Internet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014
|
|
- Cordelia Berry
- 8 years ago
- Views:
Transcription
1 Internet Acceptable Use Policy A council-wide information management policy Version 1.5 June 2014
2 Copyright Notification Copyright London Borough of Islington 20134This document is distributed under the Creative Commons Attribution 2.5 license. This means you are free to copy, use and modify all or part of its contents for any purpose as long as you give clear credit for the original creators of the content so used. For more information please see: Contacts If you need any further information about this document or any clarity about the contents of the document, please contact: Sinead Mulready (Data Security Manager). Revision History Date Version Reason for change Author Updated in light of changes to ICT policies and Sinead Mulready infrastructure Following discussion with Jeremy Tuck Sinead Mulready Review and revisions throughout the policy Jeremy Tuck Following revisions by Corporate management Sinead Mulready Board 21 June 1.4 Annual policy review Sinead Mulready 2013 June Annual policy review Sinead Mulready Page 2 of 10
3 TABLE OF CONTENTS 1 PURPOSE OF THIS DOCUMENT PART OF AN UMBRELLA ICT POLICY FRAMEWORK BACKGROUND APPLYING THE POLICY PERSONAL USE OF THE INTERNET IS SUBJECT TO MANAGEMENT APPROVAL EMPLOYEES MUST USE THE INTERNET ACCEPTABLY EMPLOYEES MUST NOT STORE COUNCIL DATA ON THIRD PARTY WEBSITES ACCESS TO ONLINE STORAGE SITES IS CONTROLLED WEB BASED PERSONAL MUST NOT BE USED FOR COUNCIL BUSINESS THE INTERNET MUST NOT BE USED FOR PRIVATE BUSINESS COUNCIL MUST NOT BE USED ON WEBSITES INTERNET USE WILL BE MONITORED REPORTING INCIDENTS POLICY COMPLIANCE GOVERNANCE, APPROVAL AND REVIEW CORPORATE GOVERNANCE GROUP FORMAL APPROVAL, ADOPTION AND REVIEW APPENDIX A: ACCOUNT MONITORING FORM APPENDIX B ACCESS TO ONLINE STORAGE...8 Page 3 of 10
4 1 PURPOSE OF THIS DOCUMENT This document sets out the policy on the use of the Internet on the Council network, how it is permitted and how it is monitored. 2 PART OF AN UMBRELLA ICT POLICY FRAMEWORK This policy should be read in conjunction with the Islington ICT Security Policy Framework, which sets out the overarching approach to Information and Communication Technology (ICT) policies in Islington Council. The framework lists the other policies, which together aim to protect the Council s information technology assets, such as computer hardware and software, telecommunications equipment and data held within the council s IT systems. 3 BACKGROUND The Internet provides the council with access to valuable sources of information as well as inexpensive connectivity to a wide range of third parties. It is seen as an important part of the council s communication infrastructure. Use of the Internet by employees of the council is permitted and encouraged where such use supports the goals and objectives of service delivery. However, the council has a policy for the use of the Internet whereby employees must ensure that they comply with current legislation, use the Internet in an acceptable way, and do not create unnecessary business risk to the council by their misuse of the Internet. This policy should be read in conjunction with the council s Social Media Policy, which sets out how council staff should use social media. 4 APPLYING THE POLICY 4.1 Personal Use of the Internet is subject to management approval Members of staff must obtain approval from their line manager to use the council network to browse the Internet for personal use. If a member of staff is asked to reduce the amount of personal time spent on the Internet, for any reason, they must comply. 4.2 Employees must use the Internet acceptably The following is deemed unacceptable use or behaviour by employees: a) visiting Internet sites that contain obscene, hateful, pornographic or otherwise illegal material b) using the computer to perpetrate any form of fraud, or software, film or music piracy c) using the Internet to send offensive or harassing material to other users d) downloading commercial software or any copyrighted materials belonging to third parties, unless this download is covered or permitted under a commercial agreement or other such licence e) gaining access to unauthorised areas ( hacking ) f) creating or supporting any Internet messages or postings that are intended to harass, annoy or alarm any person or organisation g) publishing defamatory and/or knowingly false material about the council, members of staff, or customers on social networking sites, blogs (online journals), or any online publishing format h) revealing confidential information about the council in a personal online posting, upload or transmission - including financial information and information relating to our customers, business plans, policies, staff and/or internal discussions i) undertaking deliberate activities that waste staff effort or networked resources j) introducing any form of malicious software into the corporate network. Page 4 of 10
5 4.3 Employees must NOT store council data on third party websites The council cannot guarantee the security of third party websites or data storage. Therefore, no council data may be stored or sent to such websites. This includes such storage and file transfer sites as Dropbox or Googledocs. All business-related information produced, collected and/or processed in the course of council work remains the property of the council. This includes such information stored on third-party websites such as webmail service providers and social networking sites, such as Facebook and LinkedIn. Where the council has a legal requirement to share data with another organisation and it is necessary to upload the data onto a third party website, this must be approved by an appropriately senior person within that department. 4.4 Access to online storage sites is controlled The council blocks access to online storage sites by default. However, the council acknowledges that partner organisations do use such sites to distribute necessary documentation and that council staff may periodically require access to such sites as a result. Requests for access to online storage must be logged on ICT Help Me. The online storage form (Appendix B) must be completed and attached to the work request. They must confirm that they will not upload any council data containing personally identifiable data into the site. This must be approved by the Data Security Manager or a member of her team before access to the site is provided. When a member of staff needs to retrieve a one-off document from an online storage site, Digital Services will pick this document up and save it to the council network in an appropriate location. Where access to an online storage site is granted to a member of staff, it will be allowed only for the necessary period of time. 4.5 Web based personal must not be used for council business Web-based personal must never be used to conduct council business. Council data must not be forwarded to personal web-based without the knowledge and explicit written consent of a manager. 4.6 The Internet must not be used for private business No member of staff is permitted to use council Internet access, at any time, for private business activities. 4.7 Council addresses must not be used on websites Council addresses may not be used when registering on web sites for personal use. 4.8 Internet use will be monitored Islington Council accepts that the use of the Internet is a valuable business tool and provides Internet-related resources for business purposes. However, its misuse can have a negative impact upon employee productivity and the reputation of the business. The council will monitor Internet access by staff and will maintain a log of volume of Internet and network traffic, together with all websites visited by council staff. The council also blocks and filters access to Internet sites that are considered inappropriate or offensive. The ability to access a website does not in itself mean you are permitted to visit it. Page 5 of 10
6 If a manager has concerns about the level of personal Internet use by a member of staff, they may request an investigation be carried out, by logging a work request on ICT Help Me. They must complete the Account Monitoring Form which can be found in Appendix A. 5 REPORTING INCIDENTS It is the duty of all users to immediately report any actual or suspected breaches in information security to Digital Services in line with the council s Security Incident Management Policy. Any such incidents must be reported through ICT Help Me and labelled Data Security Incident. 6 POLICY COMPLIANCE If any user is found to have breached this policy, they may be subject to the Council s disciplinary procedure. If a criminal offence is considered to have been committed further action may be taken to assist in the prosecution of the offender(s). If you do not understand the implications of this policy or how it may apply to you, seek advice from Digital Services. 7 GOVERNANCE, APPROVAL AND REVIEW 7.1 Corporate Governance Group This policy framework and the commitment to security management is subject to continuous, systematic review and improvement. This council-wide technology policy will be governed by the Corporate Governance Group (CGG), chaired by the Director of Finance, who is also the council s Senior Information Risk Owner. The CGG has a clear terms of reference and reports directly into the Corporate Management Board. 7.2 Formal approval, adoption and review This policy will be formally signed off by the Corporate Management Board. The Data Security Manager will lead an annual review of all ICT Security Policies. Page 6 of 10
7 8 APPENDIX A: ACCOUNT MONITORING FORM Digital Services ACCOUNT MONITORING REQUEST FORM Due to our obligations under the Data Protection Act 1998 it is necessary to complete this form if you wish to access information from the council s network relating to any members of staff. By signing this form you agree that you are requesting this information for the purpose(s) you state below and it will be held for these purpose(s) only. INFORMATION ABOUT THE MEMBER OF STAFF WHO IS THE SUBJECT OF THE SEARCH: Name: Job title: Place of work: Line manager: Please list below the purpose(s) of your request (provide as much details as possible): If there is additional need for confidentiality about this request, please provide additional information by to the Data Security Manager. AUTHORISING REQUESTER: Page 7 of 10
8 Print Name: Signature: Job title: Place of work: Date: Authorising Manager: Signature: Date: You agree to make no further uses of the information you obtain other than for the purposes stated above. You agree to keep secure any information you obtain or securely destroy the information, when it is no longer required. 9 APPENDIX B ACCESS TO ONLINE STORAGE Page 8 of 10
9 The council blocks access to websites that allow online storage of data. It is important to note that personal data about residents, staff, customers and clients may NEVER be stored in or transferred via online storage sites. 1. If you need to access a single document, Digital Services will retrieve this document and store it in a location on the council network of your choice 2. If you need to share council data with a third party, please contact Digital Services to discuss secure ways of doing so 3. If you believe that you need access to an online storage site to regularly retrieve third party data, please complete this form 4. Please log a work request on ICT HelpMe and attach this form to it 5. Your request will need to be approved by the Data Security Manager before it is progressed. Name of site you need access to: Are you retrieving or sharing data? I am retrieving a single document I need to retrieve a number of documents over a period of time I need to share council documents with a third party How long to you need access to the site Please list below the purpose(s) of your request and the data that you will be handling (provide as much detail as possible): Page 9 of 10
10 If given access to this site, I confirm that I will not UPLOAD any council data into the site: Print Name: Signature: Job title: Department: Date: Authorising Manager: Signature: Date: Page 10 of 10
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
More informationThe term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
More informationIslington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More informationIslington Data Protection Policy. A council-wide information policy Version 1.1 June 2014
A council-wide information policy Version 1.1 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution 2.5 license.
More informationInformation Governance Policy A council-wide information management policy. Version 1.0 June 2013
Information Governance Policy Version 1.0 June 2013 Copyright Notification Copyright London Borough of Islington 2012 This document is distributed under the Creative Commons Attribution 2.5 license. This
More informationIslington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014
A council-wide information technology policy Version 0.9 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution
More informationInternet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
More informationICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationStudents are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
More informationIslington Security Incident Policy A council-wide information technology policy. Version 0.7.1 July 2013
A council-wide information technology policy Version 0.7.1 July 2013 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution
More informationInformation Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
More informationComputer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationHow to Monitor Employee Web Browsing and Email Legally
WHITEPAPER: HOW TO MONITOR EMPLOYEE WEB BROWSING AND EMAIL LEGALLY How to Monitor Employee Web Browsing and Email Legally ABSTRACT The Internet and email are indispensable resources in today s business
More informationE-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy
E-Safety Policy Reviewed and Adopted: July 2014 Reviewed by: HT/ LTS Next Review: July 2015 Annual Policy 1 1. Introduction Internet is an essential element of life in 21st Century; it is also a part of
More informationThe Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
More informationUNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More informationINTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
More informationTECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
More informationTONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE
GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving
More informationCARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
More informationDundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
More informationRules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
More informationSTRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
More informationAcceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationPolicy No: 2-B8. Originally Released: 2001. Date for Review: 2016
Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for
More informationJohn of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
More informationICT Acceptable Use Policy. August 2015
ICT Acceptable Use Policy August 2015 Document title ICT Acceptable Use Policy August 2015 Document author and department Responsible person and department Robbie Walker, Information Security Architect,
More informationSample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
More informationPROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationWest Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011
West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer
More informationE-Safety and Acceptable Use Policy
E-Safety and Acceptable Use Policy This policy has been written in consultation with pupils and staff so that they understand that there are dangers associated with Internet use, and they know what behaviour
More informationGENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES Version 3.0 17/05/2012 CONTENTS 1. Introduction and Scope... 3 2. Data Protection Act 1998... 4 3. Licence Registration and Prevention of Piracy...
More informationBerwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
More informationThe Fulham Boys School ipad Acceptable Use Policy, Procedures and Information
The Fulham Boys School ipad Acceptable Use Policy, Procedures and Information Except where specifically stated otherwise, the policies, procedures and information within this document apply to all ipads
More informationHull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08
Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable
More informationDIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
More informationAcceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
More informationHow To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
More informationOXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
More informationCYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL
CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important
More informationSibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
More informationKenmore State High School Student Laptop Charter
Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6
More informationInternet and Social Media Policy
Internet and Social Media Policy Page 1 of 19 Review and Amendment Log / Control Sheet Responsible Officer: Chief Officer Clinical Lead: Author: Date Approved: Committee: Version: Review Date: Medical
More informationComputer Facilities and External Networks Acceptable Use by Students
Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic
More informationHUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
More informationDene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
More informationSydney Technical High School
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationICT Acceptable Use Policy (AUP)
ICT Acceptable Use Policy (AUP) Version Number: 4.1 Effective from 17 December 2015 Author: Senior Information Security Officer & Head of Information Governance Legal, Planning & Governance Directorate
More informationINTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
More informationTameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
More informationAcceptable Use Policy Internet and Email - Students
Acceptable Use Policy Internet and Email - Students Ref HR01 Acceptable Use Policy Internet and Email - Students Review Date: August 2016 North East Scotland College All rights reserved INTRODUCTION Information
More informationInformation Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
More informationSocial Network Protocol & Policy
Social Network Protocol & Policy Prepared by: Stoke HR Implementation Date: July 2015 Review date: July 2016 RAISING ASPIRATIONS. TRANSFORMING LIVES. Social Networking Protocol for Schools & Academies
More informationAcceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
More informationStrathfield Girls High School Bring your Own Device User Charter
Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.
More informationInformation Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
More informationSTFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
More informationDigital Device LOAN CHARTER
Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to
More information51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
More informationOFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy
SECTION OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy 1 Purpose 1 2 Principles 1 3 Telephone Use 2 4 Postal Mail 2 5 Email Use 3 6 Internet Use 3 7 Social
More informationPOLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES)
Policy Document POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES) For the definitions of terms used in this policy document refer to the Delegations of
More informationSocial Media Policy. Policies and Procedures. Social Media Policy
Policies and Procedures Social Media Policy 1 1. Introduction...3 2. Privacy settings and personal information.....3 3. Use of Social Media at Work.....4 4. Account Administrators and Login Details......4
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationAcceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
More informationInformation Management and Security Policy
Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail
More informationSOCIAL MEDIA POLICY. Introduction
Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes
More informationAcceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
More informationUniversity of South Wales Software Policies
University of South Wales Software Policies Updated 23 rd January 2015 Page 1 University of South Wales - Software Policies The University s software policies are applicable to all software and datasets
More informationBring Your Own Device Program: User Charter
Bring Your Own Device Program: User Charter Turramurra High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. The wireless network and
More informationEMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
More informationREVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy
Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This
More informationCalwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement
111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use
More informationFREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
More informationEmbedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
More informationUSE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
More informationINTERNET, EMAIL AND PHONE SYSTEMS
Upper Great Southern Family Support Association Inc Policy On INTERNET, EMAIL AND PHONE SYSTEMS Date Adopted: November 2010 Date Revised: March 2013 Review Date: March 2014 Upper Great Southern Family
More informationInformation Systems Acceptable Use Policy for Learners
Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationNHS HIGHLAND EMAIL AND INTERNET POLICY
NHS HIGHLAND EMAIL AND INTERNET POLICY ehealth Department Policy Reference: Date of Issue: August 2007 Prepared by: A Fraser Date of Review: August 2009 Lead Reviewer: Version: 2 Area Information Security
More informationELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1
ELECTRONIC MAIL (E-MAIL) September 2014 Version 3.1 Western Health and Social Care Trust Page 0 of 6 E-mail Policy V3.1 Policy Title ELECTRONIC MAIL (E-MAIL) POLICY Policy Reference Number CORP09/006 Original
More informationAngard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
More informationUse of IT, Communications, Internet & Social Media Policy
Office of the Police and Crime Commissioner Use of IT, Communications, Internet & Social Media Policy 1. The Office of the Police and Crime Commissioner (OPCC) is committed to the principles of equality
More informationE- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
More informationRecommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
More informationSt. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
More informatione-safety Policy Broadclyst Community Primary School
e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy
More informationWELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY
WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within
More informationI N F O R M A T I O N C O M M U N I C A T I O N A N D T E C H N O L O G Y P O L I C Y
I N F O R M A T I O N C O M M U N I C A T I O N A N D T E C H N O L O G Y P O L I C Y PURPOSE To ensure that the safety and integrity of MRAEL s and ATCNB s data, physical information technology infrastructure
More informationTomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
More informationREGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
More informationAcceptable Network Usage Policy
Acceptable Network Usage Policy Purpose: The Lumen Christi Catholic College computer network is provided for staff and students to facilitate resource sharing, innovation and communication. All students
More informationITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
More informationICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
More informationRICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
More informationSchool Information Security Policy
School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...
More information