ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose

Size: px
Start display at page:

Download "ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose"

Transcription

1 ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related Policy: Installation and Use of Video Surveillance Equipment Policy Procedure content: Purpose St. Cloud State University is committed to providing a safe environment for students, employees, visitors and guests. To achieve this outcome the University integrates the best practices of policing with technology through the implementation and maintenance of a comprehensive security plan. A comprehensive security plan incorporates the use of video surveillance technology to deter crime and to assist the Department of Safety and Security in the protection of university property and, when necessary, to gather evidence. Scope These procedures provide guidelines for the implementation of the Installation and Use of Video Surveillance Equipment Policy. These procedures apply to all students, faculty, staff, Schools and Departments within the University community. The goal of these procedures is to enhance the safety and security of the campus community, to provide protection to buildings and property and to document and ensure authorized use of controlled access points or alarms, while respecting the reasonable expectation of privacy among members of the community. Nothing in this procedure reduces or is intended to reduce the requirements of Minnesota State Colleges and Universities (MnSCU) Procedure , Acceptable Use of Computers and Information Technology Resources. Use of Video Surveillance Equipment Video surveillance equipment may be used on campus for one or more of the following purposes; to enhance safety and security, to provide protection to buildings and property, and to document activity and ensure authorized use of controlled access 1 P a g e

2 points or alarms. The availability of and allocation of resources in combination with circumstances or specific situations will determine when and if video surveillance equipment is monitored in real time, continuously, or otherwise. 1. Public Safety and Security Video surveillance equipment is used to assist in the protection and safety of the university community, its visitors and guests. Viewing and/or recording of video data of public spaces allows for the detection, assessment, and deterrence of unlawful behavior and student code of conduct violations. 2. Building and Property Protection Video surveillance equipment is used to assist in the protection of, persons, buildings, and property; valuable, hazardous, or sensitive information/materials from interference, damage, demolition, or theft. 3. Access Point and Security Verification Video surveillance equipment is used to document activity and ensure authorized access at controlled access points or alarms. Video Cameras (or web cams) for Marketing, Training, or General Observation Video cameras (or web cams) may be used for viewing and/or recording video images of public spaces for university marketing, employee training, or general observation; e.g., to enhance customer service. Prior authorization will be requested in writing to the Associate Vice President of Safety and Security. Authorization will be determined by the Associate Vice President of Safety and Security in collaboration with the Vice President for Finance and Administration, the Assistant Vice President of Communications and the data privacy compliance officer. Off-Campus Use (access) of Video Surveillance Equipment Certain employees may have a business need to access surveillance equipment data from a non-campus location. Any St. Cloud State University employee who has a business need to access surveillance equipment data must submit a written request for authorization. Authorization will be approved by the Associate Vice President for Safety and Security in collaboration with the Vice President for Finance and Administration. A record of approved off campus authorizations will be maintained by the Department of Safety and Security. 2 P a g e

3 Responsibilities for Off Campus Use Employees will comply with all relevant laws and policies, including but not limited to MnSCU Procedure , Acceptable Use of Computers and Information Technology Resources Only St. Cloud State University approved VPN (Virtual Private Network) connections may be used to access video surveillance equipment data. It is the responsibility of employees with VPN privileges to ensure that unauthorized users are not allowed access to St. Cloud State University internal networks or data. Employees authorized to access video surveillance data are prohibited from recording or manipulating data in any way. Use of VPN technology with personal equipment represents a de facto extension of St. Cloud State University s network. As such users personal equipment are subject to the same rules and regulations that apply to the University-owned equipment, i.e., their machines must be configured to comply with appropriate Security Policies including but not limited to a current operating system and current anti-virus software. Employees will be solely responsible for any Internet provider, equipment, and other costs and charges incurred in the process of using or accessing the video surveillance equipment data. General Principles A. Video surveillance equipment and its associated monitoring are used to protect the safety of persons and property of the University community, to deter crime, and to retrieve data about specific events or incidents. Purposes include, but are not limited to: Protection of individuals, including students, employees, visitors, and guests; Protection of University owned and/or operated property, and buildings, including building perimeters, entrances and exits, lobbies, elevators and corridors, receiving docks, special storage areas, laboratories, cashier locations, and other areas where surveillance is determined necessary to achieve compliance with the scope of the Installation and Use of Video Surveillance Equipment Policy; 3 P a g e

