Care Please note that this has been created in the knowledge that Internet is not a 100% secure communications medium. We advise that you understand and observe this lack of security when ing us. Although we have taken steps to ensure that this and attachments are free from any virus, we advise that in keeping with good computing practice the recipient should ensure they are actually virus-free. Take care as to whom you pass your address. If sent to an inappropriate party, there is danger that you and the entire system will become subjected to junk mail. Data Protection Personal data is subject to the Data Protection Act (DPA) Under the terms of the Act, this includes any information about a living identifiable individual, including their name, address, phone number, address and any other information about them. If you include such information in an or in an attachment to an , you will be processing personal data and must abide by the law. You must not collect such information without the individual knowing you propose to do so. You may not disclose or amend such information except in accordance with the purpose for which the information was collected. You must ensure that the information is accurate and up to date. The individual has the right to inspect what is held about him or her on the system or held in separate archives of s. The individual can demand correction of inaccurate information, can request blocking or erasure of damaging information and can sue for damages caused by inaccurate information. Personal data should only be kept for as long as it is needed for the purpose for which it was collected. If you store s, you must ensure that such stores are not maintained for longer than necessary for the purpose for which they were collected. They should be held in such a way that they can be easily identified, reviewed and, when necessary, destroyed. You should not: Use s for any purpose not permitted under this Council s notification under the Data Protection Act Use a false identity in s; Utilise mail servers or other systems to enable the widespread circulation of unsolicited and unwanted ; Use s to communicate confidential or sensitive matters relating to individuals; Obtain, handle or disclose personal information without making sure you are complying with the law or the Council s notification to the Data Protection Commissioner; Permit third parties to read personal information in s or attachments by leaving your screen in view; Make or send on advertisements, chain letters or unsolicited s; 5

9 Read other people s s without their express permission; Give your password to any third party; Invade an individual s privacy by using ; You should: Be careful in respect of putting personal information in the body of the text of an , particularly if it is of a sensitive or confidential nature; Obey a request to print out items relevant to an individual if that individual demands a copy of his/her file. This will only be requested when required under the Act or where there is good reason to believe that violations of the law or the Council s policies have taken place or for other compelling or critical reasons; Agree to turn over to the Council all records in your possession when you leave its employment Note that recipients of your s, those who send them to you and the content of all s sent or received may be scrutinised Report any third party messages received about viruses to the Principal ICT Officer (Technical) through the ICT Service Desk. Freedom of Information Act 2000 Information contained in s is covered by the requirements of the Freedom of Information Act. relating to particular issues or functions should be retained/archived in accordance with the timescales stipulated in the Council's Document Retention and Disposal Policy. Security Security is of paramount importance. The Data Protection Act requires that adequate security is maintained to protect personal information held on s and related archives and software. Do not allow anyone else to use your identity and password. Never leave your logged on and then walk away so that others can read what is on the screen, can send a message from your PC purporting to be you or amend or delete s you hold. You may be personally responsible for inappropriate activity using your account. System/Desktop Management In order to maximise the performance of the system and the network as a whole, users should actively manage their records, archiving messages to be retained into an appropriate folder on the file server and deleting messages on a regular basis. Users must ensure that their /data is secured particularly when absent from their workstation; all users must password protect their screensaver. Usage and Style As a general rule, should be used for informal communications and letters may well be a more appropriate method of communication, for example, on HR matters. Try to keep as clear, simple and brief as possible. 6

10 Confidentiality Please note that may not be a totally confidential medium and that any particularly sensitive material may be better sent in another way. Also, has the same legal status as other forms of written communication. Receipt of Unsolicited/Unwanted If you are in receipt of unsolicited/unwanted please raise a call through the ICT Service Desk ( ). The Council will then attempt to block future receipt of such s. Dealing with in your absence In the event of your absence from work (particularly if you are on sickness leave) the ICT team will have authority to set up an out-of-office message to alert senders of . Requests should be made by the relevant line manager through the ICT Service Desk. In the event of the Council requiring access to your mailbox, this will only be agreed for a specific purpose with the request made by the relevant Executive Director to the Executive Director, Human Resources and Information Technology. The Internet Use of the Internet is permitted and encouraged where such use is suitable for Council business and supports the corporate objectives of the Council. Personal use of the Internet is accepted but must not impinge on your workload or distract others around you. The Internet is to be used in a manner that is consistent with the Council's standards of business conduct and as part of the normal execution of an employee's job responsibilities. Internet usage is monitored and Executive Directors can request, via the Executive Director HR and ICT, to see logs for any given period. The use of the Internet/Intranet may be subject to monitoring for security and/or network management reasons. The distribution of any information through the Internet, computer based services and messaging systems is subject to the scrutiny of the Council. The Council reserves the right to determine the suitability of this information. The use of computing resources is subject to UK law and any illegal use will be dealt with appropriately. Users should not: Visit Internet sites that contain obscene, hateful or other objectionable materials. If you do find yourself confronted by such a site and you typed in a legitimate address please inform the ICT Service Desk so that this can be investigated and protect others from the same. 7

