Legal Risks Associated With and Internet Use and Abuse by Employees
|
|
|
- Elmer Young
- 10 years ago
- Views:
Transcription
1 February 2004 Legal Risks Associated With and Internet Use and Abuse by Employees The potential for abuse of and Internet facilities provided at the workplace is virtually limitless and could have severe legal ramifications for employers. Employers can be held vicariously liable for discriminatory, sexually harassing or victimising material sent by their employees under the Equal Opportunity Act 1995 (Vic). There are additional risks in the area of copyright infringement and defamation. (1.) Monitoring The And Internet Activities Of Your Employees? Many employers monitor the and Internet usage of their employees without recognising that there are privacy issues which can restrict the type of monitoring employers can perform. The Privacy Act 1988 (Cth) contains a set of National Privacy Principles which apply to all private sector businesses with a turnover of more than $3 million. (2.) Do You Have An and Internet Policy? A comprehensive and Internet policy is essential where employees have access to and the Internet. In the recent case of Lulham v Shanahan, Watkins Steel and Others [2003] QADT 11, the court suggested that had the employer notified employees of their obligation not to sexually harass other employees, it may have resulted in the employer successfully defending the vicarious liability suit which ultimately cost them $26,000 in compensation. In addition, an unfair dismissal claim was recently defeated by an employer due to an and Internet policy being displayed on a pop-up screen when the employee logged on to their computer, as the employer was able to show that they took reasonable steps to inform staff of their policy. (3.) (1.) Legal Risks Associated With and Internet Use and Abuse By Employees Legal Risks for Employers There are a number of legal hazards that employers risk exposure to if their employees abuse or Internet facilities provided to them in the workplace. Vicarious Liability Pursuant to the common law doctrine of vicarious liability, employers may be liable for acts of their employees where the employees have committed the acts in the course of their employment or while acting as an agent of the
2 employer. Employers have been successfully sued under this doctrine where their employees have harassed other employees in the workplace, leading to the payment of fines and damages. and Internet availability increases the methods by which employees can be harassed or discriminated against. Compounding this, some workers perceive as a more informal mode of communication, escalating the risk of inappropriate or offensive "jokes" being sent without consideration of the consequences. The Equal Opportunity Act (Vic) prohibits sexual harassment, discrimination and victimisation in the workplace. Sections 102 & 103 establish that acts of sexual harassment, discrimination and victimisation by an employee in the workplace can constitute a vicarious act of the employer unless the employer took reasonable precautions to prevent it. In practice, this means that if employees send or show offensive or harassing material to other employees and vicarious liability is established, the employer will be facing the harassment charges alongside the errant employees. Lulham v Shanahan, Watkins Steel and Others [2003] QADT 11 In a case before the Queensland Anti-Discrimination Tribunal last year, an employer was held vicariously liable for the sexual harassment of one employee carried out by two other employees. The court held that the employer failed to show that it had taken reasonable steps to prevent staff contravening the Anti-Discrimination Act (Qld) (Equivalent to the Victorian Equal Opportunity Act). The fact that the employer had an 'open door' policy for complaints was considered insufficient to defend the vicarious liability suit. An alarming aspect of the decision was the court's declaration that it was irrelevant that the victim had failed to inform the employer of the sexual harassment as actual knowledge was unnecessary. While this case did not involve harassment via the Internet or , when a court is determining the liability of the employer for the acts of employees, it is likely to be immaterial how the sexually harassing act was perpetrated. Thus if a similar case arose where the harassment was executed via an , a similar outcome could be expected. Legal Liability Hazards under Copyright Law An employer who merely provides the electronic means for an employee to infringe copyright and fails to prevent the employee doing so, could face legal action for copyright infringement. Subject to the fair dealing exceptions contained in the Copyright Act 1958, copyright is infringed by a person who, not being the owner of the copyright and without the licence of the owner of the copyright, does or authorises the doing of in Australia any act comprised in copyright [1]. Sections 31, 85(1) and 86 of the Copyright Act 1968 set out the acts comprised in copyright. [2] If a person authorises the doing of any of the acts comprised in copyright of a protected work without the licence of the copyright owner, they themselves infringe the copyright in that work. In determining whether a person has authorised the doing of an act comprised in copyright without the licence of the copyright owner, the following matters have to be taken into account:
3 the extent of the person's power to prevent the doing of the act concerned the nature of any relationship existing between the person and the person who did the act concerned whether the person took any reasonable steps to prevent or avoid the doing of the act including complying with any industry codes of practice. (Sections 36 (1A) and 101(1A) Copyright Act 1968). Examples of where Australian courts have found cases of authorisation of copyright infringement include a hotel hosting a band which plays copyright protected songs and a University which provides photocopiers for students who are infringing copyright by photocopying too much of a textbook. In the High Court case of University of NSW v Moorhouse (1975) 133 CLR 1, the University was held to have authorised infringement of copyright when a student made a copy of a book on a University library photocopier. The High Court declared that the University had authorised the infringement because the University provided the photocopying machines used to reproduce the book, allowed unsupervised access to the machines and took no reasonable steps to prevent the infringement. This was held despite the fact that the student was making the copy for himself alone and the University was unaware of his copyright infringement. The Court interpreted "authorise" to mean "sanction, approve, countenance". Where an employer provides Internet access to employees and those employees then infringe copyright by downloading music or video onto a company's computers, the employer faces the risk of being sued for authorising copyright infringement if the employer has not taken reasonable steps to prevent or avoid the infringement by its employees. Devices that may assist companies avoiding a copyright infringement claim include Internet usage policies, electronic warnings, employee training and electronic filtering. Defamation Defamation is a common law tort whereby a communication occurs between two or more people which tends to cause a third party's reputation to be negatively affected. This communication could be expressed verbally, in writing or as pictures, such as a cartoon or doctored photograph. A defamatory communication can be identified by its tendency to lower a party in the eyes of others or injure the reputation of a party. It is easy to imagine how a "joke" authored by an employee could contain material which disparages a colleague, customer or business rival. It is still easier to imagine such an being forwarded through an entire organization within minutes. In this scenario, what may have begun as a thoughtless comment or joke about someone's work or personal life within a social between colleagues could reach the person who is the subject of the comment and quickly develop into a defamation action. Defamation in the Workplace Although the primary responsibility for a defamatory publication falls on the publisher, a party who authorises the publication is also liable. An employer can be held vicariously liable for the defamatory publication of its employees where it is held to have authorised the publication or where the publication was made in the normal course of employment. Knowingly allowing employees to regularly send "joke" s of an offensive or defamatory nature could be interpreted by a court as authorising such s, leaving employers open to vicarious liability suits for defamation.
