Random Widget Works: Information Security Policy

Size: px
Start display at page:

Download "Random Widget Works: Information Security Policy"

Transcription

1 Random Widget Works: Information Security Policy Eric ISA 3300 W-01 Whitman Summer Semester 6/21/2013

2 Table of Contents Organization Overview... 4 Organization Overview... 5 Information Security Policy Need... 6 Enterprise Information Security Policy... 7 Enterprise Information Security Policy... 8 ENTERPRISE INFORMATION SECURITY POLICY FOR RANDOM WIDGET WORKS... 9 Purpose...9 Information Security Elements...9 The Need for Information Security...9 Information Security Responsibilities and Roles...9 Reference to Other Information Technology Standards and Guidelines Issue Specific Security Policies Purpose Authorized Uses Prohibited Uses Systems Management Violations of Policy Policy Review and Modification Limitations of Liability FAIR AND RESPONSIBLE USE OF RWW COMPUTER s Statement of Purpose Authorized Uses Prohibited Uses Systems Management Page 2

3 5. Violations of Policy Policy Review and Modification Limitations of Liability FAIR AND RESPONSIBLE USE OF RWW Statement of Purpose Authorized Uses Prohibited Uses Systems Management Violations of Policy Policy Review and Modification Limitations of Liability References Page 3

4 Random Widget Works Organization Overview

5 Organization Overview Random Widget Works makes quality widgets and equipment for modern businesses. Established in 1995, Random Widget works has grown into the largest manufacturer of widgets and other equipment. It strives to be the preferred manufacturer of choice for every business widget equipment needs. Random Widget Works values commitment, honesty, integrity, and social responsibility among its employees. It is committed to providing services for its corporate, social, legal, and natural environments. Random Widget Works based in Atlanta, Georgia has over 350 employees. The company CEO, Alex Truman, revolutionized the field of widget manufacturing. The Chief Information Officer for Random Widget Works is Mike Edwards who has been a part of Random Widget Works since the beginning. Recently Mike Edwards decided that the company needed to increase its information security. He decided to create a Chief Information Security Officer to help comply with this need. Based on the recommendation of co-worker Charlie Moody; Iris Majwabu was given the position. Page 5

6 Information Security Policy Need Random Widget Works needs an Enterprise Information Security Policy and Issue Specific Security Policies. If the company does not recognize the need for Security, the company will face loss in profits, customers, employees, and has the possibly of being charged with crimes due to laws being broken. A company needs an Enterprise Information Security Policy to plan for all events that may hurt the company. EISP sets the strategic direction for all the organization s security efforts (Whitman, & Mattord, 2010). The EISP is drafted by the Chief Information Security Officer, reviewed and approved by the CIO, and other executives. It does not require frequent modification, unless the direction of the company changes. Random Widget Works will not have to worry about making too many modifications since it has written many of the policies from scratch. When making the EISP, Random Widget Works will need to make policies that will help the company protect itself, but also keeping the Mission and Objectives that it was founded on in Perspective (Whitman, & Mattord, 2010). Issue Specific Security Policy is crucial to Random Widget Works well-being as a company. If a disaster falls on the company, the ISSP will have everything listed that needs to be done. This policy will make technology policies known throughout the company. Managers and employees will know what they should and should not do while at work. This policy protects both the employees and the organization. Page 6

7 Random Widget Works Enterprise Information Security Policy

8 Enterprise Information Security Policy The Enterprise Information Security Policy is known by many names. Some call it security program policy, general security policy, IT policy, and a number of other names (Whitman, & Mattord, 2010). The purpose of this Policy is to set the direction for all of the company s security needs. Enterprise Information Security manages, develops, and implements the requirements of an information security program. For these programs to be made they must be approved throughout the organization by information security management, IT development, IT operations, and others (Whitman, & Mattord, 2010). When designing an EISP for Random Widget Works, we keep in mind of the company s mission, vision, and values. If the EISP does not coincide with the company s mission, vision, and values, the policy will not benefit the company or make sense. Random Widget Works strives to be the leader in widget machinery so an EISP plan needs to be made that will not only protect the company s interests but also not restrict its ability to develop into the company it wants to become. The EISP in companies differ depending on their needs but they all have some similarities. An EISP states the company s viewpoint of security. Are they strict with security or are they more easy going? The EISP has information about the design of the Information Security Organization and who is responsible for the information security role. It then states the responsibility of all members of the company for security (Whitman, & Mattord, 2010). A good EISP document has a number of important components. The purpose, tells what the policy is, what the reasoning is and what it includes. An element of the Information Security document defines the different security viewpoints for Random Widget Works EISP. The next component is the Need section, which tells about the organization and what is needed to protect assets in regards to clients, employees, or other companies. Additional components are the list of responsibilities in an organization and the roles to support Information Security in the company. The last component lists the laws the company must abide by (Whitman, & Mattord, 2010). Page 8

