Southern Law Center Law Center Policy #IT0004. Title: Policy
|
|
|
- Lorin Davidson
- 10 years ago
- Views:
Transcription
1 Southern Law Center Law Center Policy #IT0004 Title: Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/ Purpose: To provide members of the SULC user community with standards of conduct in the appropriate use of SULC services, and general conditions regarding the use of, access to, and disclosure of electronic mail to assist in ensuring that SULC resources serve those purposes. This Policy Statement applies to all users of the Southern Law Center Law Center (SULC) electronic mail ( ) system regardless of affiliation, and irrespective of whether accessed from on-campus or off-campus locations, whether hosted on-campus or outsourced. Expressly, this policy applies to any user who has an SULC address (i.e. e- mail address). Specifically, this Policy Statement establishes important guidelines and restrictions regarding any and all use of at SULC. 2.0 Scope: This policy applies to all SULC users accessing and utilizing SULC services. 3.0 Definitions: User SULC employees and students, contractors, vendors, and agents working under the auspices of the Law Center. Computing Resources - All devices (including, but not limited to, personal computers, laptops, PDAs and smart phones) owned by the Law Center, the user or otherwise, which are part of or are used to access (1) the SULC network, peripherals, and related equipment and software; (2) data communications infrastructure, peripherals, and related equipment and software; (3) voice communications infrastructure, peripherals, and related equipment and software; (4) and all other associated tools, instruments, facilities, and the services that make use of any technology resources owned, operated, or controlled by SULC. Computing resources or components thereof may be individually assigned or shared, singleuser or multi-user, stand-alone or networked, and/or mobile or stationary. Data - Includes all information that is used by or belongs to the Law Center or that is processed, stored, maintained, transmitted, copied on, or copied from Law Center computing resources. Forged Communications - (sometimes referred to as spoofing ) shall be defined as s that are made to appear as if they originated from an organization or individual other than the individual from whom the message was actually sent.
2 Protected information - Data that has been designated as private, protected, or confidential by law or by the Law Center. Protected information includes, but is not limited to, employment records, medical records, student records, education records, personal financial records (or other individually identifiable information), research data, trade secrets, and classified government information. Protected information shall not include public records that by law must be made available to the general public. To the extent there is any uncertainty as to whether any data constitutes protected information, the data in question shall be treated as protected information until a determination is made by the Law Center. 4.0 Policy: The official means of electronic communication by the Law Center to faculty, staff, and students shall be the individual s primary SULC (@sulc.edu) address. Rerouting of information (i.e. links, attached files, etc.) cannot, and will not be guaranteed beyond the SULC primary e- mail gateway if a user has created a forwarding address to a departmental server, or an off-site Internet Service Provider (ISP) account. SULC users are required to comply with federal and state law, Law Center policies, and standards of professional and personal ethics and conduct. All communications sent via shall be consistent with applicable administrative policies. Individuals to whom SULC accounts are assigned are responsible for managing and monitoring their accounts, and for actions taken with their accounts. Accounts and account passwords are not to be sold, rented, transferred, or shared with any other person. Unless an individual or an organization has explicitly solicited anonymous comments or input, all communications sent using any SULC technology service or facility must clearly identify the actual sender by a valid address in the basic header or in the message text. The deliberate creation or facilitation of misleading or forged communications is prohibited under any circumstance. No one may imply or state in an that they represent or speak on behalf of SULC, or any organizational element of SULC, unless they are empowered to do so by virtue of their assigned duties or they have been formally authorized by the Law Center. Protected institutional and personal information shall not be sent via , unless specific steps are taken to ensure that the transmission or content of the is secure and encrypted in accordance with Law Center standards, and the personal information therefore provided this additional level of protection. Backups of s stored, and messages marked as deleted held in retention on central Law Center servers, whether managed by the Information Technology Department or outsourced shall be retained by the Law Center for days. All mailing lists supported by Law Center resources shall be owned and sponsored by a unit or individual employed or enrolled as a student by SULC. By agreeing to own or sponsor a Law Center mailing list, the owner/sponsor assumes the responsibility of day-to-day monitoring and operation of the list. Communications to mailings lists shall be in accordance with the stated purpose and policy, and list members who experience inappropriate or unwanted postings may
