NETWORK AND INTERNET SECURITY POLICY STATEMENT
|
|
|
- Clyde Singleton
- 10 years ago
- Views:
Transcription
1 TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004 Discussed with Leadership Group February 2004 Revised by ICT Strategy Group February 2004 Confirmed by Leadership Group April 2004 Confirmed by Governors June 2004 Reviewed September 2008 Reviewed February 2010 Reviewed October 2010 Next Review As Required (Not Exceeding 3 Yrs)
2 Network and Internet ICT Security Overview The purpose of this policy is to provide a framework to protect the computer systems, network servers and all data stored on the Tadcaster Grammar School network and to provide a safe and secure working environment for the users of the network. This policy will provide guidelines to ensure that no important data, user files or sensitive information is viewed, deleted either accidentally or otherwise or compromised in any way by unauthorised persons. It is the policy of the school to ensure that: All central computer systems and information contained within them will be protected against unauthorised access or misuse. All staff and students of the school are aware that it is their responsibility to adhere to this policy. The integrity of all central computer systems, the confidentiality of any information contained within or accessible on or via these systems is the responsibility of the Network Team. All breaches of security will be reported to and investigated by the Network Manager or suitably authorised persons within the Network Team. Statement of Authority and Scope This policy is intended to detail the accepted good practice policies in the use of networked computer systems. All staff and students of the school who abide by these policy guidelines are entitled to use the computing facilities at Tadcaster Grammar School. The Network Manager administers this policy with the full support of the Leadership Team and the Governing body. Responsibilities of Network Users Individual users are responsible for their own actions. The use of networked computer systems by individuals at Tadcaster Grammar School assumes and implies compliance with these policies without exception. All users should keep their passwords safe; never write passwords down our let anyone see them entering their password. They are advised to change their network password regularly and to keep it as complex as possible, they should never use their name or a word that people could easily guess. 1
3 All network computer users should ensure that - They comply with all relevant laws and acts specifically the Computer Misuse Act, Data Protection Act and Copyright Act. Network accounts and passwords are not shared. At the end of a computing session a user should ensure that they correctly log off any computer they are logged onto. Any network security breaches are promptly reported to the Network Team. No personal data is stored on the local hard disks of computers that multiple users have access to. If a workstation is to be left unattended for any reason, the logged in user should ensure that the workstation is locked using the built in security feature of the operating system (Windows NT, 2000 and XP allow this). If this is not possible then the user should log off. The use of staff personal laptops or PC s on the school network is not permitted without the authorisation of the Network Manager. The use of student personal laptops or PC s on the school network is not permitted without the authorisation of the Network Manager. The use and installation of file sharing and bit-torrenting programs on Laptops or Desktop PCs is not permitted. The use of Anonymous Proxy websites or software which bypasses the North Yorkshire County Council content filtering is not permitted. No Password cracking, Keylogging, IP Scanning, BIOS cracking, Port Scanners, Network packet sniffers or any other hacking or cracking software of any description should be installed, stored or run on the network computer systems. Logging and Monitoring All Internet and VLE access is logged, the school reserves to right to monitor, view, collect and analyse these logs. The school reserves the right to access any material stored on the network file servers. Any monitoring, logging or viewing shall be for the purpose of performance analysing, fault diagnosis or security reasons. 2
4 Usernames and Passwords All network users must have a valid user account to use computer systems (Network, VLE, School Management System, eportal and ) at Tadcaster Grammar School. Valid user accounts are only issued by the Network Team for individual use. Account details should not be shared, given away or offered for use to anybody else. User accounts and passwords issued by the Network Team are for the sole use of the individual to which they were issued. All users will be provided with a home directory space on one of the network file servers. Accounts will be deleted when the user leaves the school. Due to the plethora of password cracking programs freely available on the Internet, it is the schools policy that all passwords shall have a minimum of eight characters. The school reserves the right to disable any users account in the event of misuse of the network computer system. The security rights assigned to an individual user shall be those necessary for that user to fulfil their role within school. This includes, but is not necessarily limited to accessing their own files, accessing shared files, running permitted software and accessing the Internet and . This will not include rights to access another users files, access school management software (unless their role in school permits them to do so), tamper with and alter network, desktop, Internet and system files on the Network Servers and Desktop PC s, install software on the networked PC s unless permitted to do so and any other activity which alters or affects the performance, integrity and reliability of computer systems attached to the Tadcaster Grammar School network. Anti Virus Security The school maintains a system where Anti-virus software is installed on the network servers and on desktop PC s and laptops. The Anti-virus software is maintained and updated regularly to ensure that the latest viruses are detected and deleted. Any user who suspects that their machine has been infected with a Virus should contact the Network Team immediately. The Network Team will provide free of charge a range of virus software, scanners and virus removal tools for use on a member of staffs home PC on request. The scanning of users private documents is for one purpose only the prevention of the spread of harmful computer viruses. The virus scanning 3
