INFORMATION TECHNOLOGY SECURITY AND APPROPRIATE USE POLICIES (INCLUDES INTERNET, , AND TELEPHONE) ACKNOWLEDGEMENT
|
|
|
- Kellie Craig
- 10 years ago
- Views:
Transcription
1 INFORMATION TECHNOLOGY SECURITY AND APPROPRIATE USE POLICIES (INCLUDES INTERNET, , AND TELEPHONE) All Early Learning Coalition of Indian River, Martin, and Okeechobee Counties (herein referred to as the Coalition ) employees and consultants must acknowledge receipt of these policies prior to being given a User-ID and/or provided access to the Coalition Systems. ACKNOWLEDGEMENT I hereby acknowledge that I have received, reviewed, understand and appreciate the implications of the (attached) Internet, , Telephone, and Information Security Policies, and by signing (below) I agree to abide by these policies. Moreover, I hereby acknowledge that these policies supersede all previous oral or written representations, policies, procedures and practices, and that these policies may be amended from time to time. A current copy is posted and available on the Coalition Intranet. Signature: Date: Approved by the Coalition Board: 3/27/08 Page 1
2 TABLE OF CONTENTS INTRODUCTION 3 PERSONAL FILES AND INFORMATION 3 COMPUTER SECURITY 4 ACCEPTABLE USE POLICIES 6 General 6 Computer Viruses 7 Appropriate Content of Communication 7 7 Internet 8 Telephone Usage 9 Voic 10 Other Telephone Issues 11 Copyright 11 Laptops and Portables 11 Printing, Faxing and Copying 11 Data Security Agreement Remote Access 13 Mobile Computing 13 Database Security 13 Media Management 13 Approved by the Coalition Board: 3/27/08 Page 2
3 INTRODUCTION Information and information systems are critical and important Coalition assets. Moreover, new resources, new services, and the interconnectivity now available via the Internet introduce not only new opportunities, but new risks as well. Without a doubt, computers and the Internet have changed -- and will continue to change -- the nature of work in our society. Scope In response to such risks and requirements the Coalition has adopted this policy regarding use of the Internet, and overall Information security. It applies to all Coalition employees, contractors, temporaries and consultants who use the agency systems. Questions about this policy and/or any IT (Information Technology) should be directed to the Human Resources Department. Violations of these policies can lead to revocation of system privileges and/or disciplinary action including termination. General The Coalition use access controls and other security measures to protect the confidentiality, integrity, and availability of the information handled by computers and communications systems. In keeping with these objectives, management maintains the authority to: (1) restrict or revoke any user's privileges, (2) inspect, copy, remove, or otherwise alter any data, program, or other system resource that may undermine these objectives, and (3) take any other steps deemed necessary to manage and protect its information systems. This authority may be exercised with or without notice to the involved users. The Coalition disclaims any responsibility for loss or damage to data or software that result from its efforts to meet these security objectives. PERSONAL FILES AND INFORMATION Personal files stored on the Coalition computers and in the Coalition worker s desks will generally be handled with the same privacy perspective given to personal mail sent from or received at the Coalition, and personal phone calls made or received at the Coalition. However, staff should be aware of the following limitations that apply to the privacy of files, documents, and/or other electronically stored or transmitted materials: 1. By making use of the Coalition systems, users consent to allow all information they store on any and all systems to be divulged to law enforcement at the discretion of Coalition management. 2. All messages, documents or files stored in or sent through Coalition computer, dictation and/or voice mail systems are the property of the Coalition. To properly maintain and manage this property, management reserves the right to examine all data stored in or transmitted by these systems. Since the Coalition computer and communication systems must be used for business purposes only, workers have no expectation of Approved by the Coalition Board: 3/27/08 Page 3
4 privacy associated with the information they store in or send through these systems. 3. At any time and without prior notice, Coalition management reserves the right to examine archived electronic mail, personal file directories, hard disk drive files, and other information stored on Coalition computer, dictation and voice mail systems to assure compliance with internal policies, support the performance of internal investigations, and assist with the management of the Coalition s information systems. 4. To prevent accidental loss, all files and messages stored on Coalition computer, dictation and voice mail systems are routinely copied to disk, and other storage media. This means that information stored on the Coalition s systems even if a user has specifically deleted it is recoverable and may be examined at a later date by systems administrators and others designated by management as specified above 5. Coalition computer networks are private business systems, and not public forums, and as such do not provide First Amendment free speech guarantees. The Coalition retains the right to remove from its information systems any material or information it views as offensive or potentially illegal. 