Franciscan University of Steubenville Information Security Policy
|
|
|
- Silvester Fowler
- 10 years ago
- Views:
Transcription
1 Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support, and servicing of information security measures at Franciscan University of Steubenville (FUS). There are certain sections within this policy that specifically apply to students, such as the end user awareness policy. The Office of Information Technology (OIT) reserves the right to change or supplement this policy at any time. Responsibility Information Security is the ultimate responsibility of the Director of OIT. Day to day and operational responsibility falls on the Director of OIT. The Director of OIT reports directly to the Executive Vice President of FUS. The Director of OIT is responsible for the overall ownership of this document and for communicating this policy, in full or in portion, to all pertinent employees on a regular basis. Maintenance This policy is reviewed at least on an annual basis for appropriateness and effectiveness as it relates to generally accepted information technology guidance. This review is performed by the Office of information Technology that is led by the Director of OIT. These policies are communicated to the President s Cabinet for approval on an annual basis, or as changes are made. The end user awareness portion of this document shall be reviewed by every new hire as part on their orientation. In addition, the section that pertains to students will be shared with the students via the student handbook. At least annually end users (student/faculty/staff) shall be notified of any changes in the program along with any tips or reminders to maintain a strong information security environment. Faculty and staff will reaffirm the policy annually. Enforcement Violations of this Policy may result in the suspension or loss of the violator s use privileges, and/or discipline up to and including termination of employment. At the university s sole discretion, additional civil, criminal and equitable remedies may be pursued. Any exceptions to this policy must be documented, reported to the Director of OIT, and brought to the attention of the Office of Information Technology and President s Cabinet for appropriate action as necessary.
2 Faculty/Staff Policy The usage of University computers and network facilities is a privilege, not a right, and improper use can result in suspension or revocation of those privileges, and/or further disciplinary measures as warranted. The Franciscan University of Steubenville (FUS) urges all faculty/staff to follow these policies and to conduct themselves within the framework of the University s Mission Statement Internet and Safety Faculty/Staff shall take full responsibility for every message they transmit through the University s computers and network facilities. No one shall use the University s network to transmit fraudulent, defamatory, harassing, obscene, indecent, or threatening messages, or any communications prohibited by law or which violates University practice, policy or the spirit of its mission Faculty/Staff are to exercise caution when forwarding or sending to a non-fus account. Sending to non-fus accounts is the same as storing that on a non-fus computer. Please carefully consider the contents of your prior to sending Faculty/staff are prohibited from using the University s computing resources for political campaigns, fundraising, commercial enterprises, mass mailings, or other outside activities that have not been granted the use of the University s facilities Faculty/Staff shall not automatically forward their FUS outside of the University. The OIT cannot control or enforce proper security policies on messages that are no longer stored on their network Faculty/Staff shall ensure that they maintain confidentiality between the University and student information with the utmost care and never share this information with any outside party unless explicitly authorized by management or the student (where applicable) Viewing, accessing, printing, or distributing indecent, obscene, or pornographic materials using University equipment, network, or internet access is strictly prohibited Faculty/Staff of the Franciscan University of Steubenville are to practice safe internet browsing and behavior that will lower the risk associated with viruses, worms, spyware, copyright infringement, etc. Internet browsing and
3 behavior may be regulated and is monitored to ensure compliance Quick tips for safe browsing include never clicking on suspicious links or offers that seem too good to be true, never sharing personal information without verifying the identity of the party requesting it, and the use of common sense Faculty/Staff shall not attempt to read, alter, or delete anyone s other than their own unless given the proper authority from staff (ie; proxy access) Faculty/Staff shall never open up attached items that appear to be related to SPAM. Faculty/Staff should alert the Office of Information Technology (OIT) in the event they receive a suspicious that appears to be SPAM SPAM messages are generally from address that you would not recognize SPAM messages also typically offer something to get your attention that is too good to be true. If something sounds too good to be true, it generally is If you believe a message is SPAM never respond to it Occasionally you may receive s from outside companies or other universities that request information about your account. Often they ask for the following: 1. First Name & Last: 2. Full Login 3. Username: 4 Password: 5. Current Password: Although the may appear to be official and appear to come from a legitimate site, in most circumstances it is fraudulent. This kind of spam is known as "phishing". It's a method used to gain access to your account(s) to acquire personal and financial information about you. Never give out this kind of information to anyone. This not only applies to your Franciscan account, but also to any personal accounts you use. If you do receive an such as this, delete it. Do not reply or forward it to anyone. Do not click on any link that it directs you to.