3 request to be removed unless membership is required by the Law Center. Requests from individuals to be unsubscribed from non-mandatory lists must be honored. Eligibility The use of a Law Center account is a privilege granted by the Law Center, in its sole discretion, to facilitate the Law Center s mission. No student, employee or other person or entity has a right to a Law Center account. Law Center accounts (@*.sulc.edu) may be provided to active faculty, staff, and students in support of Law Center operations and initiatives. When an individual's affiliation with the Law Center ends, eligibility to use a Law Center provided account also ends. The Law Center may elect to continue the account for use by the individual as necessary to further Law Center missions. However, the eligibility of these individuals requires initial and periodic verification of need by a Dean, Director, or Department Head. Requests must be submitted in writing to the SULC Information Technology Department, and accompanied by the reason, name, and contact information of the sponsoring Dean, Director, or Department Head and the length of time for which the access will be required. Naming Convention As with any and all official communication that carries the SULC name, it is important that users be cognizant that the Law Center image is always under scrutiny and that an identified, regulated standard for assigning accounts is necessary. Employees and affiliated individuals who are granted an SULC account will receive an address in a format determined by the Law Center that is distinguishable, as well as unique. The use of obscenities, vulgarities, or offensive words or phrases, both explicit and implied, as determined in the discretion of the Law Center shall not be allowed. Retraction Messages sent via Law Center shall not be retracted by the information technology organization without an official request from a Dean, Director, or Department Head. Such requests must be submitted in writing to the SULC Information Technology Department. However, such retractions do not guarantee that an unintended message will not be read, as once such messages are routed to the Internet beyond the boundaries of the Law Center network, the feasibility of effecting a retraction is nil. Retractions are only effective in those limited cases where the sender and receiver are on the SULCmaintained system, and such messages have not been opened by the recipient. Account Retention Procedures for accounts managed by ITS: Students: accounts shall be purged after non-enrollment for consecutive semesters. Faculty/Staff who have resigned: account shall be terminated within 30 days of date of departure from the Law Center. Faculty/Staff who have retired: Primary account shall be retained until Mail Storage and Retention Each account on central Law Center servers, whether managed locally or outsourced, has a designated and limited amount of server side storage. A warning
4 message will be sent to the user when % of the mailbox storage limit is reached. If the user reaches the designated amount of server side storage for , he/she will no longer be able to send new messages. Once a user exceeds the designated amount of server side storage for , the user will no longer be able to send or receive , and any messages sent to the user s mailbox will be rejected. Users that require additional storage space can utilize Personal Folders to archive the additional to files on desktops or laptops. Law Center employees should archive all s which constitute public records and retain them for three (3) years from creation. Duplicates need not be retained. Public records relating to purchases under the Procurement Code are required to be retained for six (6) years. Privacy and Applicability of Laws and Policies This policy clarifies the applicability of law and certain other Law Center policies to e- mail. Users are reminded that usage of SULC s computing resources, including , is subject to all Law Center policies. The Law Center encourages the use of , respects the privacy of users, and does not wish to inspect or monitor routinely, or to be the arbiter of its contents. Nonetheless, and data stored on the Law Center's network of computers is the property of the Law Center and is accessed by the Law Center for the following purposes: Routine backups Troubleshooting hardware and software problems Preventing unauthorized access and system misuse Retrieving business related information* Investigating potential violation of Law Center policy or local, state or federal law* Complying with legal requests for information* Rerouting or disposing of undeliverable mail Conducting Law Center business Other purposes deemed necessary by the Law Center Information Technology Department, with the Law Center Chancellor s approval. *Approval required by one or more of the following Law Center parties: Law Center Counsel, Law Center Chancellor, Law Enforcement, and the Southern University System Internal Auditor. The extent of the access will be limited to what is reasonably necessary to acquire the information. Individual users should have no expectation of personal privacy or confidentiality for documents and messages stored on Law Center-owned equipment or systems. Users of e- mail services must be aware that even if the sender and recipient have discarded their copies of an record, there might be back-up copies of such that can be retrieved. may constitute a public record like other documents subject to disclosure as such or as a result of litigation. However, prior to any such disclosure, the Law Center must evaluate all requests for information for compliance with applicable federal and state law. Any public records requests or subpoenas or other court orders which could include a user s should be sent to the Law Center s Chancellor s Office for evaluation. At any time you may be directed by the Law Center to hold, preserve, and/or copy electronic mail as such may pertain to existing or potential litigation. If such a directive is received the user shall not alter or delete any covered electronic mail or files.