4 Verification of alarms and access control systems; Patrol of common areas and areas accessible to the public, including transit stops, parking lots, public streets, pedestrian walks; and fire exits; Investigation of alleged criminal activity, student code of conduct violations, disciplinary activity, such as, sabotage of research projects, vandalism, theft, and similar incidents. Any diversion of, or use of video surveillance equipment or security technologies for purposes other than those defined in the Installation and Use of Video Surveillance Equipment Policy or Procedures is prohibited. B. Information Technology Services will coordinate the purchase and support of all video surveillance equipment including; hardware, software data storage and outside vendor service contracts. C. The Department of Safety and Security will manage the placement, installation, function and operation of video surveillance equipment as part of a comprehensive campus safety and security plan. A comprehensive campus safety and security plan is developed in collaboration with the appropriate campus constituents. D. Video surveillance and monitoring will be conducted in a manner consistent with University policies and in compliance with relevant professional, ethical and legal standards, including Non-Discrimination, and Sexual Harassment. Selection of subjects for surveillance and monitoring activities based on the characteristics and classifications contained in the Non-Discrimination Policy (e.g., race, gender, sexual orientation, national origin, disability, etc.) are strictly prohibited. E. All personnel involved in monitoring or control of video surveillance equipment and data will be trained and supervised. Training will include review and confirmation of understanding of SCSU s Video Surveillance Protocol (see below) and appropriate policies, procedures, professional, ethical and legal standards. 4 P a g e

5 Violations of professional, ethical, and legal standards or SCSU s surveillance procedures protocol may result in disciplinary action consistent with the rules and regulations governing university employees. F. Use of video surveillance and monitoring will not violate the reasonable expectation of privacy. A reasonable expectation of privacy exists for students in their personal residential rooms/apartments. Surveillance and monitoring for safety and security purposes will not be routinely used in residential hallways and lounges. When a specific safety or security risk has been determined to exist by the Associate Vice President for Safety and Security, in consultation with the Director of Residential Life, surveillance equipment will be utilized in hallways and lounge areas. Surveillance and monitoring of residential rooms shared by more than one resident or apartment common areas is not permitted under the policy without authorization from all residents of the subject apartment or room. G. The existence of the Installation and Use of Video Surveillance Equipment Policy and Procedure does not imply or guarantee that video surveillance equipment will be constantly monitored in real time. H. All existing uses of video surveillance equipment will be brought in to compliance with the Installation and Use of Video Surveillance Equipment Policy and Procedures within twelve (12) months of the approval of the policy. All departments with existing equipment will work with Information Technology Services to integrate their CCTV systems with University standard. All departments with existing video surveillance equipment will provide a written plan to Information Technology Services and The Department of Safety and Security within six (6) months of policy approval. All departments with existing video surveillance equipment who are not in compliance twelve (12) months after policy approval will be required to discontinue video surveillance equipment use until compliance is achieved. 5 P a g e

6 I. One year following the adoption of the Installation and Use of Video Surveillance Equipment Policy and Procedure, the Associate Vice President for Safety and Security shall assemble a representative user group to review the implementation of the policy and procedure and develop recommendations for revision. If policy and procedure revision is needed a revised draft will be provided to the Vice President of Finance and Administration in accordance with the university policy revision process. General Responsibilities A. All University areas using or intending to use video surveillance equipment are responsible for compliance with the Installation and Use of Video Surveillance Equipment Policy and Procedures, including SCSU s Video Surveillance Protocol. B. SCSU s Video Surveillance Protocol is in addition to applicable Federal, State, Local and University Policies related to video surveillance. C. Information Technology Services and the Department of Safety and Security are responsible for reviewing video surveillance equipment operations, including recording, storage, monitoring, access, and retention. D. Decision by the Associate Vice President for Safety and Security regarding video surveillance equipment may be appealed to the Vice President of Finance and Administration. The Vice President of Finance and Administration will review available information and render a decision. Responsibility and Authority It is everyone s responsibility to share concerns and raise awareness of safety and security issues to contribute to the creation of a safe and secure community. It is the responsibility of all administrators and department heads, and SCSU Department of Safety and Security, to make recommendations about the level of security required on campus. Decisions to install video surveillance equipment as a component of a comprehensive safety and security plan may be reached through consultation and deliberation with certain individuals and groups. Department of Safety and Security 6 P a g e

7 The Department of Safety and Security, in consultation with the Vice President for Finance and Administration, has authority to oversee the use of video surveillance equipment and its monitoring as part of a comprehensive safety and security plan. The Associate Vice President for Safety and Security, or designee, is responsible for authorization of all video surveillance equipment use and monitoring. This includes any temporary installation deemed necessary in connection with criminal investigation, enhanced security for special events or as otherwise deemed necessary to protect the safety and security of the university. The Department of Safety and Security will work in consultation and collaboration with Information Technology Services to achieve video surveillance equipment goals. The Department of Safety and Security is actively involved in an advisory and advocacy role in all projects which either have or use video surveillance equipment. The Department of Safety and Security will assist the office/department/group in preparing a request for video surveillance equipment installation and use, or video surveillance equipment removal. The Department of Safety and Security will maintain a list of all video surveillance equipment deployed throughout campus and will, with the designated surveillance equipment contacts, monitor system operability for all video surveillance equipment on campus. The Department of Safety and Security will coordinate any necessary interfaces to the security system and local vendors with the support of Information Technology Services. Requesting Office/Department/Group An office/department/group requesting to install video surveillance equipment must prepare an application for video surveillance equipment installation and use. The requesting office/department/group is responsible for ensuring that all video surveillance equipment installed is assigned to a designated surveillance equipment contact. The requesting office/department/group is responsible for lifecycle funding for video surveillance equipment and for compliance with established standards. Surveillance Equipment Contact 7 P a g e

8 The surveillance equipment contact is an individual designated by the head of the requesting department who has duties within the department related to surveillance equipment management. The surveillance equipment contact is the custodian of the assigned video surveillance equipment. The surveillance equipment contact is specifically responsible for proper operation of video surveillance equipment and ensuring lawful and sound use as standards and policies are revised and changed. The surveillance equipment contact will be a departmental liaison with the Department of Safety and Security and Information Technology Services and a representative on the video surveillance user group. Role of the Vice President The vice president of the requesting unit has the authority to approve or deny installation and use of video surveillance equipment. The vice president will be included in the development of a proposal for installation of video surveillance equipment Role of Information Technology Services Information Technology Services will support the development of system design, operating standards, replacement cycles, system maintenance, and procurement of equipment. Information Technology Services will determine and allocate the necessary data storage required for video surveillance equipment and compliance with storage and retention schedules. Information Technology Services will identify necessary back up criteria and disposal schedules. Information Technology Services are responsible for developing and maintaining standards for the operation of video surveillance equipment open to public web browsers for both on and off campus use. Video surveillance feeds including data and images that are available via public web browser will be neither monitored nor archived under normal operations. Release of Data Data obtained through use of video surveillance equipment will only be released when approved by the Associate Vice President for Safety and Security in collaboration with the Vice President of Finance and Administration and the data privacy compliance officer. 8 P a g e

9 Requests for release of data obtained through use of video surveillance equipment Must be received in writing. Must identify the entity/person/campus office/department/outside agency making the request. Must specify the purpose of the request and the manner in which the data is intended to be used. Must provide justification for release of data and support (as needed). The Department of Safety and Security will log and keep a record of data release requests and outcomes. Prior to release of data the Department of Safety and Security may be required to obscure the images of incidental or non-subject persons captured in surveillance video in compliance with data privacy. All warrants received for video surveillance data from outside law enforcement agencies will be referred to the Associate Vice President for Safety and Security. The Associate Vice President for Safety and Security, or designee in consultation with the Special Advisor to the President will comply with warrants received from outside law enforcement agencies. A copy of the warrant will be retained and forwarded to legal counsel. Subpoenas received for release of information will be referred to legal counsel. When legal counsel approves release of subpoenaed information the Associate Vice President of Safety and Security, in consultation with the Special Advisor to the President, will be responsible for providing the require information. St. Cloud State University is committed to the protection of data and compliance with government data privacy act regulations. SCSU s Video Surveillance Protocol 1. All operators and supervisors working with video surveillance equipment will perform their duties in accordance with the Installation and Use of Video Surveillance Equipment Policy and Procedures. 2. The Department of Safety and Security will limit video surveillance equipment positions and views of residential housing in compliance with the Installation and Use of Video Surveillance Equipment Policy and the reasonable expectation of privacy. 9 P a g e

10 3. Surveillance monitoring centers will be configured to prevent video surveillance equipment operators tampering with or duplicating recorded information. 4. Recordings will be retained in a secure location with access by authorized personnel only. 5. Recordings may be retained for a period not to exceed 30 days and will then be erased, unless retained as part of a criminal investigation or court proceedings (criminal or civil), or other bona fide use as approved by the Associate Vice President for Safety and 6. Video surveillance equipment operators who view recordings must do so in the presence of a supervisor to maintain the integrity of the recording. 7. Video surveillance equipment operators will be trained in the technical, legal and ethical parameters of appropriate use. Video surveillance equipment operators will receive a copy of the Installation and Use of Video Surveillance Equipment Policy and Procedures, including the SCSU surveillance procedures Code of Conduct and provide written acknowledgement that they have read and understood its contents. 8. Video surveillance equipment operators will not select subjects to monitor based on characteristics of race, gender, ethnicity, sexual orientation, disability, or other classifications protected by Non-Discrimination Policy. Video surveillance equipment operators will monitor based on suspicious behavior, not individual characteristics. 9. Video surveillance equipment operators will not view private rooms or areas through windows. 10. Video surveillance equipment operators will operate equipment in a manner consistent with the intent of the Installation and Use of Video Surveillance Equipment Policy. Video surveillance equipment will be used: to enhance security; to detect, asses and deter unlawful behavior and student code of conduct violations; to protect person, buildings and property; and to monitor and ensure authorized access at controlled access points and alarms. Any operation or use that falls outside of these parameters is expressly prohibited. 11. Portable hidden cameras, with or without recording equipment, will only be used for law enforcement purposes and with the knowledge and approval of the Associate Vice President of Safety and Security. Procedure Owner: Vice President of Finance and Administration Procedure Contact: Associate Vice President of Safety and Security 10 P a g e

11 Other Documents: Minnesota State Colleges and Universities (MnSCU) Procedure , Acceptable Use of Computers and Information Technology Resources. Effective Date: Enter effective date here. 11 P a g e

University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version

University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version V.D. Closed Circuit Television Monitoring and Recording of Public Areas for Safety and Security Purposes (Source:

More information

Surveillance Equipment

Surveillance Equipment University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of

More information

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating

More information

Title of the Policy: Surveillance Policy

Title of the Policy: Surveillance Policy Title of the Policy: Surveillance Policy Functional Area: University Police Applies To: All Faculty and Staff Policy Reference(s): Number: Version 1.0 Date First Issued: March 15, 2016 Date Last Reviewed:

More information

Camera Use. Policy Statement and Purpose. Table of Contents

Camera Use. Policy Statement and Purpose. Table of Contents Camera Use Policy Type: Administrative Responsible Office: VCU Police Department Initial Policy Approved: 12/04/2015 Current Revision Approved: New Policy Statement and Purpose VCU is committed to enhancing

More information

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same POLICY TEMPLATE Video Surveillance Category: Approval: Responsibility: Date: Operations PVP VP Finance and Administration Date initially approved: November 5, 2013 Date of last revision: same Definitions:

More information

Stanford University Video Surveillance System Guidelines

Stanford University Video Surveillance System Guidelines Stanford University Video Surveillance System Guidelines Effective Date: May 1, 2014 Stanford University / Video Surveillance System Guidelines Page 1 Video Surveillance System Guidelines Statement All

More information

MODESTO CITY SCHOOLS Administrative Regulation

MODESTO CITY SCHOOLS Administrative Regulation MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized

More information

NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises)

NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises) NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises) A. NMSU Entities requesting security cameras will be required to follow the procedures outlined below. 1. Justification

More information

Bates Technical College. Information Technology Acceptable Use Policy

Bates Technical College. Information Technology Acceptable Use Policy Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment

More information

University of Maryland Baltimore Information Technology Acceptable Use Policy

University of Maryland Baltimore Information Technology Acceptable Use Policy The UMB School of Nursing follows and adheres to the UMB Campus Information Technology Acceptable Use Policy. The UMSON further defines Authorized User to also include any person who receives a password

More information

Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications

Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.

More information

Policy for the Acceptable Use of Information Technology Resources

Policy for the Acceptable Use of Information Technology Resources Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...

More information

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration

More information

Westmoreland Intermediate Unit Internet Acceptable Use Policy

Westmoreland Intermediate Unit Internet Acceptable Use Policy Westmoreland Intermediate Unit Internet Acceptable Use Policy Overview: The Westmoreland Intermediate Unit provides Internet access to administrators, teachers, and students in the school districts of

More information

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy 1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines

More information

OIPC Guidelines for Video Surveillance by Public Bodies in Newfoundland and Labrador, June 2015 ATIPPA, 2015 Criminal Code of Canada

OIPC Guidelines for Video Surveillance by Public Bodies in Newfoundland and Labrador, June 2015 ATIPPA, 2015 Criminal Code of Canada PURPOSE: To enhance protection for employees and visitors, strengthen security of infrastructure/town facilities and assist law enforcement agencies with investigations. AUTHORITY: OIPC Guidelines for

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

CCTV Cameras Policy. Policy Guidelines

CCTV Cameras Policy. Policy Guidelines CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes

More information

COMPUTER USE POLICY. 1.0 Purpose and Summary

COMPUTER USE POLICY. 1.0 Purpose and Summary COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive

More information

OLYMPIC COLLEGE POLICY

OLYMPIC COLLEGE POLICY TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,

More information

SOUTH DAKOTA BOARD OF REGENTS. Policy Manual

SOUTH DAKOTA BOARD OF REGENTS. Policy Manual SOUTH DAKOTA BOARD OF REGENTS Policy Manual SUBJECT: Acceptable Use of Information Technology Systems NUMBER: 7:1 1. Purpose The Board acquires, maintains and operates information technology systems to

More information

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES 1. PROCEDURE SUMMARY STATEMENT To establish procedures relating

More information

UNIVERSITY OF MANITOBA POLICY CLOSED CIRCUIT TV (CCTV) MONITORING. Part I Reason for Policy

UNIVERSITY OF MANITOBA POLICY CLOSED CIRCUIT TV (CCTV) MONITORING. Part I Reason for Policy UNIVERSITY OF MANITOBA POLICY Policy: Effective Date: October 1, 2012 Revised Date: November 20, 2012 Review Date: October 1, 2022 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

BERKELEY COLLEGE DATA SECURITY POLICY

BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data

More information

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Acceptable Use of Information Technology

Acceptable Use of Information Technology Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:

More information

Southern Law Center Law Center Policy #IT0004. Title: Email Policy

Southern Law Center Law Center Policy #IT0004. Title: Email Policy Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of

More information

Ethical and Responsible Use of EagleNet 03/26/14 AMW

Ethical and Responsible Use of EagleNet 03/26/14 AMW Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of

More information

College of DuPage Information Technology. Information Security Plan

College of DuPage Information Technology. Information Security Plan College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

JHSPH Acceptable Use Policy

JHSPH Acceptable Use Policy 1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and

More information

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing

More information

COLLINS CONSULTING, Inc.

COLLINS CONSULTING, Inc. COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

APPENDIX C. HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative)

APPENDIX C. HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative) APPENDIX C HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative) This section of the Code of Conduct has been adapted from the Greenfield Public

More information

Lutheran Education Association of Houston Acceptable Use Policy (Students)

Lutheran Education Association of Houston Acceptable Use Policy (Students) Lutheran Education Association of Houston Acceptable Use Policy (Students) With the use of technology, including the Internet, Intranet, hardware and software, the Lutheran Education Association of Houston

More information

TECHNOLOGY ACCEPTABLE USE POLICY

TECHNOLOGY ACCEPTABLE USE POLICY Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and

More information

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY - 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,

More information

8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES. Policy Statement COLLEGE OF CHARLESTON POLICY ON

8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES. Policy Statement COLLEGE OF CHARLESTON POLICY ON OFFICIAL POLICY 8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 03/21/11 Policy Statement COLLEGE OF CHARLESTON POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 1.0 PURPOSE OF POLICY The purpose

More information

2013 Annual Security Report: Boston University Brussels

2013 Annual Security Report: Boston University Brussels 2013 Annual Security Report: Boston University Brussels 1. Brief Overview of Program, Enrollment and Facilities Boston University Brussels serves 140 to 200 students each year, offering graduate certificate

More information

Administrative Procedure

Administrative Procedure Administrative Procedure Effective: 12/21/2012 Supersedes: N/A Page: 1 of 5 Subject: SECURITY ALARMS 1.0. PURPOSE: The purpose of this procedure is to coordinate and control the installation, monitoring,

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources Appendix I The City University of New York Policy on Acceptable Use of Computer Resources Introduction CUNY s computer resources are dedicated to the support of the university s mission of education, research

More information

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Information Security Policy and Handbook Overview. ITSS Information Security June 2015 Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information

More information

Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools

Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of

More information

POLICY SUPPORT OPERATIONS 5042 ACCEPTABLE USE POLICY FOR NETWORK AND INTERNET ACCESS

POLICY SUPPORT OPERATIONS 5042 ACCEPTABLE USE POLICY FOR NETWORK AND INTERNET ACCESS I. Overview Network and Internet access is available to students, teachers and staff in the Oneida City School District. The District s goal in providing such services is to promote educational excellence

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

III. RESPONSIBILITIES

III. RESPONSIBILITIES Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 1 of 5 I. POLICY & SCOPE This is the SUNY College at Old Westbury policy on College-provided access to electronic information

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

State University of New York College at Old Westbury. Domestic Violence and the Workplace Policy

State University of New York College at Old Westbury. Domestic Violence and the Workplace Policy State University of New York College at Old Westbury Domestic Violence and the Workplace Policy Policy Statement The persons covered by this policy are: employees of SUNY College at Old Westbury (the College

More information

DIOCESE OF DALLAS. Computer Internet Policy

DIOCESE OF DALLAS. Computer Internet Policy DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used

More information

COMPUTER AND NETWORK USAGE POLICY

COMPUTER AND NETWORK USAGE POLICY COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.

More information

Policy on Public and School Bus Closed Circuit Television Systems (CCTV)

Policy on Public and School Bus Closed Circuit Television Systems (CCTV) DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version

More information

Administrative Procedure 3720 Computer and Network Use

Administrative Procedure 3720 Computer and Network Use Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District

More information

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

Electronic Communications System

Electronic Communications System Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as

More information

Peer to Peer File Sharing and Copyright Infringement Policy

Peer to Peer File Sharing and Copyright Infringement Policy Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct

More information

How To Use Your Cell Phone At Renaissance Academy Charter School

How To Use Your Cell Phone At Renaissance Academy Charter School Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance

More information

Internet Acceptable Use Policy

Internet Acceptable Use Policy 1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth

More information

Use of ESF Computing and Network Resources

Use of ESF Computing and Network Resources Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among

More information

Procedure 1B.1.1 Report/Complaint of Discrimination/Harassment Investigation and Resolution

Procedure 1B.1.1 Report/Complaint of Discrimination/Harassment Investigation and Resolution Minnesota State Colleges and Universities System Procedures Chapter 1B System Organization and Administration / Equal Education and Employment Opportunity Report/Complaint of Discrimination/Harassment

More information

IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE

IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict

More information

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems. VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0

More information

RIVERVIEW SCHOOL DISTRICT

RIVERVIEW SCHOOL DISTRICT No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK

More information

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)

More information

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Odessa College Use of Computer Resources Policy Policy Date: November 2010 Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational

More information

The District's Electronic Communications System - A Review

The District's Electronic Communications System - A Review ROBINSON INDEPENDENT SCHOOL DISTRICT ACCEPTABLE USE POLICY (AUP) The Superintendent or designee will oversee the District's electronic communications system. The District's system will be used only for