4 Defamatory publications made in the normal course of employment could also lead to employer liability for defamation. Publications made in the normal course of employment could conceivably include employees creating or updating intranet or external internet pages. Employers must be careful to implement a policy which strictly governs what material employees place on intranet pages or the employer's external internet site and monitor the content of these regularly. (2.) Monitoring of Employee Use of Internet and Employers may wish to monitor the on-line activities of employees for a number of reasons, for example: to keep a log of s sent and Internet sites viewed by employees to detect employees sending offensive, defamatory, confidential or copyright material via company networks to deter employees from accessing and downloading inappropriate material from the Internet It is important to recognise that simply monitoring abuses of and Internet systems will not address all legal hazards. is notoriously difficult to retract once it is sent and a mere record of unauthorised and Internet use will not be sufficient to deflect legal liability. Privacy Implications of Monitoring for Private Sector Businesses Although there is no constitutional or common law right to privacy, the Privacy Act 1988 (Cth) imposes privacy principles on the private sector. Businesses with an annual turnover of less than $3 million are exempted, but are subject to restrictions relating to the commercial use of personal records. This includes the prohibition on selling any material contained in employee s where the information allows the individual to be identified. Private sector organisations with an annual turnover of more than $3 million along with all health service providers regardless of turnover have the option of either adopting the National Privacy Principles or developing a privacy code of their own. The National Privacy Principles deal with the collection, handling and storage of personal data and are designed to ensure that personal information held by private sector organisations is managed in a reasonable and suitable manner. The first, and most relevant privacy principle, concerns the collection of personal information and requires that the collection of personal information be carried out by lawful and fair means. The Federal Privacy Commissioner refers to this principle in the Guideline on Workplace , Web Browsing and Privacy, and concludes that where the logging of employee network activities occurs without employee knowledge, it could be considered unfair and thus in breach of the privacy principle. In Halford v UK [1997] IRLR 471, a case heard before the European Court of Human Rights, an employer who monitored an employee's telephone calls without her knowledge was ordered to pay compensation. The court found that private telephone calls were covered by a concept of 'private life' and therefore the employee had a reasonable expectation of privacy. It is conceivable that the monitoring of employee s without their knowledge could be viewed in the same way.
5 Consequently, if monitoring is going to occur in your workplace, employees must be informed that monitoring will take place and should be informed of the nature of the monitoring activities. (3.) and Internet Policy Adopting an and Internet Usage Policy A well-drafted and Internet policy which is communicated to each employee, preferably upon induction, and which is updated and brought to the attention of employees regularly may avoid legal risks associated with employee and Internet abuse. However, the mere existence of an Internet and policy on its own will not be sufficient for an employer to successfully defend a legal claim based on vicarious liability, defamation or copyright infringement. All breaches of the policy must be met with an appropriate level of disciplinary action by the employer. Employers have successfully used and Internet facility policies to defend claims for unfair dismissal where an employee's employment has been terminated for misuse of the Internet in the workplace. In the recent case of Bassam Darwich and Kaal Kaal Australia Limited (U2002/4250), the Australian Industrial Relations Commission found that an employer was justified in dismissing an employee who had stored inappropriate and offensive material on the company's computer. The Commission held that the employee was deemed to be aware of the company computer policy due to a 'pop-up' screen which contained the policy. The Commission considered that the employer had taken reasonable steps to bring the relevant policy to the attention of employees and upheld the dismissal. Content of Policy There are no rules or regulations which set out the content of an and Internet policy. The policy can and should be tailored to your individual workplace. The most important aspect of creating an effective policy is to ensure that it is clear and any key terms are explained. In the Federal Court, the case of Australian Municipal, Administrative, Clerical and Services Union (ASU) v Ansett [2000] FCA 441, highlighted the importance of having a clear policy. Ansett dismissed an employee who distributed an ASU bulletin on Ansett's internal system. Ansett claimed this was a breach of the Ansett IT policy which permitted use "for the purpose of performing authorised lawful business activities". The Federal Court found that the distribution of union bulletins on Ansett's system fell within "authorised, lawful business activities" and in the decision Justice Merkel emphasised: "the desirability of employees having been made aware, in clear terms of the criteria establishing the circumstances that constitute acceptable and unacceptable use of their employer's or IT system." Stephens Lawyers & Consultants, February 2004