11 Make or post indecent remarks, proposals, or materials on the Internet. Maintain or upload any personal web sites that they may have access to the Council's network. Reveal or publicise confidential or proprietary information. Upload, download, or otherwise transmit commercial software or any copyrighted materials belonging to parties outside of the Council. If in doubt contact the Head of Legal Services. Intentionally interfere with the normal operation of the network, including the propagation of computer viruses and sustained high volume network traffic that substantially hinders others in their use of the network. Examine, change, or use another person's files, output or user name for which they do not have explicit authorization. Waste time on non-council business. Downloading Software and Files from the Internet Software should not be downloaded from the Internet or from because of possible security and virus threats. If new software is required to do your job you should raise a project call through the Council's ICT Service Desk. 8

12 RESPONSIBILITIES OF THE COUNCIL Within the overall flexible approach to be taken by the Council in relation to and the Internet, Members and staff will note that the Council cannot be responsible for user actions in some cases. In addition, the Council also needs to protect the interests of all Members and staff, particularly in relation to its equal opportunities policy. The HR Department will ensure that this policy is explained and understood through the staff induction process. The Council has taken the following steps to protect you and others within the organisation: Installation of content filtering software (Websense) to restrict inappropriate and offensive web sites to users, particularly those of a pornographic and discriminatory nature; Installation of anti-virus software on each personal computer; Monitoring of and Internet access by the Network Administrator (through bespoke software) will take place on a regular basis to inform future review of the code of conduct. In addition, the Council reserves the right to inspect the contents of s that you send or receive. Under the Data Protection Act, you have the right to inspect such files or logs the Council holds about you. In the first instance you should contact the Principal ICT Officer (Technical) if you wish to inspect any log files the Council holds on you. The Principal ICT Officer (Technical) will then seek authorization from the Executive Director, Human Resources and Information Technology. The Council may also manually monitor and internet use where there is a reasonable belief that this policy and procedure is being abused potentially leading to a detrimental impact on the Council. Any monitoring will be proportionate to the business needs of the Council, and may only be authorised by the Executive Director, HR&IT. RELATIONSHIP WITH THE COUNCIL'S DISCIPLINARY POLICY AND PROCEDURE Users, who send inappropriate or offensive s, whether business or personal, could result in the disciplinary process being invoked. (Members may be subject to their own appropriate procedures). Attempts to access offensive and inappropriate information from the Internet whether denied or allowed by, Websense may again result in similar disciplinary processes being invoked. Users in receipt of offensive s or attachments from internal or external users are required to inform their line manager and the Council s Principal IT Officer (e- Government and ICT Support) immediately. NOTE: If you require any further guidance or clarification on this code, please contact Andrew Killington, Executive Director, Human Resources and Information Technology andrew.killington@eastcambs.gov.uk 9

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Advice leaflet Internet and e-mail policies

Advice leaflet Internet and e-mail policies Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.

More information

Medina County Policy Manual

Medina County Policy Manual Medina County Policy Manual Policy: Computer & Network Usage Section: Work Rules Number: 7.015 Issued: 09/17/07 Reviewed/Revised: Page #: 1 of 5 A. It is the intent of Medina County to provide local, network,

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY

TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY Council Resolution No 313/03 adopted at the Ordinary Meeting of Council on 19 August 2003. PURPOSE

More information

Email Policy For Staff and Students

Email Policy For Staff and Students Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY Version Author Date Approved by Board 2009-1 Gillian Kirkup 24 March 2010 Page 1 of 8 THE RICE MARKETING BOARD FOR

More information

Guidelines on developing a policy for managing email

Guidelines on developing a policy for managing email Guidelines on developing a policy for managing email Crown copyright 2004 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government

More information

Instruction. Neoga Community Unit School District #3 Page 1 of 5

Instruction. Neoga Community Unit School District #3 Page 1 of 5 Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

INTERNET, EMAIL AND PHONE SYSTEMS

INTERNET, EMAIL AND PHONE SYSTEMS Upper Great Southern Family Support Association Inc Policy On INTERNET, EMAIL AND PHONE SYSTEMS Date Adopted: November 2010 Date Revised: March 2013 Review Date: March 2014 Upper Great Southern Family

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

WCCM XII & APCOM VI Secretariat is in Seoul. Your use of http://wccm2016.org will always be

WCCM XII & APCOM VI Secretariat is in Seoul. Your use of http://wccm2016.org will always be Terms & Conditions Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Acceptable Use of Information and Communication Systems Policy

Acceptable Use of Information and Communication Systems Policy Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help

More information

THE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES

THE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES THE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES In summary the telephone, fax, E-mail and Internet should NOT be used: For personal gain or profit. To represent yourself as someone else. To send, post,

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

AP 417 Information and Communication Services

AP 417 Information and Communication Services AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs

More information

INTERNET ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods

More information

Dauphin County Technical School

Dauphin County Technical School Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,

More information

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Forbes Shire Council Internet Access Policy

Forbes Shire Council Internet Access Policy Forbes Shire Council Forbes Shire Council Internet Access Policy Policy No IT/001 Date approved 17 August 2006 Authority Information Technology Services Contact Officer Brian Clarke Revision History Version

More information

Executive Vice President of Finance and

Executive Vice President of Finance and Name of Policy: Policy Number: Electronic mail services policy. 3364-65-01 Approving Officer: Administration Executive Vice President of Finance and Responsible Agent: Vice President of Information Technology

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

Marion County School District Computer Acceptable Use Policy

Marion County School District Computer Acceptable Use Policy Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either: POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

DEPARTMENT OF COMMUNITY AND GOVERNMENT SERVICES (CGS) ACCEPTABLE EMAIL & INTERNET USAGE POLICY POLICY STATEMENT

DEPARTMENT OF COMMUNITY AND GOVERNMENT SERVICES (CGS) ACCEPTABLE EMAIL & INTERNET USAGE POLICY POLICY STATEMENT POLICY STATEMENT The purpose of this Policy is to establish the rules of acceptable use of Government of Nunavut networks and Internet services including E-mail, web-browsing, remote access, file transfer,

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

The College ofBergen Online - Acceptable Use and Disposal

The College ofBergen Online - Acceptable Use and Disposal Acceptable Use of Information Technology Policy Bergen Community College reserves the right to monitor its information technology resources and telecommunications network to protect the integrity of its

More information

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

How to Monitor Employee Web Browsing and Email Legally

How to Monitor Employee Web Browsing and Email Legally WHITEPAPER: HOW TO MONITOR EMPLOYEE WEB BROWSING AND EMAIL LEGALLY How to Monitor Employee Web Browsing and Email Legally ABSTRACT The Internet and email are indispensable resources in today s business

More information

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer

More information

Revelstoke Board of Education Policy Manual

Revelstoke Board of Education Policy Manual Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS

More information

------------------- COMPUTER NETWORK AGREEMENT FORM

------------------- COMPUTER NETWORK AGREEMENT FORM COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.

More information

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

How To Use A College Computer System Safely

How To Use A College Computer System Safely 1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes

More information

a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers.

a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers. CAYUGA COUNTY POLICY MANUAL Section 11 Subject: Electronic messaging and internet 1 Effective Date: 5/25/10; Res. 255-10 Supersedes Policy of: November 28, 2000 Name of Policy: County Computer Hardware-Software

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND

More information

UTC Cambridge ICT Policy

UTC Cambridge ICT Policy UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

BOARD OF EDUCATION POLICY

BOARD OF EDUCATION POLICY BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate

More information

POLICY ON USE OF INTERNET AND EMAIL

POLICY ON USE OF INTERNET AND EMAIL POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011 West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information. and Communication Systems Policy Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the

More information

Minor, for the purposes of this policy, is an individual who has not attained the age of 17.

Minor, for the purposes of this policy, is an individual who has not attained the age of 17. POLICY TITLE: Computer and Network Services: Acceptable Internet Use Policy POLICY NO: 698 PAGE 1 of 9 GENERAL Internet access is a service provided for students and staff members by this school district.

More information

With the increasing popularity of social media you need a Social Media Policy to protect your company.

With the increasing popularity of social media you need a Social Media Policy to protect your company. Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not

More information

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body) ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

Introduction. General Use

Introduction. General Use Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use

More information

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data

More information

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the

More information

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications

Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.

More information

Internet, E-mail and SMS Texting Usage Policy Group Policy

Internet, E-mail and SMS Texting Usage Policy Group Policy Internet, E-mail and SMS Texting Usage Policy Group Policy Scope: This Orbit Housing Group Limited ( Group ) policy provides a set of guidelines for all users within the Group on the proper usage of the

More information

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users

More information

Email policy and practice

Email policy and practice Email policy and practice This policy applies to all staff (including agency workers, casual and temporary staff), visitors, contractors, students, alumni and researchers of Anglia Ruskin University, and

More information

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students. POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive

More information

All Users of DCRI Computing Equipment and Network Resources

All Users of DCRI Computing Equipment and Network Resources July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform

More information

Assistant Director of Facilities

Assistant Director of Facilities Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment

More information