9 ENTERPRISE INFORMATION SECURITY POLICY FOR RANDOM WIDGET WORKS Purpose This policy establishes Information Security Practices for machinery, computer equipment, telecommunications, , and other incidents (Whitman, & Mattord, 2010). This policy is intended to give guidance for the company so all employees follow operating procedure when doing their given task with Random Widget Works. Managers, Information Security, as well as other employees will have assigned roles and levels of security clearance. Information Security Elements Information Security is the protection of data, and the software and hardware that uses that data. Random Widget Work s Information Security is based on the need to maintain Confidentiality, integrity, and availability of information. The information security model consists of training and education, policies, and employee/ customer protection (Whitman, & Mattord, 2010). The Need for Information Security Information Security is a necessity for all legal and ethical issues, and it is obligated to protect its clients and employees sensitive information. Information security is needed to protect Random Widget Works from employee errors, criminal activity, disasters, and system failure. Data Integrity and Confidentiality is a major concern with Random Widget Works. Random Widget Works strives to protect the company by putting in safeguards so that errors will be detected and prevented. With an Information Security System, all issues will be dealt with appropriately and modifications will be made on occurrence to make the security system stronger. Information Security Responsibilities and Roles Chief Information Officer: The Chief information officer is responsible for overseeing the implementation of the Information Security Policy. The CIO reviews the recommended strategies for the Page 9

10 implementation of the Information Security Policy. Determines if the business impact of the strategy will be harmful for the company and makes sure that its inline with company s goals. The CIO also oversees the review and approval of the Information Security Policy by company Executives (Knight 2010). Chief Information Security Officer: The Chief Information Security Officer will be in charge of the development of the Information Security Policy. The CISO will develop and document procedures for the Information Security Policy. CISO is responsible for setting up an information security-training program for all employees of Random Widget Works. In event of breach to information security, CISO is responsible for conducting a response (Knight 2010). Data Steward: Data Steward is employee of RWW who sets data classification levels for different levels of employees. The privacy settings allow different levels of access for managers, information security staff, and employees (Knight 2010). The Data Steward ensures controls are met to protect confidentiality, Integrity and availability of data. The Data Steward is in charge of distribution of passwords, accounts throughout company (Knight 2010). Users: A user is anyone employed or client conducting business with Random Widget Works. All users must follow guideline and procedures specified by Information Security Policy. All users must report any breach of security to Client Information Security Officer. Reference to Other Information Technology Standards and Guidelines - ISO series Page 10

11 Random Widget Works Issue Specific Security Policies

12 Issue Specific Security Policies Issues: Misuse of telecommunications: When taking calls for the company a person should always answer the calls with a predefined checklist. They should greet the caller; give the name of the company, and provide their name. Some receptionists may not have important information at their disposal but they still must be careful of giving out certain information. If a caller calls to say that he is the manager of a certain division and needs the and phone number of a certain executive, the receptionist should have a policy for the way she conducts business. No information should be given out unless proof has been given and only if the information requested is not be capable of crippling the company if it reaches the wrong hands. A policy for telecommunications is necessary so that hackers will not have the ability to call up claiming to be someone important to receive important information. Misuse of electronic mail: When using the computers at work, only throughout the company should be viewed and sent. When employees use their for outside activities, there is a greater chance the computers can get viruses. A policy needs to be made so if an employee goes against policy and damages the computers at work do to negligence, he or she needs to be held accountable for their actions. To make sure each employee knows what to do with , they should take a mandatory course telling them what they shouldn t do, and what types of s they should look out after to help protect the company. Disaster planning and Incident Response: A fire broke out at Random Widget Works in the break room. The sprinklers turned on and destroyed many computers employees were working on. Luckily, for the employees and the company, the information is stored on the g: drive in a different location of the building. However, what would happen if that room caught fire? Would a sprinkler turn on and destroy all of the servers or would a gas be used to extinguishing the fire? The CISO needs to have a list of policies showing what must be done in an incident. If a fire in the break room ruins computers in the nearby office, the break room may need to be moved into a location where common accidents do not occur. Page 12