6 [1] Section 36(1) - Infringement of copyright in literary, dramatic, musical or artistic works. Section 101(1) - Infringement of copyright in subject matter other than works (sound recordings, cinematograph films, television and sound broadcasts). [2] For a literary, dramatic or musical work, copyright is the exclusive right to: reproduce the work in a material form publish the work perform the work in public communicate the work to the public make an adaptation of the work (Section 31(1)(a)) For an artistic work, copyright is the exclusive right to: reproduce the work in a material form publish the work communicate the work to the public (Section 31(1)(b)) For a sound recording, copyright is the exclusive right to: make a copy of the sound recording cause the recording to be heard in public communicate the recording to the public enter into a commercial rental agreement in respect of the recording (Section 85(1)) For a cinematograph film, the copyright is the exclusive right to: make a copy of the film cause the film, insofar as it consists of visual images, to be seen in public, or, insofar as it consists of sounds, to be heard in public communicate the film to the public (Section 86)
The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013
Use of Social Networking Websites Policy START DATE: March, 2013 NEXT REVIEW: March 2015 COMMITTEE APPROVAL: Joint Management Trade Union Committee CHAIR S SIGNATURE: STAFF SIDE CHAIR S SIGNATURE: DATE:
Using Public Computer Services in Somerset Libraries
Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which
TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason
TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Reference Number HR 2012 046 Version: 1 Status: Final Author: Jane Thomas Job Title HR Manager Amendment
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation
SURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape
AVCC Australian Vice-Chancellors Committee the council of Australia s university presidents Peer-to-Peer File Sharing: the Legal Landscape November 2003 This work in copyright free to universities and
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
Internet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
SOCIAL MEDIA POLICY. Introduction
Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
ICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
DISCIPLINARY PROCEDURE
DISCIPLINARY PROCEDURE 1. Purpose and Scope 1.1 The Company s procedure is designed to help and encourage all workers to achieve and maintain standards of conduct, attendance and job performance. The Company
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
Internet: Copying & Downloading
INFORM ATION SHEET G056v 09 May 2015 Internet: Copying & Downloading This information sheet is for people who want to copy or download material from the Internet or swap and share files online. The purpose
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
Copyright Implications of Content Management Systems: Schools
Copyright Implications of Content Management Systems: Schools 1. What Is A Content Management System? A Content Management System ( CMS ) is a software application that enables teaching material to be
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
Information Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
Sydney Technical High School
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
POLICY ON USE OF INTERNET AND EMAIL
POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
Social Media in the Workplace
Social Media in the Workplace A Guide for CWU Members CWU Youth Committee 2013 CONTENTS Introduction... 3 Social Networking in Ireland... 4 Guidelines for using Social Media Responsibly... 5 2 INTRODUCTION
Acceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
Virginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
Monitoring Employee Communications: Data Protection and Privacy Issues
Monitoring Employee Communications: Data Protection and Privacy Issues By Anthony Sakrouge, Kate Minett, Daniel Preiskel and Jose Saras Reprinted from Computer and Telecommunications Law Review Issue 8,
REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy
Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This
Employment Law Guide
Employment Law Guide Settlement Agreements (Formally known as Compromise Agreements) See the separate guide. Unfair Dismissal Length of employment Employees can only bring a claim for ordinary unfair dismissal
Equal Opportunity, Discrimination and Harassment
Equal Opportunity, Discrimination and Harassment Last updated: 22 November 2011 EQUAL OPPORTUNITY, DISCRIMINATION AND HARASSMENT TABLE OF CONTENTS CONTENTS PAGE OVERVIEW... 2 EQUAL OPPORTUNITY LEGISLATION...
017 Fit and proper person policy statement v1.0
017 Fit and proper person policy statement v1.0 Purpose 1. The purpose of this policy statement is to provide the Board s interpretation of the term fit and proper person in Part 2.4 of the Legal Profession
GYMNASTICS NSW PHOTOGRAPHY ACQUIRING AND DISPLAYING IMAGES OF CHILDREN POLICY
GYMNASTICS NSW PHOTOGRAPHY ACQUIRING AND DISPLAYING IMAGES OF CHILDREN POLICY POLICY NAME: DATE OF ISSUE: POLICY COVERAGE: DATE OF REVIEW: CONTROLLING BODY: Gymnastics NSW Photography Acquiring and Displaying
Bring Your Own Device Program: 2015 User Agreement
Bring Your Own Device Program: 2015 User Agreement Asquith Girls High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. Asquith Girls High
EQUAL OPPORTUNITIES AND DIVERSITY POLICY 1. GENERAL
EQUAL OPPORTUNITIES AND DIVERSITY POLICY 1. GENERAL 1.1 Juice Resource Solutions Limited embraces diversity and will seek to promote the benefits of diversity in all of our business activities. We will
Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low
Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy
HUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
Legal Research Record
Legal Research Record Summary of problem(s) Design and Dress Limited (DDL) has experienced problems due to the alleged harassment of one of their employees, Susie Baker, by another employee, Stephen Harding
Social Media Policy. Policies and Procedures. Social Media Policy
Policies and Procedures Social Media Policy 1 1. Introduction...3 2. Privacy settings and personal information.....3 3. Use of Social Media at Work.....4 4. Account Administrators and Login Details......4
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
CARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
Digital Device LOAN CHARTER
Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to
Date Amendments/Actions Next Compulsory Review Date
CTC KINGSHURST ACADEMY STAFF DISCIPLINARY POLICY AND PROCEDURE POLICY REFERENCE: POL017S Policy History Policy Ref & Version Date Amendments/Actions Next Compulsory Review Date POL017S V1.0 1 st September
Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy
Social Media Responsible officer: Director Community and Corporate Services Key Result Area: Governance and Decision Making Document type: Policy Reference: 10/01/0004 Approved by: Council Date approved:
Copyright Notice: digital images, photographs and the internet
Copyright Notice: digital images, photographs and the internet Copyright Notice Number: 1/2014 Updated: March 2014 What is a Copyright Notice?... 1 Copyright in images and photographs... 1 The basics...
[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
12 May 2014. Professor Barbara McDonald Commissioner Australian Law Reform Commission GPO Box 3708 Sydney NSW 2001. By Email to: [email protected].
12 May 2014 Geoff Bowyer T 03 9607 9497 F 03 9607 5270 [email protected] Professor Barbara McDonald Commissioner Australian Law Reform Commission GPO Box 3708 Sydney NSW 2001 By Email to: [email protected]
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
Student Laptop User Charter
Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both
Guidelines for Managing Complaints, Misconduct and Unsatisfactory Performance in the VPS
Guidelines for Managing Complaints, Misconduct and Unsatisfactory Performance in the VPS Last updated 1 January 2015 GUIDELINES FOR MANAGING COMPLAINTS, MISCONDUCT AND UNSATISFACTORY PERFORMANCE IN THE
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Telephone Acceptable Use Policy (ISP05)
Telephone Acceptable Use Policy (ISP05) Issue Date: December 2014 Version 3 Document Control 3 1. Policy Statement 4 2. Introduction 4 3. Responsibilities 4 4. Breach of Policy 5 5. Service Standards:
Organizational Policy
Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy
DISCIPLINARY POLICY AND PROCEDURE
DISCIPLINARY POLICY AND PROCEDURE Content Policy statement 1. Principles 2. Standards 3. Disciplinary procedure 4. Investigation
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
Websites & Copyright. INFORMATION SHEET G057v12 April 2014. [email protected] www.copyright.org.au
INFORMATION SHEET G057v12 April 2014 Websites & Copyright This information sheet is for web developers, bloggers, website designers, startups, businesses and anyone interested in copyright issues relevant
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT
COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT 1. Introduction The Company is committed to maintaining ethical standards in the conduct of its business activities. The Company's reputation as an ethical
Otley Town Council. Disciplinary Policy. Date Approved: 17 th February 2014 Revision Date:
Otley Town Council Disciplinary Policy Date Approved: 17 th February 2014 Revision Date: OTLEY TOWN COUNCIL DISCIPLINARY POLICY 1.0 Introduction 1.1 This policy is based on and complies with the 2009 ACAS
workplace efficiency and compliance with Impero
white paper: employee monitoring workplace efficiency and compliance with Impero task Keep employees on task whilst ensuring compliance with acceptable use policies solution Deploy a granular monitoring
Strathfield Girls High School Bring your Own Device User Charter
Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
