AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY " POLICY" Executive Director (AK) [J50]
|
|
- Peregrine Douglas
- 8 years ago
- Views:
Transcription
1 AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY " POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1 To consider a recommendation from the Standards Committee that the Council's ' Policy' should be reviewed and ensure that this includes clear retention rules for Members and Officers (both s received and sent). 1.2 The recommendation was made by the Standards Committee after consideration of the report from the Standards Board Ethical Standards Officer Report - SBE M. 2.0 RECOMMENDATION 2.1 It is recommended that the Executive Director (AK) is instructed to review the Council's existing policy and that the revised policy is submitted to this Committee for adoption having gone through the Council's agreed consultation processes. 3.0 BACKGROUND 3.1 The Council's ' and the Internet, Good Practice and Acceptable Usage Guide' (Appendix 1) was last revised in September The Council has recently established document retention guidelines for any documents scanned into the Council's Document Management System (DMS). Similar retention guidelines need to be established for s (sent and received). 4.0 OPTIONS 4.1 The Committee may accept, reject, or amend the recommendation. 5.0 ARGUMENTS/CONCLUSIONS 5.1 The Council has embarked on establishing retention timescales for documents scanned into the Council's corporate scanning system. Agenda Item 14 - page 1 commlive/p&r/ Rec Standards Cttee Mtg Policy
2 5.2 It has always been envisaged that this should be extended to include the establishment of retention periods for s and appropriate storage solutions. 5.3 This fits into the Council's overall aim of having a Corporate Document Retention Policy covering both electronic and paper (hard copy) documents. 5.4 The Council's existing policy document " and the Internet, Good Practice and Acceptable Usage Guide" was due to be reviewed in September With the agreement of this Committee, the review can be brought forward to respond to the recommendation of the Standards Committee. 5.6 The proposed revisions to the policy will need to go through the Council's agreed consultation processes (ie. the Joint Consultative Committee). 6.0 FINANCIAL IMPLICATIONS 6.1 Any financial implications (potentially the need to increase the Council's electronic storage capacity) will be ascertained as part of the review. 7.0 APPENDICES 7.1 Appendix 1 - ' and the Internet, Good Practice and Acceptable Usage Guide - September 2007' Background Documents Standards Committee Minute No. 51 of meeting 22 nd April reconvened 12 th May 2009 Location Room 119 The Grange, Ely Contact Officer Andrew Killington Executive Director (01353) andrew.killington@eastcambs.gov.uk Agenda Item 14 - page 2 commlive/p&r/ Rec Standards Cttee Mtg Policy
3 APPENDIX 1 EAST CAMBRIDGESHIRE DISTRICT COUNCIL AND THE INTERNET POLICY, GOOD PRACTICE AND ACCEPTABLE USAGE GUIDE SEPTEMBER 2007
4 AND THE INTERNET POLICY, GOOD PRACTICE AND ACCEPTABLE USAGE GUIDE SEPTEMBER 2007 (REVISED) CONTENTS PAGE INTRODUCTION 2 OVERALL APPROACH 2 WHY HAVE A POLICY? 2 ADVANTAGES OF ELECTRONIC COMMUNICATIONS 3 CHALLENGES OF ELECTRONIC COMMUNICATIONS 3 RESPONSIBILITIES OF USERS 3-8 Inappropriate Use Use of Disclaimer Care Data Protection Freedom of Information Act 2000 Security System/Desktop Management Usage and Style Confidentiality Receipt of Unsolicited/Unwanted Dealing with in your absence The Internet Downloading Software and Files From the Internet RESPONSIBILITIES OF THE COUNCIL 9 Relationship with the Council's Disciplinary Policy and Procedure 9 1
5 INTRODUCTION The Council has developed extensive internal and external facilities and Internet access through the Council s Internet Service Producer (Cambridgeshire County Council, the Cambridgeshire Community Network). This is a key part of the Council s ICT/e-Government strategy to ensure that Council Members and staff have the tools at their disposal to work as effectively as possible. Access to information technology has been acknowledged by Members and Management Team as a key priority to enable Members and staff to carry out their duties more effectively. Members and staff should also expect relevant training and technical back-up. With these rights and expectations come responsibilities for you as users of and the Internet. The purpose of this policy and guide is to set out the main responsibilities of users when accessing and utilising these and other associated technologies. This document has been drawn up in consultation with UNISON through the Joint Consultative Committee. The policy is applicable to all members of staff and those Members who use Council provided ICT facilities. OVERALL APPROACH The Council expects and the Internet to be used primarily for business purpose; nevertheless, the Council recognises in promoting a co-operative working environment, limited personal use is expected and acknowledged. This flexible policy again puts the onus on the user to act in a responsible fashion in a similar way to the use of the telephone for personal use. sent or received on the Council's system are not private property. They form part of the administrative records of the Council and are subject to the requirements of the Freedom of Information Act and the Data Protection Act. WHY HAVE A POLICY? A clearly formulated policy can help ensure that decisions made within the organization, which affect staff: are well thought out, understood by all users, are consistent and fairly applied; take full account of their effect on all areas of activity; satisfy legal requirements; contribute to good employment relations between the Council, Unison and staff. Setting out rights, responsibilities and limitations on the use of ICT facilities should help the Council prevent any unauthorized or careless use, which could result in the Council or staff creating a legal risk. 2