More information

CODE OF ETHICS AND BUSINESS CONDUCT

CODE OF ETHICS AND BUSINESS CONDUCT CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business

More information

MICHIGAN JEWISH INSTITUTE Policy and Procedure Manual

MICHIGAN JEWISH INSTITUTE Policy and Procedure Manual Effective Date: June 2003 Page No. 1 of 12 GENERAL PURPOSE: This policy is intended to provide a process and procedure that will increase awareness of campus safety and security issues and to communicate

More information

2.82.010 Government records findings--recognition of public policy.

2.82.010 Government records findings--recognition of public policy. Chapter 2.82 RECORDS MANAGEMENT 2.82.010 Government records findings--recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake County

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04

2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04 2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04 A. Keys 1) Sul Ross State University maintains a centralized key and lock system to enhance the control and security of property

More information

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with

More information

UNIVERSITY OF CALIFORNIA SANTA CRUZ LABOR STRIKE PLAN

UNIVERSITY OF CALIFORNIA SANTA CRUZ LABOR STRIKE PLAN UNIVERSITY OF CALIFORNIA SANTA CRUZ LABOR STRIKE PLAN Revised: March 2014 TABLE OF CONTENTS UC STRIKE - PROCEDURE... 3 UC STRIKE OBJECTIVES... 3 UCSC STATEMENT ON FREE SPEECH AND ASSEMBLY..3 INCIDENT COMMAND

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

All individuals with access to Twin Falls School District technology and computer networks will:

All individuals with access to Twin Falls School District technology and computer networks will: Twin Falls School District #411 Computer and Network Use Policy 201 Main Avenue West Twin Falls, Idaho 83301 Telephone: 208-733-6900 Fax: 208-733-6987 Technology users responsibilities go beyond general

More information

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of

More information

5. Users of ITS are the persons described above under Policy Application of the diocese of Springfield in Illinois.

5. Users of ITS are the persons described above under Policy Application of the diocese of Springfield in Illinois. Diocese of Springfield in Illinois Section I General Statement 1. Information Technology Systems (ITS), when properly used, provide timely communication and technological support to help fulfill the mission

More information

Chapter 2.82 - RECORDS MANAGEMENT Sections:

Chapter 2.82 - RECORDS MANAGEMENT Sections: Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake

More information

TITLE: SCCD ELECTRONIC INFORMATION RESOURCES

TITLE: SCCD ELECTRONIC INFORMATION RESOURCES SEATTLE COMMUNITY COLLEGE DISTRICT PROCEDURE NUMBER: 259.10-40 TITLE: SCCD ELECTRONIC INFORMATION RESOURCES 259.10 Definitions: 259.10.01 Electronic Information Resources (EIRs). All electronic hardware,

More information

North Clackamas School District 12

North Clackamas School District 12 North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology

More information

ESI Incident Response Procedures 1

ESI Incident Response Procedures 1 ESI Incident Response Procedures 1 Core Document Approval Date, USNH Legal Counsel: 2/12/2010 Core Document Approval Date, UNH CIO: Pending Objectives 1. Understand which policies, procedures and laws

More information

UK SBS Physical Security Policy

UK SBS Physical Security Policy UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following

More information

Security Systems Surveillance Policy

Security Systems Surveillance Policy Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Non-Discrimination and Anti-Harassment Policy OP 03.03

Non-Discrimination and Anti-Harassment Policy OP 03.03 Non-Discrimination and Anti-Harassment Policy OP 03.03 Policy Mississippi State University is committed to assuring that the University and its programs are free from discrimination and harassment based

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

Hyde School Student Computer Systems Acceptable Use Policy

Hyde School Student Computer Systems Acceptable Use Policy Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding

More information

Security Management Plan

Security Management Plan Effective Date: 03/2015 1 of 10 I. Table of Contents: I Table of Contents II Authority III Purpose & Scope IV Policy Statement V The Joint Commission Standards VI Performance Standards VII DUPD Services

More information

Corporate Policy and Procedure

Corporate Policy and Procedure Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install

More information