13 Employee Conduct: Employee Conduct is another issue that needs to be taken into account. Two employees were at their desks playing cards and eating lunch. One of them was using the compact disc tray as a coffee holder. There are a number of issues with this situation. They should go to the break room for lunch, and never have food out near the computers. The computer is company property and the employees should be accountable for any damages. A client came into the office that day and due to the actions of the employees, he decided not to place an order with Random Widget Works. Employee misconduct hurts the company in many ways, we lose clients, company property damages, and it makes the company acceptable to attacks from viruses and hackers. A policy needs to be in place so there is no question what is allowed at work, and so that the company can protect itself from damages or lawsuits. Page 13

14 FAIR AND RESPONSIBLE USE OF RWW INTERNET AND WWW 1. Purpose a. Scope and Applicability The Internet/World Wide Web Policy covers all aspects associated with the Confidentiality, Integrity, and Availability of information when using the Internet. The entire company is on the Internet on a daily basis and is in contact with employees and clients constantly. b. Definition of Technology Addressed The technologies addressed in this policy are all computers, servers, and machinery that connect to the internet at Random Widget Works. c. Responsibilities The CISO is responsible for developing a program that will train all employees about the correct way to use internet and what is permitting under the Information Security Policy. All users must take training course to understand policy so that no accident incidents will occur when on the internet while at Random Widget Works. 2. Authorized Uses a. User Access Management will have access to conduct internet activates with minimum access restrictions. Only sites that have been marked as potentially harmful will be prohibited. An example of this is no access to pornographic sites or websites prone to viruses such as face book. All employees who require access to internet for research will have the highest level of access because they need total roam capabilities. b. Fair and Responsible Use Fair and Responsible use of internet includes using internet to send throughout the company, and only to employees of company, unless permission is give to to potential clients. Internet usage will be permitted but only on company permits websites under company terms. c. Protection of Privacy All employees will be given an address with an abbreviated name so that employee identities are not easily attained from the outside. For internet use, a username and Page 14

15 password is requiring so that only employee with certain levels of clearance can access internet. 3. Prohibited Uses a. Disruptive Use or Misuse Employees are not permitted to use internet to check bank accounts or personal websites. Playing loud music from internet is also not permitted due to company professional appearance and possible virus threat. b. Criminal Use All internet use for child pornography will be reported to police and employee will be terminated immediately from company. Internet use to sell information or sabotage company is criminal activity. c. Offensive or Harassing Materials Employees are prohibited from view websites that are pornographic, violent, or discriminatory in nature. d. Copyrighted, Licensed, or Other Intellectual Property Downloading any music or software without a license is prohibited. d. Other Restrictions Using internet on personal cell phones to going around company internet restrictions is prohibited. 4. Systems Management a. Management of Stored Materials All materials downloaded off the internet are stored on the g: drive on the company s server. The server will filter out any files considered a threat and manage a log of the source computers. b. Employer Monitoring Page 15

16 An internet log is recorded on the company server, which tells what sites an employee has been visiting and how long each day they spent on the internet. c. Virus Protection All files and websites are first scanned with a Virus Checker. If a threat comes up, the site will be blocked and put on record of list of prohibited sites. d. Physical Security The systems manager will be responsible for monitoring security throughout the company network. If an employee has broken policy procedures, a systems manager can ask physical security to escort employee off company premises until investigation has been completed. e. Encryption The information that is saved from the internet activity is encrypted and stored in the g: drive of the company server. This will prevent research or other sensitive information from being leaked due to intrusions from outside the company. 5. Violations of Policy a. Procedures for Reporting Violations When a violation has occurred, an employee must notify the CISO of the issue. The CISO will then resolve the situation accordingly by talking to the database administration, network administration, and giving a report of the incident to the CIO. b. Penalties for Violations Minor Violations will result in a write up of what the employee did and how it affected the company. For first time violations, employee many be given retraining over information security and proper work ethics. Repeat violations will be treated more severely resulting in requiring employee a leave of absence without pay, and possible termination. Major Violations will result in notification of CISO, CIO, Network Administration, and Database Administration. A hold will be placed on employee s access and report will be Page 16