6 ADVANTAGES OF ELECTRONIC COMMUNICATIONS The advantages and benefits of electronic communications include: speed of communication, with the ability to contact a specified group of people at the same time if required. This should generally improve internal and external communications, although it does not follow that a reply will be received as quickly; creating greater opportunities for flexible working, allowing easy contact with remote workers; the opportunities the internet offers for learning and research, commercial transactions and the provision of a 'shop-window' for the Council via the website. CHALLENGES OF ELECTRONIC COMMUNICATIONS In introducing electronic communications the Council has needed to consider: is not necessarily an informal and transient form of communication; deleting a message does not mean it is unrecoverable; intensive use of and unnecessarily wide 'broadcasting' can lead to information overload; the ease and speed of can lead to inadequate thought going into a message, and the possibility of the words or tone being misinterpreted by the recipient; sites visited via the internet are traceable; there are a number of laws, which cover electronic communications, therefore the issue of potential legal liabilities requires consideration. RESPONSIBILITIES OF USERS This policy and guide explains the rules concerning the use of and the Internet and must be signed by all users, either when they join the Council or retrospectively for existing users. Your actions as users of and the Internet can have implications individually as an employee in the course of employment and for the Council as an employer. Failure to comply with the code could lead to action under the Council's Disciplinary Policy and Procedure. is not an informal communication tool as it has the same authority as any other communication to and from the Council. should be regarded as published information. 3
7 The purpose of this policy and guide is to protect as well as empower the user and the Council. Users should take into account the following issues in their use of and the Internet: Inappropriate Use When composing s ensure that proper due care is taken. Do not make statements on your own behalf or on behalf of the Council, which do or may deface, libel or damage the reputation of any person. You should not engage in any activity that is illegal, distasteful or likely to have negative repercussions for the Council. You must not upload, download, use, retain, distribute or disseminate any images, text, software or other electronic material which: - could be considered to be indecent, obscene, pornographic or illegal - could be offensive, defamatory or abusive in that its context is or could be considered to be a personal attack, harassment, rude or personally critical, sexist, racist or generally distasteful. - Involve activities outside of the scope of your responsibilities - for example, unauthorized selling/advertising of goods and services - could affect or have the potential to affect the performance of, damage or overload the Council's system, network and/or external communications in any way - could be defamatory or incur liability on the part of the Council or adversely impact on the image of the Council - could be a breach of copyright or licence provision with respect to both programs and data. The following activities are expressly forbidden: - The introduction of any form of computer virus - Seeking to gain access to restricted areas of the network or other hacking activities - Forgery or attempts to read other users or access their system without their express permission All expressions of fact, intention and opinion via can be held against you and/or the Council in the same way as verbal and written expressions. s both in hard copy and electronic form are admissible in a court of law. Disclaimer All s sent to outside bodies will contain a disclaimer, as below, which is sent automatically and is the responsibility of the Principal ICT Officer (Technical): Private and Confidential Notice The information contained in this is intended for the named recipients only. If you are not the intended recipient, you must not copy, distribute or take any action or reliance on it. If you have received this in error, please notify the sender immediately by using the address or by telephoning the Council s ICT Service Desk on