5 Acceptable Use of SULC Services The acceptable use of SULCS services shall be governed by the provisions defined within the SULC Acceptable Use Policy (Policy #IT0001) INCIDENT HANDLING All security incidents or concerns regarding or other technology policies must be reported immediately to the SULC Information Technology Department. After verification is complete using system or other logs, and in accordance with other applicable policies and procedures, the incident will be reported to the appropriate Dean, Director, or Department Head for review and possible action.
Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources
Southern Law Center Law Center Policy #IT0014 Title: Privacy Expectations for SULC Computing Resources Authority: Department Original Adoption: 5/7/2007 Effective Date: 5/7/2007 Last Revision: 9/17/2012
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
Village of Hastings-on-Hudson Electronic Policy. Internal and External Email Policies and Procedures
Village of Hastings-on-Hudson Electronic Policy Internal and External Email Policies and Procedures Effective February 2012 1 1. Table of Contents 1. General Policies... 3 1.1 Establishment and upkeep
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Administrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention
State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
How To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
Appropriate Use Policy Technology & Information
CLACKAMAS COUNTY EMPLOYMENT POLICY & PRACTICE (EPP) EPP # 59 Implemented: 05/20/10 Clerical Update: Appropriate Use Policy Technology & Information PURPOSE: To establish rules governing use of County information
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
TECHNOLOGY ACCEPTABLE USE POLICY
Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and
Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
PRIVACY NOTICE. Last Updated: March 24, 2015
PRIVACY NOTICE Your access to and use of this website is governed by the TERMS OF WEBSITE USE and the following PRIVACY NOTICE. Please read them carefully as they constitute a legally binding agreement
UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Massachusetts College of Pharmacy and Health Sciences Information Services Acceptable Use Policy
Massachusetts College of Pharmacy and Health Sciences Information Services Acceptable Use Policy Due to the ever-increasing need for integrated technology and data sharing, and because of legal and ethical
Marion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
City of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Information Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Rise Broadband Networks, Inc. Privacy Policy and Customer California Privacy Rights. Effective date: January, 2016
Networks, Inc. Privacy Policy and Customer California Privacy Rights Effective date: January, 2016 knows Customers care about how their personally identifiable information ( Personal Information ) is used
Email Policy For Staff and Students
Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management
REGION 19 HEAD START. Acceptable Use Policy
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
COMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
Practical tips for managing e mail
E MAIL MANAGEMENT E mail messages both sent and received that provide evidence of a government transaction are considered public records. Agencies and locality Records Officers must ensure that e mail
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.
1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors
Franciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE
Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE I. Purpose This directive establishes Department of Homeland Security (DHS) policy
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY
Hamilton.net User Agreement Revised August 31, 2004. Acceptance of Terms Through Use
Hamilton.net User Agreement Revised August 31, 2004 Acceptance of Terms Through Use By using the Hamilton.net Internet Service (the Service ), you signify your agreement to all of the terms, conditions,
How To Preserve Email Records In Mississippi
EMAIL MANAGEMENT GUIDELINES FOR COUNTIES AND MUNICIPALITIES 1. Purpose The purpose of these guidelines is to ensure that the electronic mail records of county and municipal government officials and employees
Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up.
TERMS OF SERVICE: Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up. The following Terms and Conditions are applicable to all individual users / corporate clients who use, sign-up and pay-for
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
Code - A Date Approved: July 24/01
Page 1 of 10 Date Last Revision: Feb 12/08 POLICY STATEMENT AND PURPOSE The County of Elgin provides employees, elected officials, and other organizations and individuals with access to computer and network
Covered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
E-mail Policy Of Government of India
E-mail Policy Of Government of India October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government of India New Delhi -
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
Table of Contents. Chapter No. 1. Introduction 1. 2. Objective 1. 3. E-mail Use Compliance 1. 4. Definitions 2. 5. Roles and Responsibilities 2
Table of Contents Chapter Subject Page No. 1. Introduction 1 2. Objective 1 3. E-mail Use Compliance 1 4. Definitions 2 5. Roles and Responsibilities 2 6. Creation and Use of E-mails 3 7. Managing E-mails