17 developed. Physical Security will obtain employee and police will be called. Major violations result in employee termination. 6. Policy Review and Modification a. Scheduled Review of Policy Random Widget Works will require a meeting of the Information Security Policy every quarter. If a new internet related issue arises, immediate meeting must be conducted. A meeting including the CEO, CIO, and CISO will discuss the new trends in Security and offer any new changes that might be made to the policy. b. Procedures for Modification After the review of the policy, the CEO will determine if the changes the policy would best interest Random Widget Works. The changes to policy most coincide with company goals, while keeping business interesting in mind. The CEO will then give permission to update the policy with the new modifications. The CIO can temporary modify policy without approval during system emergences such as disaster or massive system corruption. 7. Limitations of Liability a. Statements of Liability If an employee violates company policy and is caught doing any illegal internet activity, Random Widget Works is not liable for any employee actions. b. Other Disclaimers All damages resulting from employee violating policy may result in termination and or lawsuit. Page 17

18 FAIR AND RESPONSIBLE USE OF RWW COMPUTER s 1. Statement of Purpose a. Scope and Applicability All computer equipment used at Random Widget Works including computers, printers, fax machines, servers, company phones, computer notebooks, personal digital assistant (PDA), and other hardware apply to the Computer Resources Policy. c. Definition of Technology Addressed This policy serves to address the issues relating to misuse of company computer property. d. Responsibilities All employees are responsible for knowing company policy and using company computer property that applies to data confidentiality, Integrity, and Availability. As well as information security, employees are responsible for using appropriate work ethics when around equipment. 2. Authorized Uses a. User Access All employees have access to company printers, faxes, and computers. They have the permission to use as long as abiding by company policy. b. Fair and Responsible Use All employees will be trained on safe and proper use of computer equipment. c. Protection of Privacy Employees will have privacy from other employees but a log of all employee activity is maintained on company servers. 3. Prohibited Uses a. Disruptive Use or Misuse All employees must use computer equipment for its intended purpose. No food or drinks are allowed near the computers and no one is allowed to sit on the equipment. b. Criminal Use Page 18

19 Employees will be brought up on criminal charges if caught tampering with the functionality of company computer property, or of caught sabotaging company equipment. c. Offensive or Harassing Materials No employee shall display, print, or fax inappropriate material, which may be pornographic, violent, or discriminative in nature. d. Copyrighted, Licensed, or Other Intellectual Property No installation of software shall be allowed on company property if software is unlicensed. e. Other Restrictions No outside computer resource is prohibited without permission from CISO. 4. Systems Management a. Management of Stored Materials All printed or fax activities are stored in a log in company server. b. Employer Monitoring All employees will be monitored on each computer resource they use. The amount of time spent and amount of resources used will be accounted for and stored in a log under each employee names. c. Virus Protection All computers and other computer hardware are protected from viruses on a network through strict firewalls and virus software. d. Physical Security All computer equipment at Random Widget Works is monitored by surveillance to ensure not property is damaged due to physical damage from disasters such as fire, or incidences such as theft. e. Encryption All data from company is encrypted so that if any data leaves Random Widget Work s company network, the data cannot be interoperated without the company s decryption software. 5. Violations of Policy c. Procedures for Reporting Violations Page 19