8 Care Please note that this has been created in the knowledge that Internet is not a 100% secure communications medium. We advise that you understand and observe this lack of security when ing us. Although we have taken steps to ensure that this and attachments are free from any virus, we advise that in keeping with good computing practice the recipient should ensure they are actually virus-free. Take care as to whom you pass your address. If sent to an inappropriate party, there is danger that you and the entire system will become subjected to junk mail. Data Protection Personal data is subject to the Data Protection Act (DPA) Under the terms of the Act, this includes any information about a living identifiable individual, including their name, address, phone number, address and any other information about them. If you include such information in an or in an attachment to an , you will be processing personal data and must abide by the law. You must not collect such information without the individual knowing you propose to do so. You may not disclose or amend such information except in accordance with the purpose for which the information was collected. You must ensure that the information is accurate and up to date. The individual has the right to inspect what is held about him or her on the system or held in separate archives of s. The individual can demand correction of inaccurate information, can request blocking or erasure of damaging information and can sue for damages caused by inaccurate information. Personal data should only be kept for as long as it is needed for the purpose for which it was collected. If you store s, you must ensure that such stores are not maintained for longer than necessary for the purpose for which they were collected. They should be held in such a way that they can be easily identified, reviewed and, when necessary, destroyed. You should not: Use s for any purpose not permitted under this Council s notification under the Data Protection Act Use a false identity in s; Utilise mail servers or other systems to enable the widespread circulation of unsolicited and unwanted ; Use s to communicate confidential or sensitive matters relating to individuals; Obtain, handle or disclose personal information without making sure you are complying with the law or the Council s notification to the Data Protection Commissioner; Permit third parties to read personal information in s or attachments by leaving your screen in view; Make or send on advertisements, chain letters or unsolicited s; 5
9 Read other people s s without their express permission; Give your password to any third party; Invade an individual s privacy by using ; You should: Be careful in respect of putting personal information in the body of the text of an , particularly if it is of a sensitive or confidential nature; Obey a request to print out items relevant to an individual if that individual demands a copy of his/her file. This will only be requested when required under the Act or where there is good reason to believe that violations of the law or the Council s policies have taken place or for other compelling or critical reasons; Agree to turn over to the Council all records in your possession when you leave its employment Note that recipients of your s, those who send them to you and the content of all s sent or received may be scrutinised Report any third party messages received about viruses to the Principal ICT Officer (Technical) through the ICT Service Desk. Freedom of Information Act 2000 Information contained in s is covered by the requirements of the Freedom of Information Act. relating to particular issues or functions should be retained/archived in accordance with the timescales stipulated in the Council's Document Retention and Disposal Policy. Security Security is of paramount importance. The Data Protection Act requires that adequate security is maintained to protect personal information held on s and related archives and software. Do not allow anyone else to use your identity and password. Never leave your logged on and then walk away so that others can read what is on the screen, can send a message from your PC purporting to be you or amend or delete s you hold. You may be personally responsible for inappropriate activity using your account. System/Desktop Management In order to maximise the performance of the system and the network as a whole, users should actively manage their records, archiving messages to be retained into an appropriate folder on the file server and deleting messages on a regular basis. Users must ensure that their /data is secured particularly when absent from their workstation; all users must password protect their screensaver. Usage and Style As a general rule, should be used for informal communications and letters may well be a more appropriate method of communication, for example, on HR matters. Try to keep as clear, simple and brief as possible. 6
10 Confidentiality Please note that may not be a totally confidential medium and that any particularly sensitive material may be better sent in another way. Also, has the same legal status as other forms of written communication. Receipt of Unsolicited/Unwanted If you are in receipt of unsolicited/unwanted please raise a call through the ICT Service Desk ( ). The Council will then attempt to block future receipt of such s. Dealing with in your absence In the event of your absence from work (particularly if you are on sickness leave) the ICT team will have authority to set up an out-of-office message to alert senders of . Requests should be made by the relevant line manager through the ICT Service Desk. In the event of the Council requiring access to your mailbox, this will only be agreed for a specific purpose with the request made by the relevant Executive Director to the Executive Director, Human Resources and Information Technology. The Internet Use of the Internet is permitted and encouraged where such use is suitable for Council business and supports the corporate objectives of the Council. Personal use of the Internet is accepted but must not impinge on your workload or distract others around you. The Internet is to be used in a manner that is consistent with the Council's standards of business conduct and as part of the normal execution of an employee's job responsibilities. Internet usage is monitored and Executive Directors can request, via the Executive Director HR and ICT, to see logs for any given period. The use of the Internet/Intranet may be subject to monitoring for security and/or network management reasons. The distribution of any information through the Internet, computer based services and messaging systems is subject to the scrutiny of the Council. The Council reserves the right to determine the suitability of this information. The use of computing resources is subject to UK law and any illegal use will be dealt with appropriately. Users should not: Visit Internet sites that contain obscene, hateful or other objectionable materials. If you do find yourself confronted by such a site and you typed in a legitimate address please inform the ICT Service Desk so that this can be investigated and protect others from the same. 7
11 Make or post indecent remarks, proposals, or materials on the Internet. Maintain or upload any personal web sites that they may have access to the Council's network. Reveal or publicise confidential or proprietary information. Upload, download, or otherwise transmit commercial software or any copyrighted materials belonging to parties outside of the Council. If in doubt contact the Head of Legal Services. Intentionally interfere with the normal operation of the network, including the propagation of computer viruses and sustained high volume network traffic that substantially hinders others in their use of the network. Examine, change, or use another person's files, output or user name for which they do not have explicit authorization. Waste time on non-council business. Downloading Software and Files from the Internet Software should not be downloaded from the Internet or from because of possible security and virus threats. If new software is required to do your job you should raise a project call through the Council's ICT Service Desk. 8
12 RESPONSIBILITIES OF THE COUNCIL Within the overall flexible approach to be taken by the Council in relation to and the Internet, Members and staff will note that the Council cannot be responsible for user actions in some cases. In addition, the Council also needs to protect the interests of all Members and staff, particularly in relation to its equal opportunities policy. The HR Department will ensure that this policy is explained and understood through the staff induction process. The Council has taken the following steps to protect you and others within the organisation: Installation of content filtering software (Websense) to restrict inappropriate and offensive web sites to users, particularly those of a pornographic and discriminatory nature; Installation of anti-virus software on each personal computer; Monitoring of and Internet access by the Network Administrator (through bespoke software) will take place on a regular basis to inform future review of the code of conduct. In addition, the Council reserves the right to inspect the contents of s that you send or receive. Under the Data Protection Act, you have the right to inspect such files or logs the Council holds about you. In the first instance you should contact the Principal ICT Officer (Technical) if you wish to inspect any log files the Council holds on you. The Principal ICT Officer (Technical) will then seek authorization from the Executive Director, Human Resources and Information Technology. The Council may also manually monitor and internet use where there is a reasonable belief that this policy and procedure is being abused potentially leading to a detrimental impact on the Council. Any monitoring will be proportionate to the business needs of the Council, and may only be authorised by the Executive Director, HR&IT. RELATIONSHIP WITH THE COUNCIL'S DISCIPLINARY POLICY AND PROCEDURE Users, who send inappropriate or offensive s, whether business or personal, could result in the disciplinary process being invoked. (Members may be subject to their own appropriate procedures). Attempts to access offensive and inappropriate information from the Internet whether denied or allowed by, Websense may again result in similar disciplinary processes being invoked. Users in receipt of offensive s or attachments from internal or external users are required to inform their line manager and the Council s Principal IT Officer (e- Government and ICT Support) immediately. NOTE: If you require any further guidance or clarification on this code, please contact Andrew Killington, Executive Director, Human Resources and Information Technology andrew.killington@eastcambs.gov.uk 9
Email Services Policy
Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages
More informationCity of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
More informationSt. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
More informationElectronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
More informationUNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More informationAcceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
More informationAdvice leaflet Internet and e-mail policies
Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.