5 software does not log or read the content, title or ownership of any files scanned. Wireless Technology Wireless technology greatly enhances the use of mobile computing and has benefits for learning and teaching within school. By their very nature though, a wireless LAN has the potential to be very open to hacking. Anyone within the range of a wireless access point has the capability, with the right equipment to listen to data packets being transmitted across the network which could contain users passwords and other sensitive information. The free availability and ease of use of hacking tools on the Internet makes this threat very real. The ease with which wireless laptops can be attached to an existing wireless network infrastructure raises serious issues of security. Without proper management wireless networking can affect the stability, reliability and security of the network. It is the schools policy that unmanaged access to the network through the use of wireless technology is not acceptable. The Network Manager and authorised persons within the Network Team will provide the framework, design and implementation of all wireless technology and devices connected to the network. This will include allocation of IP addresses, location and range of wireless access points, implementation of encryption standards, allocation of public keys and connection to the network of all wireless devices. Use of Administrator Accounts For the purposes of installing Operating Systems and software, configuring computers, setting up usernames and passwords, creating directory structures on the servers and any other administration duties required on the network only the Network Manager and authorised persons within the Network Team shall have access to the administration username and password on the network servers and any PC s or laptops connected to the network. This does not in any way imply that a member of staff would knowingly corrupt or change server or desktop setting. This is more an acceptance and understanding of the fact that PC configurations and other important settings can be changed by accident, and that the possibility of this happening should be alleviated as much as possible. This will be done without unduly restricting a users access to a PC and the work-related programs they can run. The proliferation of more destructive viruses, malware and spyware necessitates the need to tighten up security in this area. If a user is logged on with administrator rights and that machine is infected with a virus, the risks to the integrity of the network are dramatically increased. Microsoft issues clear warning about the security risks you expose yourself to when you run Windows 2000 and XP as an administrator. 4
6 By implementing these procedures the school is following accepted good practice that only administrators of the network should have administration rights to the Network Servers and any PC s or Laptops connected to the network. School Management System (Facility and eportal) Staff are required to change their eportal password every 30 days. Staff should not share their username and password with any other person. Physical Security Desktop PC s, network cabling or leads should not be moved, tampered with or adjusted in any without the express permission of the Network Team. Students should not be left unsupervised in IT Rooms; a member of staff should be present at all times. Storage and Processing of Sensitive School Information Laptops: No sensitive data should be stored on School Laptops unless the laptop has had its hard disk encrypted. ICT Support will install the necessary software on your machine and setup the encryption. USB Sticks (or any USB External Storage): No sensitive data should be stored on USB storage unless the USB storage device has been fully encrypted. ICT Support will install the necessary software on your USB storage device and setup the encryption. It is the individual member of staff who has responsibility to inform ICT Support that their laptop or USB storage device requires encrypting. Office Computers: No sensitive data should be stored on the local drives of any office computers. All data should be stored on the School Network. attachments containing sensitive data should not be sent internally (to other staff in school). If any sensitive data needs to be shared with other members of staff, this should be done via shared folders on the school network. ICT Support can help with this to ensure that sensitive data is stored in the correct place on the network. attachments containing sensitive data sent to external agencies should be encrypted School Management System (Facility and eportal): Any sensitive data printed out from either eportal or Facility should be marked with the word PROTECT in the footer of each page. 5
7 Computer Generated Documents: Any documents created electronically (in Word or Excel for example) that contain sensitive data should be marked with the word PROTECT in the footer of each page. Paper Records: Any paper records that contain sensitive data should be stored securely. If the paper records are no longer required they should be shredded. 6
BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3
CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD
ABERDARE COMMUNITY SCHOOL
ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been
A Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2
Information Security Code of Conduct
Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security
Network Security Policy
KILMARNOCK COLLEGE Network Security Policy Policy Number: KC/QM/048 Date of First Issue: October 2009 Revision Number: 3 Date of Last Review: October 2011 Date of Approval \ Issue May 2012 Responsibility
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Information Security Policy. Policy and Procedures
Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable
Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)
Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS
Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information
NETWORK SECURITY GUIDELINES
NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus
Student Halls Network. Connection Guide
Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to
Microsoft Windows Client Security Policy. Version 2.1 POL 033
Microsoft Windows Client Security Policy Version 2.1 POL 033 Ownership Policy Owner: Information Security Manager Revision History Next Review Date: 2 nd April 2015 Approvals This document requires the
NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction
NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
The Ministry of Information & Communication Technology MICT
The Ministry of Information & Communication Technology MICT Document Reference: ISGSN2012-10-01-Ver 1.0 Published Date: March 2014 1 P a g e Table of Contents Table of Contents... 2 Definitions... 3 1.