6. Sexual, ethnic, and racial harassment including unwanted telephone calls, electronic mail, and internal mail is strictly prohibited and is cause for disciplinary action including termination. 7. When an employee leaves any position with the Coalition, files and documents may be reviewed by his or her immediate manager to determine who should become the custodian of such files, and/or the appropriate methods to be used for file disposal. Employees should be aware that any files are subject to examination and deletion. 8. Unless the IT Department has received instructions to the contrary, after any employee and/or consultant has permanently left the Coalition, all files held in that user's personal folders will be archived. COMPUTER SECURITY Computer security is everyone s responsibility. Increasingly, our computer system stores information on our clients as well as financial information that is necessary for the day-to-day operation of the Coalition. Our computer system s first line of defense both internally and externally is your password. It is the employee s responsibility to maintain the security of your password at all times. Consequently, it is important that end-users not only protect their password, but be aware of and follow these requirements and conditions: 1. All user accounts are set with a three strikes and you re out rule. If you enter the incorrect password three consecutive times, the account is suspended and must be reset by the IT Department. Approved by the Coalition Board: 3/27/08 Page 4
5 2. Passwords expire 90 days from the last time the password was changed. 3. All users are expected to know how to change or reset their password. The system will automatically notify you when your password is going to expire. 4. All passwords must have at least (8) characters, and should consist of a mixture of letters, numbers and symbols. 5. Passwords should not be any word that appears in the dictionary. 6. User passwords should contain at least one alphabetic and one non-alphabetic character. Non-alphabetic characters include numbers (0-9) and punctuation. Acceptable Characters are: A - Z, a-z, 0-9, and!@#$%&*()_-+=. 7. The initial passwords issued by the IT Department should only be used during your first on-line session. At that time, you must choose another password before any other work can be done. 8. All passwords must be promptly changed if they are suspected of being disclosed, or known to have been disclosed to unauthorized parties. 9. Passwords should not be written down and left in a place where unauthorized persons might discover them. In particular, passwords should never be placed on a post-it on your PC or displayed anywhere in your office. 10. Regardless of the circumstances, passwords must never be shared or revealed to anyone unless requested or approved by the IT Department. 11. Sharing your password exposes you to responsibility for actions that the other party takes with the password. If you need to share data, use electronic mail, shared folders on the LAN servers, and/or other mechanisms. 12. All PCs will automatically time out if they are not used for 15 minutes and you will need to log on again. 13. All workstations must be logged off at the end of each day or if being left unattended for an extended length of time. This will help avoid any unauthorized use of a PC. Coalition staff should not attempt to test or attempt to compromise internal computer security and access controls unless specifically approved in advance and in writing by the IT Department. All system privileges (rights) granted to users are evaluated on a periodic basis and are based upon need. User access rights may change. Approved by the Coalition Board: 3/27/08 Page 5
6 APPROPRIATE USE POLICIES General Smoking, eating, or drinking while using a computer is strongly discouraged. Computers, printers, and other devices are sensitive and valuable equipment. Kicking or striking such equipment is prohibited. The Coalition computer and communications systems must be used for business purposes. Incidental personal use is permissible only if the use: 1. Does not consume more than a trivial amount of resources that could otherwise be used for Coalition purposes; 2. Does not interfere with productivity; and 3. Does not preempt any Coalition activity. Permissible incidental use of an electronic mail system would, for example, involve sending a message to schedule a personal luncheon. Users of the Coalition computing and communications systems must not use these facilities for soliciting business, selling products, or otherwise engaging in commercial activities other than those expressly permitted by the Coalition management. The Coalition information (databases, mailing lists, internal software, computer documentation, etc.) must only be used for purposes specifically allowed by management. Use of these information resources for any other reason will be permitted only after management has granted written permission. The Coalition software, documentation, and all other types of internal information must not be sold or otherwise transferred