More informationMedina County Policy Manual
Medina County Policy Manual Policy: Computer & Network Usage Section: Work Rules Number: 7.015 Issued: 09/17/07 Reviewed/Revised: Page #: 1 of 5 A. It is the intent of Medina County to provide local, network,
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationInformation Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
More informationICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
More informationCOMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
More informationTerms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website
Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationMEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
More informationTITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY
TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY Council Resolution No 313/03 adopted at the Ordinary Meeting of Council on 19 August 2003. PURPOSE
More informationEmail Policy For Staff and Students
Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management
More informationTerms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
More informationHUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
More informationComputer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
More informationTHE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY
THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY Version Author Date Approved by Board 2009-1 Gillian Kirkup 24 March 2010 Page 1 of 8 THE RICE MARKETING BOARD FOR
More informationGuidelines on developing a policy for managing email
Guidelines on developing a policy for managing email Crown copyright 2004 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government
More informationInstruction. Neoga Community Unit School District #3 Page 1 of 5
Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each
More informationITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
More informationINTERNET, EMAIL AND PHONE SYSTEMS
Upper Great Southern Family Support Association Inc Policy On INTERNET, EMAIL AND PHONE SYSTEMS Date Adopted: November 2010 Date Revised: March 2013 Review Date: March 2014 Upper Great Southern Family
More informationMedford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
More informationICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
More informationWCCM XII & APCOM VI Secretariat is in Seoul. Your use of http://wccm2016.org will always be
Terms & Conditions Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms
More informationEmail Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
More informationTECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
More informationThe term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
More informationAcceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
More informationTHE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES
THE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES In summary the telephone, fax, E-mail and Internet should NOT be used: For personal gain or profit. To represent yourself as someone else. To send, post,
More informationEMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
More informationAP 417 Information and Communication Services
AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for
More informationSTRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
More informationSheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
More informationINTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
More informationDauphin County Technical School
Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,
More informationPROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationForbes Shire Council Internet Access Policy
Forbes Shire Council Forbes Shire Council Internet Access Policy Policy No IT/001 Date approved 17 August 2006 Authority Information Technology Services Contact Officer Brian Clarke Revision History Version
More informationExecutive Vice President of Finance and
Name of Policy: Policy Number: Electronic mail services policy. 3364-65-01 Approving Officer: Administration Executive Vice President of Finance and Responsible Agent: Vice President of Information Technology
More informationTONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE
GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving
More informationMarion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
More informationHuman Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More information2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:
POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,
More informationRecommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
More informationDEPARTMENT OF COMMUNITY AND GOVERNMENT SERVICES (CGS) ACCEPTABLE EMAIL & INTERNET USAGE POLICY POLICY STATEMENT
POLICY STATEMENT The purpose of this Policy is to establish the rules of acceptable use of Government of Nunavut networks and Internet services including E-mail, web-browsing, remote access, file transfer,
More informationUSE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationThe College ofBergen Online - Acceptable Use and Disposal
Acceptable Use of Information Technology Policy Bergen Community College reserves the right to monitor its information technology resources and telecommunications network to protect the integrity of its
More informationValmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
More informationMISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
More informationHow to Monitor Employee Web Browsing and Email Legally
WHITEPAPER: HOW TO MONITOR EMPLOYEE WEB BROWSING AND EMAIL LEGALLY How to Monitor Employee Web Browsing and Email Legally ABSTRACT The Internet and email are indispensable resources in today s business
More informationValmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
More informationRevelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
More information------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
More informationREGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
More informationInformation Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
More informationHow To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
More informationWORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
More informationR3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
More informationa) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers.
CAYUGA COUNTY POLICY MANUAL Section 11 Subject: Electronic messaging and internet 1 Effective Date: 5/25/10; Res. 255-10 Supersedes Policy of: November 28, 2000 Name of Policy: County Computer Hardware-Software
More informationPOLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
More information13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
More informationAcceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
More informationUTC Cambridge ICT Policy
UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions
More informationE-SAFETY POLICY 2014/15 Including:
E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More informationBOARD OF EDUCATION POLICY
BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate
More informationPOLICY ON USE OF INTERNET AND EMAIL
POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationWest Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011
West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer
More informationDIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
More informationAcceptable Use of Information. and Communication Systems Policy
Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,
More informationInformation Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
More informationConditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
More informationInformation Systems Acceptable Use Policy for Learners
Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs
More informationELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
More informationMinor, for the purposes of this policy, is an individual who has not attained the age of 17.
POLICY TITLE: Computer and Network Services: Acceptable Internet Use Policy POLICY NO: 698 PAGE 1 of 9 GENERAL Internet access is a service provided for students and staff members by this school district.
More informationWith the increasing popularity of social media you need a Social Media Policy to protect your company.
Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not
More informationDCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
More informationDundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
More informationABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)
ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
More informationIntroduction. General Use
Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use
More informationEMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards
EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data
More informationFAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
More informationR 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationClear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
More informationInternet, E-mail and SMS Texting Usage Policy Group Policy
Internet, E-mail and SMS Texting Usage Policy Group Policy Scope: This Orbit Housing Group Limited ( Group ) policy provides a set of guidelines for all users within the Group on the proper usage of the
More informationTomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
More informationEmail policy and practice
Email policy and practice This policy applies to all staff (including agency workers, casual and temporary staff), visitors, contractors, students, alumni and researchers of Anglia Ruskin University, and
More information2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
More informationAll Users of DCRI Computing Equipment and Network Resources
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
More informationAssistant Director of Facilities
Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment
More information