STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
|
|
|
- Abner Dennis
- 10 years ago
- Views:
Transcription
1 Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level description of the responsibilities and required behaviour of users of University IT systems, including University networks. It is a sub-document of Information Security Policy (ISP-S1) This document includes statements on: Departmental policies and procedures Connecting devices to University networks Use of University IT facilities for private work Unacceptable use of University IT facilities Accounts Passwords Unattended user equipment Protecting against unknown or malicious code Use of facilities Backups 2. Departmental policies and procedures 2.1. Where necessary Heads of Department may specify and implement policies relating to use of IT systems for which they have responsibility, provided that any such policies are consistent with University wide policy and do not have a negative impact elsewhere. Such policies may, for example, include specific rules relating to use of software, managing provision of network services, user behaviour etc. 3. Connecting devices to University networks 3.1. IT Services is responsible for managing, either directly or through an agent, connections to University networks that have connectivity with the Internet. (IT Services may delegate responsibility for authorising connection to its networks to trusted staff in other departments.) 3.2. Minimum required hardware, software and configuration standards for securing devices attached to University networks are determined by IT Services and set out in policy. (IT Services may also publish other more specific requirements.) REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS For details refer to: "Hardware and software requirements" in Network Management Policy (ISP-S12) Use of Computers Policy (ISP-S9) V12.docx Page 1 of 8
2 3.3. Devices must not be connected to a network, managed or provided by the University, unless the device meets current required hardware, software and configuration standards (see above), including security considerations, and its connection is authorised Any device connected to a network, managed or provided by the University, and deemed not to meet currently required hardware, software and configuration standards (see above), including security considerations, or connected without authorisation is liable to physical or logical disconnection from the network without notice It is the responsibility of the department operating any devices that have fallen below required standards (see above) to take prompt remedial action. 4. Use of University IT facilities for private purposes 4.1. University IT facilities are provided principally for official academic and administrative purposes. Occasional personal use is, however, permitted so long as: It is not in breach of any University policies. It is not excessive, in volume, frequency or time. It does not disrupt or restrict usage by other users Staff wishing to embark on any significant use of University IT facilities for work which is not part of their official University duties, such as consultancy or private work, must only do so after notifying their Head of Department and in accordance with guidelines issued by Personnel Services. 5. Unacceptable use of University IT facilities 5.1. Cases of unacceptable use of IT facilities may be investigated by authorised staff. The findings will be reported as appropriate to the relevant Head of Department or the Registrar. (In cases of policy violation deemed to be serious, wilful or repeated the University will not hesitate to take disciplinary action.) 5.2. The list of unacceptable uses of IT facilities below is applicable to all University IT systems. It is consistent with JANET acceptable use policy and legal compliance requirements. See also Compliance Policy (ISP-S3) It is unacceptable to use University IT facilities for any of the following: Any illegal activity. Creation or transmission, or causing the transmission, of any offensive, obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material. Creation or transmission of material with the intent to cause annoyance, inconvenience or needless anxiety. Creation or transmission of material with the intent to defraud. Creation or transmission of defamatory material. Creation or transmission of material such that this infringes the copyright of another person. Creation or transmission of unsolicited bulk or marketing material to users of networked facilities or services, save where that material is embedded within, or is otherwise part of, a service to which the user or their User Organisation has chosen to subscribe. Use of Computers Policy (ISP-S9) V12.docx Page 2 of 8
3 Deliberate unauthorised access to networked facilities or services. Using communal or open access computing facilities for recreational or other non-university work when there are others waiting to use the resource (this may include simultaneously using more than one end user device). Deliberate activities having, with reasonable likelihood, any of the following characteristics: i. Wasting staff effort or networked resources, including time on end systems and the effort of staff involved in the support of those systems. ii. iii. iv. Corrupting or destroying other users' data. Violating the privacy of other users. Disrupting the work of other users. v. Denying service to other users (for example, by deliberate or reckless overloading of access links or of switching equipment). vi. vii. Continuing to use an item of networking software or hardware after IT Services has formally requested that use cease or be suspended. Misuse of networked resources, such as the introduction of "viruses" or other harmful software. Any activity which could potentially be damaging to the University The University has a statutory duty under Section 26(1) of the Counter-Terrorism and Security Act 2015, known as the Prevent duty, to have due regard to and aid the process of preventing people from being drawn into and supporting terrorism. It is part of the Government s counter-terrorism strategy with the aim of reducing the threat to the UK. University members must not create, download, store or transmit extremism-related material with the intention of supporting or spreading terrorism. The University reserves the right to block or monitor access to such material Where a network managed or provided by the University is being used to access another network, any breach of the acceptable use policy of that network will be regarded as unacceptable use Without prior explicit approval, the University's computing services must not be used for placing or distributing advertisements other than those promoting the activities or trading operations of the University or the Student s Union. Where a proposed promotion may feature direct marketing, on behalf of a third party organisation, Information Assurance Services should be consulted. All advertisements should be 'legal, decent, honest and truthful' and comply with the British Code of Advertising, Sales Promotion and Direct Marketing issued by the Advertising Standards Authority University members must not permit information security safeguards and policies to be bypassed, or allow inappropriate levels of access to University information or IT facilities to other members or any third parties such as guests, customers, collaborators, suppliers, consultants, contractors or cloud service providers. See also: 6. Accounts Outsourcing and Third Party Access Policy (ISP-S4) 6.1. Where a computer account is provided for exclusive use by an individual: Use of Computers Policy (ISP-S9) V12.docx Page 3 of 8
4 The account holder should be instructed not to reveal the password or otherwise permit anyone else to use the account. The account must not be used by anyone except the account holder Where use of a shared account is necessary to facilitate a specific activity: It must be approved by the system owner or their delegate. The purpose of the shared account must be clearly understood and the account must be used only for the purpose specified. Usage of, and access to, the shared account must be carefully managed. Every shared account must have an owner responsible for managing access to the account and supervising its use. The owner of a shared account must maintain a current record of which individuals have access. When an individual having access to a shared account leaves, or no longer requires access to the account, then the account owner must change the password and securely inform those continuing to require access Privileged accounts are those granting special computer system privileges that ordinary users do not need to use. (In addition to special accounts such as e.g. root under UNIX or administrator under Windows, privileged accounts can be ordinary user accounts that have extra permissions resulting from being added to user groups such as power users or administrators.) These accounts should only be used to undertake specific system administration tasks and should not be used for routine work, where a normal account has sufficient privileges. Wherever possible local system administration tasks on departmental user devices should be undertaken by professional departmental or central computing staff in accordance with University and departmental policies. In particular use of privileged accounts should be controlled and periodically reviewed to implement the principle of least privilege. Where a privileged account potentially permits access to information belonging to others, effective line management control over who has access to it and the way it is used must be maintained. This needs to include authorisation from the system owner. (This applies to any system that holds or provides access to data belonging to more than one user.) Where a computer user also acts as the local system administrator, and so uses a privileged account on their local system, they are required to manage and use the system in accordance with all University and departmental policies Wherever possible both centrally and departmentally provided computing accounts should be managed such that : Preferably, computing activities undertaken using a particular account can be associated with a specific individual. Alternatively, an identified individual takes active responsibility for the management and activities of users of a particular computing facility or account. Use of Computers Policy (ISP-S9) V12.docx Page 4 of 8
5 6.5. Students are not permitted to log into more than one University provided computer simultaneously unless special arrangements have been made. (This may otherwise be considered unfair use of resources by an individual or an indication that an account is being shared in breach of University policy.) 7. Passwords 7.1. University IT system managers must wherever technically possible enforce appropriate password related policies. Specific recommendations about configuring password strength, account lockout, password expiry and other password access control parameters on University computer accounts are given in policy implementation document: Computer Account Passwords (ISP-I9) 7.2. Using mechanisms that allow automatic login into a computer account (including accounts) without being challenged to provide a password each time can put security of that account at risk. It is strongly recommended that mechanisms that fill in passwords automatically are not used. However where they are used, it is strongly recommended that there is an additional layer of access control. For example, using a pin number to help protect access to a Smartphone, especially if it is configured for automatic connection to an account Users of University IT systems must take all reasonable precautions to ensure that their passwords (or other security secrets ) are not disclosed University IT users should be advised about scams intended to make them reveal passwords and how to avoid being caught out. THE UNIVERSITY OR IT SERVICES WILL NEVER ASK USERS TO DISCLOSE THEIR PASSWORDS. Where a computer account user suspects that security of their personal computer account may have been compromised they must: Immediately change the password (if possible). Immediately report the incident - see Reporting Information Security Incidents (ISP-I3). 8. Unattended user equipment 8.1. Computers and other equipment such as smartphones, used to log into University IT accounts, must never be left unattended if they are logged in and unlocked. (Users of such equipment are required to log them out or lock them before leaving them unattended.) 8.2 Except in very special circumstances such equipment must be capable of automatically locking after a timeout period when left unattended. This automatic locking must be enabled and be effective in ensuring that unauthorised access to accounts that are already logged in, or which can be logged into using stored credentials, is prevented. The timeout period should normally be no longer than 10 minutes. 8.3 Computers in the process of being logged out, or shut down, should not be left unattended until it is certain that they have definitely logged out. (This is in case the log out process fails and a logged in account is left unattended). 9. Protecting against unknown or malicious code 9.1. Accidental or deliberate running or installation of malicious code (malware) on computers presents a significant information security risk. The need to restore integrity of Use of Computers Policy (ISP-S9) V12.docx Page 5 of 8
6 systems infected with such code also has an impact on their availability for use and consumes computer support staff effort An appropriate combination of proactive measures should be used to help manage the risk of malicious code being run on University systems. The measures should be promoted and supported by management and implemented by computers system administrators and users. Some combination of the following measures is recommended: Deploying antivirus software developed by a reputable supplier, which should be kept fully up to date and used to scan all files: downloaded from the internet, received as attachments to (or other forms of messaging) and all removable media when inserted. (Applicability of this varies between operating systems). Advising computer users to avoid running software, opening files or clicking on links obtained from untrusted sources and to be particularly cautious of accessing files attached to unsolicited and stored on untrusted media. (This should be issued in conjunction with the advice about when it is appropriate to use privileged accounts.) Managing support of computers such that privilege to install software is restricted to staff, typically experienced computer support staff, who would be more aware of the problems that can result from installing code from untrustworthy sources. Implement departmental or Network Organisation level policy requiring staff to obtain approval from the Network Authority before installing items of non-standard software on University computer equipment. (The approval procedure should include a basic assessment of whether use of the software is justified and assurance that any software licensing requirements are met.) 9.3. See also: Software Management Policy (ISP-S13) 10. Use of facilities University services are provided for official academic and administrative purposes, occasional personal use is permitted so long as such use is not excessive, in volume, frequency or time and does not disrupt or restrict usage by other legitimate users Staff must not configure their University accounts to automatically forward incoming to services that are not operated by the University, unless such an arrangement has been formally approved by the Director of IT Services and is subject to an appropriate bilateral contract. Also refer to: Outsourcing and Third Party Access Policy (ISP-S4) Users of University services should be advised that whilst privacy of their messages is respected there are circumstances in which the content of their messages may be disclosed. This may be in response to a Data Subject Access Request made under the Data Protection Act. In addition there is provision for officers of the University to access the contents of University . Also refer to: Institutional IT Usage Monitoring and Access (ISP-I6) The University encourages the use of Out of Office functionality on systems to inform colleagues and trusted third parties of your absence from the Office. For your personal security, telling unknown or un-trusted 3rd parties about your whereabouts is best avoided. It is strongly recommended that wherever possible you restrict sending Out Use of Computers Policy (ISP-S9) V12.docx Page 6 of 8
7 of Office Replies to "people inside your organisation" and only to "My Contacts" outside of your organisation. Detailed advice on how to do this is available on the IT Services website University systems may not be used for any of the following: Unapproved transmission of commercial material (see also section 5 above). Spamming, i.e. sending unsolicited and unauthorised messages to a large number of people; this includes misuse of mailing lists. (Mass ing to members of the University may be undertaken for purposes approved by the Registrar.) Users who believe that their account may have been hacked and used to send spam without their knowledge should inform IT Services immediately. Messages requesting recipient to re-forward thereby setting up a chain action (chain mail). Messages likely to cause offence. Messages purporting to come from someone other than the actual sender (spoofing). Material advocating criminal activity or which may bring the University into disrepute. Material which violates copyright restrictions. Material which is defamatory or libellous. Material which could be used to breach computer security or facilitate unauthorised access. Material likely to prejudice the course of justice. Personal data about a third party in contravention of the Data Protection Act Other policy documents referring to use of include: 11. Backups Information Handling Policy (ISP-S7) Mobile Computing Policy (ISP-S14) Cryptography Policy (ISP-S16) Guide to Information Legislation (ISP-I5) University business must not be exposed to undue and unnecessary risk as a result of inadequate computer data backup arrangements. The information owner or custodian is responsible for checking, or seeking assurance, that the backup arrangements for the computer facility or service being used are suitable Computer system managers are responsible for ensuring that backup arrangements published, or agreed with users of the system, are reliably implemented and that users are informed promptly should there be any problems with, or changes to, the backup arrangements For further details also refer to the Backups section in: Information Handling Policy (ISP-S7). Use of Computers Policy (ISP-S9) V12.docx Page 7 of 8
8 Failure to comply with University Policy may lead to disciplinary action. The official version of this document will be maintained on-line. Before referring to any printed copies please ensure that they are up-to-date. Use of Computers Policy (ISP-S9) V12.docx Page 8 of 8
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
Email Policy For Staff and Students
Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES Version 3.0 17/05/2012 CONTENTS 1. Introduction and Scope... 3 2. Data Protection Act 1998... 4 3. Licence Registration and Prevention of Piracy...
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
2.1 It is an offence under UK law to transmit, receive or store certain types of files.
Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
If you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law
Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources
"Broadband Voice Telephone Adapter" a broadband voice telephone adapter or BT Voyager 220V which may be bought from BT.
Terms and Conditions 1. Definitions 2. Providing the Service 3. Managing the Service 4. Monitoring Calls 5. Customer Equipment 6. Misusing the Service 7. Security 8. Intellectual Property Rights 9. Intellectual
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Acceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
UTC Cambridge ICT Policy
UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions
INTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3
LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Email Policy V1.3 Document Control Reference V1.3 Email Policy Date 17 July 2015 Author Approved by Version History David
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
ICT Acceptable Use Policy (AUP)
ICT Acceptable Use Policy (AUP) Version Number: 4.1 Effective from 17 December 2015 Author: Senior Information Security Officer & Head of Information Governance Legal, Planning & Governance Directorate
Email Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY CONTENTS I. Introduction II. Violation of this Acceptable Use Policy III. Prohibited Uses and Activities IV. Customer
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation
Acceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Virgin Media Business Acceptable Use Policy (Internet)
Virgin Media Business Acceptable Use Policy (Internet) 1 Introduction 1.1 This Acceptable Use Policy ( AUP ) specifies actions prohibited by Virgin Media Business to users of the Internet Services (in
Service Schedule for Business Email Lite powered by Microsoft Office 365
Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears.
Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES 1. Definitions In this regulation unless a contrary intention appears Authority means (i) in relation to the central facilities and computing and
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
Sibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
School Information Security Policy
School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
A Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2
Team Anywhere EMAIL ORDER FORM
1. Applicant Details Team Anywhere EMAIL ORDER FORM Please complete and return this form to: Quincerto Group (NZ) Ltd, PO Box 31-248, Christchurch, New Zealand Telephone: 0508 332 537 Fax: 03 342 6109
LCC xdsl Usage Policy
LCC xdsl Usage Policy 1. Introduction For the Internet to operate in a manner that satisfies the majority of its users, all users need to observe some rules and etiquette governing their use of it. These
Working Practices for Protecting Electronic Information
Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