to any non-coalition party for any purposes other than purposes expressly authorized by management. The Coalition requires strict adherence to software vendors' license agreements and copyright holders' notices. Coalition staff may not make unauthorized copies of software. Computer equipment provided by the Coalition must not be altered or added to in any way (e.g., upgraded processor, expanded memory, or extra circuit boards) without prior approval of the Executive Director Upgrades to Coalition computer equipment will be done by IT Tech or designee. Furthermore, end-users should not install software, games, personal programs, and/or any software purchased, received via and/or downloaded from the Internet without the express permission of the IT Department. Approved by the Coalition Board: 3/27/08 Page 6
7 Computer Viruses A computer virus is an unauthorized program that replicates itself and spreads onto various data storage media and/or across a network. The symptoms of virus infection include considerably slower computer response time, inexplicable loss of files, changed modification dates for files, increased file sizes, and total failure of computers. Because viruses have become very complex, users must not attempt to eradicate them from their systems. If users suspect infection by a computer virus, they must immediately stop using the involved computer and call the IT Department. Virus checking programs approved by the IT Department are continuously enabled on all local area network (LAN) servers and networked personal computers (PCs) as well as on coalition laptops issued to staff. Users may not place, download, load, or install any computer program on their workstations, laptop, network servers, or on computers connected to the network regardless of the source. Appropriate Content of Communications Telephones should always be answered cheerfully and courteously, by giving your department and name. Every effort should be made to assist the caller, including referral to the appropriate person if you cannot provide help as requested. Professional conduct and appropriate content is required for all forms of communication. Faxes, telephones, and must all reflect appropriate content. Any misuse of these forms of communication will be a matter for discipline, up to and including dismissal. is for official use only. Our system consists of two parts internal and external delivered and controlled by the Internet. Internally, the system is secure. The message store is not encrypted and is accessible to system administrators in its entirety. Ordinary users, however, do require passwords to access their messages. Internet is not as secure. Unless the material is encrypted, staff should refrain from sending credit card numbers, passwords, and other sensitive data via electronic mail. The Coalition staff should adopt a better safe than sorry philosophy. Coalition staff should not use an electronic mail account assigned to another individual to either send or receive messages. If there is need to read other's mail (while they are away on vacation for instance), message forwarding, proxy access and/or other facilities should instead be used. End users should be aware that the originator and recipient address of any and all sent to an Internet address, or received from an Internet address, is tracked in a detailed audit log maintained by the IT Department. As well, end-users should be aware that misaddressed messages are reviewed by IT staff for address correction or return to the originator. The following general guidelines are offered as guidance in use of the system: Approved by the Coalition Board: 3/27/08 Page 7
8 1. Use mailing lists wisely. We all receive several messages a day. Does your message really need to be sent to everyone in the group? 2. Utilize descriptive subjects that accurately describe the topic of the message. 3. Your messages should be signed only with the following type of information: name, title, business address, phone numbers, ID, ELCIRMO logo and sunshine law statement. A standard font type such as Arial, Times New Roman or Verdana should be used and the font color should be black. All ELCIRMO s should be professional in content and appearance. Also, as messages move through various systems, the message envelope you see may not be what the recipient sees and unnecessary graphics use additional bandwidth. Internet The Internet is for official use only. The Coalition management encourages Coalition staff to explore the Internet for Coalition related business. Exploration for personal purposes must be done on personal, not Coalition s time. Likewise, news feeds, discussion groups, games, and other activities which are not related to an individuals job duties should be performed on personal time. All users of the Internet should be aware that our firewall creates a detailed audit log reflecting every request for service, web site, downloaded file, etc., both in-bound and outbound. Other safe surfing guidelines include: 1. Users should be careful about disclosing their real names, addresses, or telephone numbers on electronic bulletin boards, chat rooms, or other public forums reached by the Internet. 