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version
ENISA s ten security awareness good practices July 09
July 09 2 About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European
SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0
SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY
Course: Information Security Management in e-governance
Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
Information Security Guide for Students
Information Security Guide for Students August 2009 Contents The purpose of information security and data protection...1 Access rights and passwords...2 Internet and e-mail...3 Privacy protection...5 University
Terms and Conditions of Use - Connectivity to MAGNET
I, as the Client, declare to have read and accepted the terms and conditions set out below for the use of the network connectivity to the Malta Government Network (MAGNET) provided by the Malta Information
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
Data Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
Sibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
Working Practices for Protecting Electronic Information
Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that
Kenmore State High School Student Laptop Charter
Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6
Information Security Policy
Information Security Policy The purpose of this Policy is to describe the procedures and processes in place to ensure the secure and safe use of the federation s network and its resources and to protect
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
INFORMATION GOVERNANCE POLICY: NETWORK SECURITY
INFORMATION GOVERNANCE POLICY: NETWORK SECURITY Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 1.2 Approved by: Information Governance Group Approval Date:
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
Acceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
School Information Security Policy
School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...
Wellesley College Written Information Security Program
Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as
BCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
PS177 Remote Working Policy
PS177 Remote Working Policy January 2014 Version 2.0 Statement of Legislative Compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data Protection
GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET
FACTSHEET When setting up a small business there can be many areas of uncertainty, but getting your IT or computer systems right and connected does not need to be one of them. If your company is either
General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information
General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information The following rules of behavior apply to all Department of Homeland Security
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
Canon WFT-E1 (A) Wireless File Transmitter. Network Support Guide
1 Canon WFT-E1 (A) Wireless File Transmitter Network Support Guide Windows XP - Infrastructure Wireless Mode Connection 2 Setting up the WFT-E1A on Windows XP Home or Professional Infrastructure Wireless
Dulwich College ICT Acceptable Use Policy
Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These
Certificate and Diplomas in ICT Professional Competence (4520-01/02/03/04)
Certificate and Diplomas in ICT Professional Competence (4520-01/02/03/04) Levels 1-4 unit handbook for centres www.cityandguilds.com July 2011 Version 1.2 (May 2012) About City & Guilds As the UK s leading
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures. (March 2012)
NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures (March 2012) Contents Ownership... 3 Privately-owned devices... 4 Optional peripherals... 4 Warranty & Insurance... 4 Stolen or Lost Laptops...
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
ScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
Safe Practices for Online Banking
November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Working Together Aiming High!
Poplar Street Primary School ICT Security and Acceptable Use Policy E-Safety policy 2013/14 Working Together Aiming High! 1 Contents 1. Introduction... 3 2. Policy Objectives... 3 3. Application... 3 4.
Cyber Essentials Questionnaire
Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.
Ixion Group Policy & Procedure. Remote Working
Ixion Group Policy & Procedure Remote Working Policy Statement The Ixion Group (Ixion) provide laptops and other mobile technology to employees who have a business requirement to work away from Ixion premises
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
ICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
Web Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
How To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
Protection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
Franciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
31 Ways To Make Your Computer System More Secure
31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows
