Random Widget Works: Information Security Policy
|
|
|
- Shanon Blair
- 9 years ago
- Views:
Transcription
1 Random Widget Works: Information Security Policy Eric ISA 3300 W-01 Whitman Summer Semester 6/21/2013
2 Table of Contents Organization Overview... 4 Organization Overview... 5 Information Security Policy Need... 6 Enterprise Information Security Policy... 7 Enterprise Information Security Policy... 8 ENTERPRISE INFORMATION SECURITY POLICY FOR RANDOM WIDGET WORKS... 9 Purpose...9 Information Security Elements...9 The Need for Information Security...9 Information Security Responsibilities and Roles...9 Reference to Other Information Technology Standards and Guidelines Issue Specific Security Policies Purpose Authorized Uses Prohibited Uses Systems Management Violations of Policy Policy Review and Modification Limitations of Liability FAIR AND RESPONSIBLE USE OF RWW COMPUTER s Statement of Purpose Authorized Uses Prohibited Uses Systems Management Page 2
3 5. Violations of Policy Policy Review and Modification Limitations of Liability FAIR AND RESPONSIBLE USE OF RWW Statement of Purpose Authorized Uses Prohibited Uses Systems Management Violations of Policy Policy Review and Modification Limitations of Liability References Page 3
4 Random Widget Works Organization Overview
5 Organization Overview Random Widget Works makes quality widgets and equipment for modern businesses. Established in 1995, Random Widget works has grown into the largest manufacturer of widgets and other equipment. It strives to be the preferred manufacturer of choice for every business widget equipment needs. Random Widget Works values commitment, honesty, integrity, and social responsibility among its employees. It is committed to providing services for its corporate, social, legal, and natural environments. Random Widget Works based in Atlanta, Georgia has over 350 employees. The company CEO, Alex Truman, revolutionized the field of widget manufacturing. The Chief Information Officer for Random Widget Works is Mike Edwards who has been a part of Random Widget Works since the beginning. Recently Mike Edwards decided that the company needed to increase its information security. He decided to create a Chief Information Security Officer to help comply with this need. Based on the recommendation of co-worker Charlie Moody; Iris Majwabu was given the position. Page 5
6 Information Security Policy Need Random Widget Works needs an Enterprise Information Security Policy and Issue Specific Security Policies. If the company does not recognize the need for Security, the company will face loss in profits, customers, employees, and has the possibly of being charged with crimes due to laws being broken. A company needs an Enterprise Information Security Policy to plan for all events that may hurt the company. EISP sets the strategic direction for all the organization s security efforts (Whitman, & Mattord, 2010). The EISP is drafted by the Chief Information Security Officer, reviewed and approved by the CIO, and other executives. It does not require frequent modification, unless the direction of the company changes. Random Widget Works will not have to worry about making too many modifications since it has written many of the policies from scratch. When making the EISP, Random Widget Works will need to make policies that will help the company protect itself, but also keeping the Mission and Objectives that it was founded on in Perspective (Whitman, & Mattord, 2010). Issue Specific Security Policy is crucial to Random Widget Works well-being as a company. If a disaster falls on the company, the ISSP will have everything listed that needs to be done. This policy will make technology policies known throughout the company. Managers and employees will know what they should and should not do while at work. This policy protects both the employees and the organization. Page 6
7 Random Widget Works Enterprise Information Security Policy
8 Enterprise Information Security Policy The Enterprise Information Security Policy is known by many names. Some call it security program policy, general security policy, IT policy, and a number of other names (Whitman, & Mattord, 2010). The purpose of this Policy is to set the direction for all of the company s security needs. Enterprise Information Security manages, develops, and implements the requirements of an information security program. For these programs to be made they must be approved throughout the organization by information security management, IT development, IT operations, and others (Whitman, & Mattord, 2010). When designing an EISP for Random Widget Works, we keep in mind of the company s mission, vision, and values. If the EISP does not coincide with the company s mission, vision, and values, the policy will not benefit the company or make sense. Random Widget Works strives to be the leader in widget machinery so an EISP plan needs to be made that will not only protect the company s interests but also not restrict its ability to develop into the company it wants to become. The EISP in companies differ depending on their needs but they all have some similarities. An EISP states the company s viewpoint of security. Are they strict with security or are they more easy going? The EISP has information about the design of the Information Security Organization and who is responsible for the information security role. It then states the responsibility of all members of the company for security (Whitman, & Mattord, 2010). A good EISP document has a number of important components. The purpose, tells what the policy is, what the reasoning is and what it includes. An element of the Information Security document defines the different security viewpoints for Random Widget Works EISP. The next component is the Need section, which tells about the organization and what is needed to protect assets in regards to clients, employees, or other companies. Additional components are the list of responsibilities in an organization and the roles to support Information Security in the company. The last component lists the laws the company must abide by (Whitman, & Mattord, 2010). Page 8
9 ENTERPRISE INFORMATION SECURITY POLICY FOR RANDOM WIDGET WORKS Purpose This policy establishes Information Security Practices for machinery, computer equipment, telecommunications, , and other incidents (Whitman, & Mattord, 2010). This policy is intended to give guidance for the company so all employees follow operating procedure when doing their given task with Random Widget Works. Managers, Information Security, as well as other employees will have assigned roles and levels of security clearance. Information Security Elements Information Security is the protection of data, and the software and hardware that uses that data. Random Widget Work s Information Security is based on the need to maintain Confidentiality, integrity, and availability of information. The information security model consists of training and education, policies, and employee/ customer protection (Whitman, & Mattord, 2010). The Need for Information Security Information Security is a necessity for all legal and ethical issues, and it is obligated to protect its clients and employees sensitive information. Information security is needed to protect Random Widget Works from employee errors, criminal activity, disasters, and system failure. Data Integrity and Confidentiality is a major concern with Random Widget Works. Random Widget Works strives to protect the company by putting in safeguards so that errors will be detected and prevented. With an Information Security System, all issues will be dealt with appropriately and modifications will be made on occurrence to make the security system stronger. Information Security Responsibilities and Roles Chief Information Officer: The Chief information officer is responsible for overseeing the implementation of the Information Security Policy. The CIO reviews the recommended strategies for the Page 9
10 implementation of the Information Security Policy. Determines if the business impact of the strategy will be harmful for the company and makes sure that its inline with company s goals. The CIO also oversees the review and approval of the Information Security Policy by company Executives (Knight 2010). Chief Information Security Officer: The Chief Information Security Officer will be in charge of the development of the Information Security Policy. The CISO will develop and document procedures for the Information Security Policy. CISO is responsible for setting up an information security-training program for all employees of Random Widget Works. In event of breach to information security, CISO is responsible for conducting a response (Knight 2010). Data Steward: Data Steward is employee of RWW who sets data classification levels for different levels of employees. The privacy settings allow different levels of access for managers, information security staff, and employees (Knight 2010). The Data Steward ensures controls are met to protect confidentiality, Integrity and availability of data. The Data Steward is in charge of distribution of passwords, accounts throughout company (Knight 2010). Users: A user is anyone employed or client conducting business with Random Widget Works. All users must follow guideline and procedures specified by Information Security Policy. All users must report any breach of security to Client Information Security Officer. Reference to Other Information Technology Standards and Guidelines - ISO series Page 10
11 Random Widget Works Issue Specific Security Policies
12 Issue Specific Security Policies Issues: Misuse of telecommunications: When taking calls for the company a person should always answer the calls with a predefined checklist. They should greet the caller; give the name of the company, and provide their name. Some receptionists may not have important information at their disposal but they still must be careful of giving out certain information. If a caller calls to say that he is the manager of a certain division and needs the and phone number of a certain executive, the receptionist should have a policy for the way she conducts business. No information should be given out unless proof has been given and only if the information requested is not be capable of crippling the company if it reaches the wrong hands. A policy for telecommunications is necessary so that hackers will not have the ability to call up claiming to be someone important to receive important information. Misuse of electronic mail: When using the computers at work, only throughout the company should be viewed and sent. When employees use their for outside activities, there is a greater chance the computers can get viruses. A policy needs to be made so if an employee goes against policy and damages the computers at work do to negligence, he or she needs to be held accountable for their actions. To make sure each employee knows what to do with , they should take a mandatory course telling them what they shouldn t do, and what types of s they should look out after to help protect the company. Disaster planning and Incident Response: A fire broke out at Random Widget Works in the break room. The sprinklers turned on and destroyed many computers employees were working on. Luckily, for the employees and the company, the information is stored on the g: drive in a different location of the building. However, what would happen if that room caught fire? Would a sprinkler turn on and destroy all of the servers or would a gas be used to extinguishing the fire? The CISO needs to have a list of policies showing what must be done in an incident. If a fire in the break room ruins computers in the nearby office, the break room may need to be moved into a location where common accidents do not occur. Page 12
13 Employee Conduct: Employee Conduct is another issue that needs to be taken into account. Two employees were at their desks playing cards and eating lunch. One of them was using the compact disc tray as a coffee holder. There are a number of issues with this situation. They should go to the break room for lunch, and never have food out near the computers. The computer is company property and the employees should be accountable for any damages. A client came into the office that day and due to the actions of the employees, he decided not to place an order with Random Widget Works. Employee misconduct hurts the company in many ways, we lose clients, company property damages, and it makes the company acceptable to attacks from viruses and hackers. A policy needs to be in place so there is no question what is allowed at work, and so that the company can protect itself from damages or lawsuits. Page 13
14 FAIR AND RESPONSIBLE USE OF RWW INTERNET AND WWW 1. Purpose a. Scope and Applicability The Internet/World Wide Web Policy covers all aspects associated with the Confidentiality, Integrity, and Availability of information when using the Internet. The entire company is on the Internet on a daily basis and is in contact with employees and clients constantly. b. Definition of Technology Addressed The technologies addressed in this policy are all computers, servers, and machinery that connect to the internet at Random Widget Works. c. Responsibilities The CISO is responsible for developing a program that will train all employees about the correct way to use internet and what is permitting under the Information Security Policy. All users must take training course to understand policy so that no accident incidents will occur when on the internet while at Random Widget Works. 2. Authorized Uses a. User Access Management will have access to conduct internet activates with minimum access restrictions. Only sites that have been marked as potentially harmful will be prohibited. An example of this is no access to pornographic sites or websites prone to viruses such as face book. All employees who require access to internet for research will have the highest level of access because they need total roam capabilities. b. Fair and Responsible Use Fair and Responsible use of internet includes using internet to send throughout the company, and only to employees of company, unless permission is give to to potential clients. Internet usage will be permitted but only on company permits websites under company terms. c. Protection of Privacy All employees will be given an address with an abbreviated name so that employee identities are not easily attained from the outside. For internet use, a username and Page 14
15 password is requiring so that only employee with certain levels of clearance can access internet. 3. Prohibited Uses a. Disruptive Use or Misuse Employees are not permitted to use internet to check bank accounts or personal websites. Playing loud music from internet is also not permitted due to company professional appearance and possible virus threat. b. Criminal Use All internet use for child pornography will be reported to police and employee will be terminated immediately from company. Internet use to sell information or sabotage company is criminal activity. c. Offensive or Harassing Materials Employees are prohibited from view websites that are pornographic, violent, or discriminatory in nature. d. Copyrighted, Licensed, or Other Intellectual Property Downloading any music or software without a license is prohibited. d. Other Restrictions Using internet on personal cell phones to going around company internet restrictions is prohibited. 4. Systems Management a. Management of Stored Materials All materials downloaded off the internet are stored on the g: drive on the company s server. The server will filter out any files considered a threat and manage a log of the source computers. b. Employer Monitoring Page 15
16 An internet log is recorded on the company server, which tells what sites an employee has been visiting and how long each day they spent on the internet. c. Virus Protection All files and websites are first scanned with a Virus Checker. If a threat comes up, the site will be blocked and put on record of list of prohibited sites. d. Physical Security The systems manager will be responsible for monitoring security throughout the company network. If an employee has broken policy procedures, a systems manager can ask physical security to escort employee off company premises until investigation has been completed. e. Encryption The information that is saved from the internet activity is encrypted and stored in the g: drive of the company server. This will prevent research or other sensitive information from being leaked due to intrusions from outside the company. 5. Violations of Policy a. Procedures for Reporting Violations When a violation has occurred, an employee must notify the CISO of the issue. The CISO will then resolve the situation accordingly by talking to the database administration, network administration, and giving a report of the incident to the CIO. b. Penalties for Violations Minor Violations will result in a write up of what the employee did and how it affected the company. For first time violations, employee many be given retraining over information security and proper work ethics. Repeat violations will be treated more severely resulting in requiring employee a leave of absence without pay, and possible termination. Major Violations will result in notification of CISO, CIO, Network Administration, and Database Administration. A hold will be placed on employee s access and report will be Page 16
17 developed. Physical Security will obtain employee and police will be called. Major violations result in employee termination. 6. Policy Review and Modification a. Scheduled Review of Policy Random Widget Works will require a meeting of the Information Security Policy every quarter. If a new internet related issue arises, immediate meeting must be conducted. A meeting including the CEO, CIO, and CISO will discuss the new trends in Security and offer any new changes that might be made to the policy. b. Procedures for Modification After the review of the policy, the CEO will determine if the changes the policy would best interest Random Widget Works. The changes to policy most coincide with company goals, while keeping business interesting in mind. The CEO will then give permission to update the policy with the new modifications. The CIO can temporary modify policy without approval during system emergences such as disaster or massive system corruption. 7. Limitations of Liability a. Statements of Liability If an employee violates company policy and is caught doing any illegal internet activity, Random Widget Works is not liable for any employee actions. b. Other Disclaimers All damages resulting from employee violating policy may result in termination and or lawsuit. Page 17
18 FAIR AND RESPONSIBLE USE OF RWW COMPUTER s 1. Statement of Purpose a. Scope and Applicability All computer equipment used at Random Widget Works including computers, printers, fax machines, servers, company phones, computer notebooks, personal digital assistant (PDA), and other hardware apply to the Computer Resources Policy. c. Definition of Technology Addressed This policy serves to address the issues relating to misuse of company computer property. d. Responsibilities All employees are responsible for knowing company policy and using company computer property that applies to data confidentiality, Integrity, and Availability. As well as information security, employees are responsible for using appropriate work ethics when around equipment. 2. Authorized Uses a. User Access All employees have access to company printers, faxes, and computers. They have the permission to use as long as abiding by company policy. b. Fair and Responsible Use All employees will be trained on safe and proper use of computer equipment. c. Protection of Privacy Employees will have privacy from other employees but a log of all employee activity is maintained on company servers. 3. Prohibited Uses a. Disruptive Use or Misuse All employees must use computer equipment for its intended purpose. No food or drinks are allowed near the computers and no one is allowed to sit on the equipment. b. Criminal Use Page 18
19 Employees will be brought up on criminal charges if caught tampering with the functionality of company computer property, or of caught sabotaging company equipment. c. Offensive or Harassing Materials No employee shall display, print, or fax inappropriate material, which may be pornographic, violent, or discriminative in nature. d. Copyrighted, Licensed, or Other Intellectual Property No installation of software shall be allowed on company property if software is unlicensed. e. Other Restrictions No outside computer resource is prohibited without permission from CISO. 4. Systems Management a. Management of Stored Materials All printed or fax activities are stored in a log in company server. b. Employer Monitoring All employees will be monitored on each computer resource they use. The amount of time spent and amount of resources used will be accounted for and stored in a log under each employee names. c. Virus Protection All computers and other computer hardware are protected from viruses on a network through strict firewalls and virus software. d. Physical Security All computer equipment at Random Widget Works is monitored by surveillance to ensure not property is damaged due to physical damage from disasters such as fire, or incidences such as theft. e. Encryption All data from company is encrypted so that if any data leaves Random Widget Work s company network, the data cannot be interoperated without the company s decryption software. 5. Violations of Policy c. Procedures for Reporting Violations Page 19
20 When a violation of computer resources has occurred, an employee must notify the CISO of the issue. The CISO will then resolve the situation accordingly by talking to the database administration, network administration, and giving a report of the incident to the CIO. d. Penalties for Violations Minor Violations will result in a write up of what the employee did and how it affected the company. For first time violations, employee many be given retraining over information security and proper work ethics. Repeat violations will be treated more severely resulting in requiring employee a leave of absence without pay, and possible termination. Major Violations will result in notification of CISO, CIO, Network Administration, and Database Administration. A hold will be placed on employee s access and report will be developed. Physical Security will obtain employee and police will be called. 6. Policy Review and Modification c. Scheduled Review of Policy Random Widget Works will require a meeting of the Information Security Policy for computer resources semiannually. If a computer resource related issue arises, CISO must be contacted immediately. A meeting including the CEO, CIO, and CISO will discuss any needed modifications to Computer Resource ISSP. d. Procedures for Modification After the review of the policy, the CEO will determine if the changes to policy would best interest Random Widget Works. The changes to policy most coincide with company goals, while keeping business interesting in mind. The CEO will then give permission to update the policy with the new modifications. The CIO can temporary modify policy without approval during system emergences such as disaster or massive system corruption. 7. Limitations of Liability e. Statements of Liability If an employee violates company policy and is caught doing any illegal activity with any company computer resource, Random Widget Works is not liable for any employee actions. Page 20
21 f. Other Disclaimers All damages resulting from employee violating policy may result in termination and or lawsuit. Page 21
22 FAIR AND RESPONSIBLE USE OF RWW 1. Statement of Purpose a. Scope and Applicability Policy is critical for the security of Random Widget Works. It applies throughout the company and it has the strictest security. b. Definition of Technology Addressed is how the company communicates with its employees and to clients outside the company. c. Responsibilities Employees are responsible for knowing the correct way to use so that information security, as well as company ethics policies, is followed. 2. Authorized Uses a. User Access All employees have access to with a username and password. b. Fair and Responsible Use When using , no employee should contact an address that does not have a company . No employee should read or open any if the address is known or does not have a company address. An employee should not use the company for personal use. c. Protection of Privacy All upper management will have protection so that important s cannot be read by many of the employees. These restrictions will prevent sensitive information from being leaked. All s sent on the RRW network are encoded so that if an leaves the company network, it will not be readable. 3. Prohibited Uses a. Disruptive Use or Misuse Page 22
23 No s not related to work shall be sent around company network. This does not include employee birthday, wish list, and company events. No jokes or gossip is to be sent around by . b. Criminal Use Sending company secrets to other companies or news sources is illegal. Sabotaging the company computer system by sending a virus though the company is illegal. c. Offensive or Harassing Materials No descrimitive or offensive s will be permitted. These include sexual, violent, racist, s no matter if the intent was not to be offensive. d. Copyrighted, Licensed, or Other Intellectual Property ing software throughout the network is illegal. All software must be licensed for use on company computers. e. Other Restrictions For security purposes no forwarding company s to personal cell phones. 4. Systems Management a. Management of Stored Materials s are stored in a log on company s server. They can be looked up by CISO, CIO, Database Administrators, with the permission of the CEO. b. Employer Monitoring Every is run through a company filter, which determines key words that might be consider offensive, or associative to computer viruses. All s are logged in company server. c. Virus Protection s are scanned for viruses before they are received and before they are sent out. d. Physical Security Physical Security is needed to make sure no one is using computers off hours and to protect server room. e. Encryption Page 23
24 All s are encrypted so that mail cannot be read outside of the company without being first decrypted. 5. Violations of Policy a. Procedures for Reporting Violations When a violation has occurred, an employee must notify the CISO of the issue. The CISO will then resolve the situation accordingly by talking to the database administration, network administration, and giving a report of the incident to the CIO. b. Penalties for Violations Minor Violations will result in a write up of what the employee did and how it affected the company. For first time violations, employee many be given retraining over information security and proper work ethics. Repeat violations will be treated more severely resulting in requiring employee a leave of absence without pay, and possible termination. Major Violations will result in notification of CISO, CIO, Network Administration, and Database Administration. A hold will be placed on employee s access and report will be developed. Physical Security will obtain employee and police will be called. 6. Policy Review and Modification a. Scheduled Review of Policy Random Widget Works will require a meeting of the Information Security Policy for every quarter. If a new issue arises, immediate meeting must be conducted. A meeting including the CEO, CIO, and CISO will discuss the new threats and the response that will need to be conducted. b. Procedures for Modification The CEO will determine if the changes the policy would best interest Random Widget Works. The changes to policy must coincide with company goals, while keeping business interesting in mind. The CEO will then give permission to update the policy with the new modifications. The CIO can temporary modify policy without approval during system emergences such as disaster or massive system corruption. 7. Limitations of Liability a. Statements of Liability If an employee violates company policy and is caught doing any illegal activity, Random Widget Works is not liable for any employee actions. Page 24
25 b. Other Disclaimers All damages resulting from employee violating policy may result in termination and or lawsuit. Page 25
26 References Knight, Ridder. (2010, August 15). Enterprise information security policy (eisp). Retrieved from Ccs. Neu. Edu/home/chrisv7/capstoneproject/kr_eisp.Aspx. Sans (2009). Sans security policy research projects. Retrieved from Sans. Org/security-resources/sec_policy.php#specific. Whitman, M.E., & Mattord, H.J. (2010). Management of information security. Course Technology Ptr. Page 26
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
Niagara County Community College
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
ACCEPTABLE USE OF COMPUTERS IN WILTSHIRE LIBRARIES
ACCEPTABLE USE OF COMPUTERS IN WILTSHIRE LIBRARIES Policy Statement Introduction 1. Wiltshire Libraries provide access to the Internet and other computer facilities to support the educational, recreational
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Information Security Code of Conduct
Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE
ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
All Users of DCRI Computing Equipment and Network Resources
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY
1 The COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) a consortium of the Colusa County Office of Education (CCOE) with Colusa Unified School District, Maxwell Unified School District, Williams Unified School
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students AUP Sections 1. Acceptable Use 2. Privileges 3. Internet Access 4. Procedures & Caveats 5. Netiquette
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Acceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
Vail School District Acceptable Use Policy 2015 2016
Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will
ICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
DIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY
FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
If you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
Website & Email Hosting Terms & Conditions
Website & Email Hosting Terms & Conditions 1-PARTIES Web Hosting Services are provided by TimeForCake Creative Media, Inc. ("TimeForCake") to Client conditional on the terms and conditions set forth below
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Chapter 15: Computer Security and Privacy
Understanding Computers Today and Tomorrow 12 th Edition Chapter 15: Computer Security and Privacy Learning Objectives Explain why all computer users should be concerned about computer security. List some
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
INTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
One-to-One Technology Initiative Table of Contents
One-to-One Technology Initiative Table of Contents 1. Acceptable Use... 2-4 General Staff Responsibilities Parent and Guardian Responsibilities User Responsibilities Consequences 2. ipad Identification
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4
Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY
HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY This policy applies whenever you are using Heathfield High School information technology equipment or services. It should be read in
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
TECHNOLOGY ACCEPTABLE USE POLICY
Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and
Acceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