2. Staff should never send Coalition credit card numbers, login passwords or other security information via the World Wide Web if it is in readable (un-encrypted) form. If you are unsure or unaware of the encryption status of a web site and/or how to check it, you should contact the IT Department for assistance or utilize alternate methods. Most Internet sites feature an 800 number for orders. 3. All information taken off the Internet should be considered suspect until confirmed by another source. There is no quality control process on the Internet, and a considerable amount of Internet information is outdated, inaccurate, or deliberately misleading. 4. It is relatively easy to spoof the identity of another user on public networks such as the Internet. Before staff releases any internal Coalition information, enter into any contracts, or order any products via public networks, the identity of the individuals and organizations contacted must be confirmed. Identity confirmation is ideally performed via digital signatures, but in cases where these are not yet available, other means such as third party references and telephone conversations may be used. Approved by the Coalition Board: 3/27/08 Page 8
9 5. Due to the bandwidth required to stream media to a PC; music, TV, video or any other type of media should not be streamed to your PC or laptop. Telephone Usage (including Long Distance) The Coalition telephone system must be used for business purposes only. Incidental personal use is permissible if the use: 1. Does not consume more than a trivial amount of resources that could otherwise be used for Coalition purposes; 2. Does not interfere with productivity; and 3. Does not preempt any Coalition activity. Employees should provide family members with the Coalitions main number as well as their direct lines for emergency purposes. Users of the Coalition telephone systems must not use these facilities for soliciting business, selling products, or otherwise engaging in commercial activities other than those expressly permitted by the Coalition management. Voice Mail In many cases, the first interaction the general public has with the Coalition is our Voice Mail system. It answers the phone 24 hours a day, 7 days a week, 365 days a year. It is important that it reflect an appropriate level of professionalism and courtesy. Voice Mail is provided as a supplemental tool for those who need to reach us. It is not intended to be the primary point of communication for individuals attempting to contact Coalition staff. Every effort should be made to provide callers with an alternate person with whom to speak in your absence. The following general guidelines are offered as guidance in use of the Voice Mail system: 1. Record both a personal greeting as well as an account name to identify the voic box. 2. When recording the account name, use your full name. Do not use just your first name. The account name is used by the dial-by-name directory, hence should reflect your full name. 3. Keep your personal greeting current. 4. In your greeting, say how frequently you will be checking your messages. This gives callers some idea when you will be able to return the call. It also lets them know whether it's best for them to leave a message, try another extension, or press "0" to reach a live operator. Approved by the Coalition Board: 3/27/08 Page 9
10 5. Make your greeting a friendly one. The tone you use in your personal greeting is as important as what it says. Callers will be more inclined to leave a message if your greeting sounds friendly, like an invitation to leave a message. 6. When leaving a message, speak naturally and smile. Believe it or not, smiling has a profound impact on the sound of your message. People will be more likely to return your call if you sound happy and upbeat. 7. Speak clearly. Whether recording a greeting or leaving a message, it's important to speak in clear, concise sentences. You will be more easily understood, and appear professional and organized. 8. Invite callers to dial "0". Use your personal greeting to remind callers they can press "0" to speak to a live person. This lets them know that once they have gotten into your mailbox they are not stuck with either leaving a message or hanging up. 9. In your greeting, ask your callers for the information you need, such as name, telephone number, the reason for calling and the best time to return their call. Don't waste time asking callers for the date and time of their calls because the system automatically time-stamps each message. 10. Check your messages regularly and return calls promptly. You can promote voice mail by answering messages from callers in a timely manner. Do not leave them wondering whether you got their messages; call them back. Even if you do not have an answer to their question or the information they need, call them back to let them know you got the message and are working on it. 11. Leave complete, detailed messages. Voice mail reduces telephone tag, but only if messages contain information other that just, "Hi, I called. Please call me back." Instead, include details that let the person know the reason for your call. 12. Use group broadcasting wisely. We all receive several messages a day. Does your message really need to be sent to everyone in the group? 13. Let repeat callers know how they can "skip" to the end of your personal greeting. Callers who just want to leave a message without listening to your entire greeting can skip to the tone by pressing the "*" on the keypad. 14. Don't slam down the telephone receiver when you're finished leaving a message. Everything you do will be recorded, including the sound of a loud hang-up or the other keys you press. 15. Verify your account name and greeting are recorded correctly by calling your own extension. Approved by the Coalition Board: 3/27/08 Page 10
11 Other Telephone Issues When using a telephone, staff should not use speaker phones, microphones, loud-speakers, tape recorders, or similar technologies unless they have first obtained the consent of both the originator(s) and recipient(s) of the call. Copyright Unless permission from the copyright owner(s) is first obtained, downloading and distributing copyrighted material over the Internet, or making multiple copies of material from magazines, journals, newsletters, and other publications is forbidden unless this is both reasonable and customary. This notion of "fair use" is in keeping with international copyright laws. Laptops & Portables A laptop and/or portable computer is a delicate piece of equipment. When traveling, staff should treat such equipment appropriately, and should not check computers in airline luggage systems. These computers should remain in the possession of the traveler as hand luggage. Laptops and other portable computer equipment remain the property of the Coalition, and must be returned upon demand. Moreover, laptops and other portable computer equipment are subject to the same appropriate use guidelines and limitations as outlined above. Printing, Copying and Faxing Any documentation printed, copied or received via fax should be picked up immediately as proprietary and/or client data is often contained in the documents. Data Security Agreement I understand that I will or may be exposed to certain confidential information pertaining to the Office of Early Learning programs, which has been made available to my employer, for the limited purpose of performing its public duty pursuant to the Project Grant Award. These confidential records may include but not be limited to, social security numbers, parent and child information, payment, child care provider, household demographics and resource and referral, which are private and confidential and may not be disclosed to others. In order to perform my duties associated with the assessment and reporting requirements set forth in the School Readiness Act, I am requesting an approved username, password, and additional instructions for accessing the Enhanced Field System (EFS), the Statewide Reporting System (SRS), and the Simplified Point of Entry/Unified Waiting List (SPE/UWL) (hereinafter referred to as the Systems ). Prior to receiving such means of access. I acknowledge and agree to abide by the following standards for the receipt and handling of confidential record information. Approved by the Coalition Board: 3/27/08 Page 11
12 1. I shall not disclose my username, password or other information needed to access the Systems to any party, nor shall I give any other individual access to this information. 2. If I should become aware that any other individual, other than an authorized employee, may have obtained or has obtained access to my username, password or other information needed to access the Systems, I shall immediately notify my supervisor the System Administrator and Security Officer for the early learning coalition. 3. I shall not share with anyone any other information regarding access to the Systems unless I am specifically authorized by the Early Learning Coalition the Office of Early Learning. 4. I shall not access or request access to any social security numbers or other confidential information unless such access is necessary for the performance of my official duties. 5. I shall not disclose any individual record data to any parties who are not authorized to receive such data except in the form of reports containing only aggregate statistical information compiled in such a manner that it cannot be used to identify the individual(s) involved. 6. I shall retain the confidential data only for that period of time necessary to perform my duties. Thereafter, I shall either arrange for the retention of such information consistent with both the federal or State record retention requirements or delete or destroy such data. 7. I have either been trained in the proper use and handling of confidential data or have received written standards and instructions in the handling of confidential data from the Coalition and/or the Office of Early Learning. I shall comply with all the confidential safeguards contained in such training, written standards, or instructions, including but not limited to, the following: a) protecting the confidentiality of my username and password; b) securing computer equipment, disks, and offices in which confidential data may be kept; and c) following procedures for the timely destruction or deletion of confidential data. 8. I understand that if I violate any of the confidentiality provisions set forth in the written standards, training, and/or instructions, my user privileges will be immediately suspended or terminated. I further acknowledge that applicable state law may provide that any individual who discloses confidential information in violation of any provision of that section may be subject to a fine and/or period of imprisonment and dismissal from employment. I have been instructed that if I violate the provisions of the law, I may receive one or more of these penalties. 9. Should I have any questions concerning the handling or disclosure of confidential information, I shall immediately ask my supervisor and be guided by his/her response. Approved by the Coalition Board: 3/27/08 Page 12
13 Remote Access The Coalition grants remote access privileges to key staff and approved Contractors. A list of staff and approved contractors granted Remote access is maintained by the IT Tech. The same non-disclosure and confidentiality rules apply to all staff granted remote access privileges. Mobile Computing The Coalition grants mobile computing privileges to staff based upon duties/responsibilities. A list of staff with mobile computing equipment is maintained by the individual responsible for Inventory Control. The same non-disclosure and confidentiality rules apply to all staff granted mobile computing privileges. Database Security All system privileges (rights) granted to users are evaluated on a periodic basis and are based upon duties/responsibilities. Media Management Media devices must be handled, stored and disposed of properly in order to protect the confidentiality of Coalition data stored upon it. Approved by the Coalition Board: 3/27/08 Page 13
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Internet usage Policy
Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
Lisbon School District 15 Newent Road Lisbon, CT 06351
Pur pose The purpose of this policy is to establish direction, procedures, requirements, and responsibilities to ensure the appropriate protection of the Lisbon Public Schools computer and telecommunication
Network Security Policy
KILMARNOCK COLLEGE Network Security Policy Policy Number: KC/QM/048 Date of First Issue: October 2009 Revision Number: 3 Date of Last Review: October 2011 Date of Approval \ Issue May 2012 Responsibility
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
COLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
Sample Policies for Internet Use, Email and Computer Screensavers
Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Computer Security Policy (Interim)
Computer Security Policy (Interim) Updated May, 2001 Department of Information Systems & Telecommunications Table of Contents 1. SCOPE...1 2. OVERVIEW...1 3. RESPONSIBILITIES...3 4. PHYSICAL SECURITY...4
Information Technology Acceptable Use Policies and Procedures
Information Technology Acceptable Use Policies and Procedures The following Information Technology Acceptable Use Policies and Procedures are to be followed by ALL employees, contractors, vendors, and
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9
ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
Internet & Cell Phone Usage Policy
Internet & Cell Phone Usage Policy The Internet usage Policy applies to all Internet & Cell phone users (individuals working for the company, including permanent full-time and part-time employees, contract
COMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
U.S. Chemical Safety and Hazard Investigation Board
BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1
Training sessions on the various communication methods will be made available at least once yearly. E-mail Guidelines
Approved by: Academic Coordinating Committee Authorizer: Manager, Corporate Communications Effective Date: September 1, 2010 E-mail, Voice Mail and Corporate Calendar Guidelines Note: It is recommended
INTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
Appropriate Use Policy Technology & Information
CLACKAMAS COUNTY EMPLOYMENT POLICY & PRACTICE (EPP) EPP # 59 Implemented: 05/20/10 Clerical Update: Appropriate Use Policy Technology & Information PURPOSE: To establish rules governing use of County information
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
City of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Information Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
Chatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320
ACCEPTABLE USE OF VOICE, VIDEO AND DATA NETWORK Policy Code: 3225/7320 Chatham County Schools offers electronic network access for students, teachers, and staff within the school system. A component of
Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND
AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND THIS AGREEMENT for Access to Protected Health Information ( PHI ) ( Agreement ) is entered
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
COLLEGE POLICY MANUAL
Policy No. & Title: C202: ACCEPTABLE USE OF COLLEGE TECHNOLOGY Effective: 2015-07-14 Next Review: 2020-07-14 Policy Sponsor: Chief Information Officer Ref Cttee: Senior Leadership Council Approvals: 2000-05-03/SA-99-09;
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
13.19 ETHICS REPORTING POLICY AND PROCEDURE
13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Niagara County Community College
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
Information Systems Access Policy
Information Systems Access Policy I. PURPOSE The purpose of this policy is to maintain an adequate level of security to protect data and information systems from unauthorized access. This