20 When a violation of computer resources has occurred, an employee must notify the CISO of the issue. The CISO will then resolve the situation accordingly by talking to the database administration, network administration, and giving a report of the incident to the CIO. d. Penalties for Violations Minor Violations will result in a write up of what the employee did and how it affected the company. For first time violations, employee many be given retraining over information security and proper work ethics. Repeat violations will be treated more severely resulting in requiring employee a leave of absence without pay, and possible termination. Major Violations will result in notification of CISO, CIO, Network Administration, and Database Administration. A hold will be placed on employee s access and report will be developed. Physical Security will obtain employee and police will be called. 6. Policy Review and Modification c. Scheduled Review of Policy Random Widget Works will require a meeting of the Information Security Policy for computer resources semiannually. If a computer resource related issue arises, CISO must be contacted immediately. A meeting including the CEO, CIO, and CISO will discuss any needed modifications to Computer Resource ISSP. d. Procedures for Modification After the review of the policy, the CEO will determine if the changes to policy would best interest Random Widget Works. The changes to policy most coincide with company goals, while keeping business interesting in mind. The CEO will then give permission to update the policy with the new modifications. The CIO can temporary modify policy without approval during system emergences such as disaster or massive system corruption. 7. Limitations of Liability e. Statements of Liability If an employee violates company policy and is caught doing any illegal activity with any company computer resource, Random Widget Works is not liable for any employee actions. Page 20

21 f. Other Disclaimers All damages resulting from employee violating policy may result in termination and or lawsuit. Page 21

22 FAIR AND RESPONSIBLE USE OF RWW 1. Statement of Purpose a. Scope and Applicability Policy is critical for the security of Random Widget Works. It applies throughout the company and it has the strictest security. b. Definition of Technology Addressed is how the company communicates with its employees and to clients outside the company. c. Responsibilities Employees are responsible for knowing the correct way to use so that information security, as well as company ethics policies, is followed. 2. Authorized Uses a. User Access All employees have access to with a username and password. b. Fair and Responsible Use When using , no employee should contact an address that does not have a company . No employee should read or open any if the address is known or does not have a company address. An employee should not use the company for personal use. c. Protection of Privacy All upper management will have protection so that important s cannot be read by many of the employees. These restrictions will prevent sensitive information from being leaked. All s sent on the RRW network are encoded so that if an leaves the company network, it will not be readable. 3. Prohibited Uses a. Disruptive Use or Misuse Page 22

23 No s not related to work shall be sent around company network. This does not include employee birthday, wish list, and company events. No jokes or gossip is to be sent around by . b. Criminal Use Sending company secrets to other companies or news sources is illegal. Sabotaging the company computer system by sending a virus though the company is illegal. c. Offensive or Harassing Materials No descrimitive or offensive s will be permitted. These include sexual, violent, racist, s no matter if the intent was not to be offensive. d. Copyrighted, Licensed, or Other Intellectual Property ing software throughout the network is illegal. All software must be licensed for use on company computers. e. Other Restrictions For security purposes no forwarding company s to personal cell phones. 4. Systems Management a. Management of Stored Materials s are stored in a log on company s server. They can be looked up by CISO, CIO, Database Administrators, with the permission of the CEO. b. Employer Monitoring Every is run through a company filter, which determines key words that might be consider offensive, or associative to computer viruses. All s are logged in company server. c. Virus Protection s are scanned for viruses before they are received and before they are sent out. d. Physical Security Physical Security is needed to make sure no one is using computers off hours and to protect server room. e. Encryption Page 23

24 All s are encrypted so that mail cannot be read outside of the company without being first decrypted. 5. Violations of Policy a. Procedures for Reporting Violations When a violation has occurred, an employee must notify the CISO of the issue. The CISO will then resolve the situation accordingly by talking to the database administration, network administration, and giving a report of the incident to the CIO. b. Penalties for Violations Minor Violations will result in a write up of what the employee did and how it affected the company. For first time violations, employee many be given retraining over information security and proper work ethics. Repeat violations will be treated more severely resulting in requiring employee a leave of absence without pay, and possible termination. Major Violations will result in notification of CISO, CIO, Network Administration, and Database Administration. A hold will be placed on employee s access and report will be developed. Physical Security will obtain employee and police will be called. 6. Policy Review and Modification a. Scheduled Review of Policy Random Widget Works will require a meeting of the Information Security Policy for every quarter. If a new issue arises, immediate meeting must be conducted. A meeting including the CEO, CIO, and CISO will discuss the new threats and the response that will need to be conducted. b. Procedures for Modification The CEO will determine if the changes the policy would best interest Random Widget Works. The changes to policy must coincide with company goals, while keeping business interesting in mind. The CEO will then give permission to update the policy with the new modifications. The CIO can temporary modify policy without approval during system emergences such as disaster or massive system corruption. 7. Limitations of Liability a. Statements of Liability If an employee violates company policy and is caught doing any illegal activity, Random Widget Works is not liable for any employee actions. Page 24

25 b. Other Disclaimers All damages resulting from employee violating policy may result in termination and or lawsuit. Page 25

26 References Knight, Ridder. (2010, August 15). Enterprise information security policy (eisp). Retrieved from Ccs. Neu. Edu/home/chrisv7/capstoneproject/kr_eisp.Aspx. Sans (2009). Sans security policy research projects. Retrieved from Sans. Org/security-resources/sec_policy.php#specific. Whitman, M.E., & Mattord, H.J. (2010). Management of information security. Course Technology Ptr. Page 26

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Niagara County Community College

Niagara County Community College Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:

More information

ACCEPTABLE USE OF COMPUTERS IN WILTSHIRE LIBRARIES

ACCEPTABLE USE OF COMPUTERS IN WILTSHIRE LIBRARIES ACCEPTABLE USE OF COMPUTERS IN WILTSHIRE LIBRARIES Policy Statement Introduction 1. Wiltshire Libraries provide access to the Internet and other computer facilities to support the educational, recreational

More information

Internet Acceptable Use Policy

Internet Acceptable Use Policy 1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth

More information

Policy for the Acceptable Use of Information Technology Resources

Policy for the Acceptable Use of Information Technology Resources Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...

More information

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes

More information

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy 1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines

More information

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78 Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY

More information

APHIS INTERNET USE AND SECURITY POLICY

APHIS INTERNET USE AND SECURITY POLICY United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

How To Behave At A School

How To Behave At A School THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy 1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) 719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Information Security Code of Conduct

Information Security Code of Conduct Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.

More information

Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.

Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

COMPUTER USE POLICY. 1.0 Purpose and Summary

COMPUTER USE POLICY. 1.0 Purpose and Summary COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose

More information

All Users of DCRI Computing Equipment and Network Resources

All Users of DCRI Computing Equipment and Network Resources July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11 Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2

More information

Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy

Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of

More information

COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY

COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY 1 The COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) a consortium of the Colusa County Office of Education (CCOE) with Colusa Unified School District, Maxwell Unified School District, Williams Unified School

More information

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Odessa College Use of Computer Resources Policy Policy Date: November 2010 Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students

Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students AUP Sections 1. Acceptable Use 2. Privileges 3. Internet Access 4. Procedures & Caveats 5. Netiquette

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...

More information

Vail School District Acceptable Use Policy 2015 2016

Vail School District Acceptable Use Policy 2015 2016 Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will

More information

ICT Security Policy for Schools

ICT Security Policy for Schools WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage. Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or

More information

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

Website & Email Hosting Terms & Conditions

Website & Email Hosting Terms & Conditions Website & Email Hosting Terms & Conditions 1-PARTIES Web Hosting Services are provided by TimeForCake Creative Media, Inc. ("TimeForCake") to Client conditional on the terms and conditions set forth below

More information

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

Chapter 15: Computer Security and Privacy

Chapter 15: Computer Security and Privacy Understanding Computers Today and Tomorrow 12 th Edition Chapter 15: Computer Security and Privacy Learning Objectives Explain why all computer users should be concerned about computer security. List some

More information

Riverside Community College District Policy No. 3720 General Institution

Riverside Community College District Policy No. 3720 General Institution Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

INTERNET ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods

More information

One-to-One Technology Initiative Table of Contents

One-to-One Technology Initiative Table of Contents One-to-One Technology Initiative Table of Contents 1. Acceptable Use... 2-4 General Staff Responsibilities Parent and Guardian Responsibilities User Responsibilities Consequences 2. ipad Identification

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4 Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY

HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY This policy applies whenever you are using Heathfield High School information technology equipment or services. It should be read in

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

TECHNOLOGY ACCEPTABLE USE POLICY

TECHNOLOGY ACCEPTABLE USE POLICY Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information