4 If you have provided this kind of information from your Franciscan account, please contact the Help Desk Faculty/Staff shall not share (verbally, electronically, or by any other means) personally identifiable information (including grades) about students or other faculty/staff unless authorized explicitly by the owner of that information or the OIT Faculty/Staff shall not use file sharing or peer to peer programs to illegally download to retrieve or share files. Please review the addendum to the Higher Education Opportunity Act of 2008 (HEOA) as part of Appendix A Faculty/Staff shall not copy or install software that is in violation of any copyright laws. If there is any question all faculty/staff are urged to call the OIT PC Security and Safety Faculty/Staff should ensure that their computers are configured with the hardware and software specifications recommended by the OIT. Any updates and services to the resources given to Faculty/Staff are to be applied by the OIT Faculty/Staff shall never use FUS network/computer resources without proper authorization. Faculty/Staff shall not misrepresent his or her identity or relationship to the University for the purpose of obtaining or using computer, server or network privileges and/or services Faculty/Staff shall never knowingly endanger, or attempt to endanger, the security of any University computer, server or network facility, nor willfully interfere with others authorized computer usage Faculty/Staff shall never use the University s communication facilities to attempt unauthorized use, nor to interfere with others legitimate use, of any computer, server or network facility anywhere Permission to physically connect or attempt to connect a computer or device not provided by the university to any of the University s networks must be done in the conjunction with the University s Office of Information Technology Faculty/Staff shall place confidential information onto University systems at their own risk. The University cannot guarantee the privacy of computer files, electronic mail or
5 other information by computer, whose confidentiality is not otherwise mandated by law Faculty/Staff shall not use shared university computers for unauthorized games, chat rooms, or other recreational sites for personal interest. Faculty assigned games and chat rooms to teach particular concepts can be used with prior coordinated authorization from the Coordinator of Academic Computing Faculty/Staff shall never share their passwords with another individual inside or outside of the University. In addition, faculty/staff shall never write their passwords down Faculty/Staff are required to lock their computers (password must be entered again upon return) prior to leaving their work areas All mobile devices (laptops, smart phones, PDAs, ipads, etc.) used by faculty/staff must be protected outside of the office. Faculty/Staff need to have security set up on any mobile device that integrates with the university s network or accesses any of the university s resources. At a minimum there must be a screen lock and remote wipe capabilities setup on the phone Faculty/Staff should read and understand and abide by the university s Laptop Leasing Policy (See Appendix B) Faculty/Staff shall select passwords that are strong in nature. Strong passwords have the following characteristics: Is at least eight characters long Does not contain your user name, real name, or school name Does not contain a complete dictionary word Is significantly different from previous passwords. Passwords that increment (Password1, Password2, Password3...) are not strong Contains characters from each of the following four groups (uppercase letters, lowercase letters, numerals, symbols) Changed at least every 90 days Faculty/Staff shall never attempt to modify or disrupt the configuration or operation of University software or hardware. This includes automatic system updates, anti-virus scans, personal firewall settings, or any other process initiated by the OIT.
6 Faculty/Staff are responsible for archiving their own s. The OIT will give guidance and instruction on how to do this but faculty/staff are ultimately responsible for ensuring that any important s don t get purged from the FUS systems Faculty/Staff are responsible for all data stored locally on their laptop or desktop. Users should take care to ensure that all FUS related materials are stored on the user s corresponding network drive as this drive is archived and backed up regularly. Faculty/Staff are responsible for backing up any data on their laptop or PC s local drive. FUS is not responsible for any data stored on laptops Any material that is stored on an FUS network drive that is not work or academically related to FUS is subject to removal upon the Office of Information Technology s discretion Faculty/Staff are to have anti-malware (anti-spyware and antivirus) application systems installed on their systems The anti-malware application system is to receive updated virus and malware definitions and application updates on a regular basis or as soon as they come available from the vendor The anti-malware application system is to be configured to fully scan the faculty/staff computer on a regular basis for known malware Network Security and Safety Faculty/Staff may not modify or tamper with any university owned network wiring, wall faceplates, or network devices. Faculty/Staff who do not follow this policy will be assessed a fee based on time and materials for the repair of any damage to University resources Faculty/Staff are prohibited from setting up their computers to be used as DHCP, DNS, File Sharing, WEB or FTP servers. Computers cannot be set up to act as a bridge, a router, or a gateway Faculty/Staff are prohibited from setting up an additional network by attaching a wireless access point, a hub, router or a switch to the network Under no circumstances will any member of faculty/staff be permitted to use their network connection or computing privileges for non-university or commercial purposes. Faculty/Staff may not advertise any commercial products. Any member of faculty/staff found to be using their connection for
7 commercial use will be disconnected from the network and subject to discipline under appropriate University policies Faculty/Staff requiring remote access to FUS information technology resources must review and acknowledge understanding of the Remote Usage Policy which can be found as Appendix B of the Franciscan Information Security Program Faculty/Staff are prohibited from installing any software on PC s or laptops provided by the university without authorization from OIT Remote access to/from a university computer must adhere to the University s Remote Access Policy and must be approved by the Department Head/Vice President and OIT.
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
IT1. Acceptable Use of Information Technology Resources. Policies and Procedures
IT1 Policies and Procedures Acceptable Use of Information Technology Resources Originator: Information Technology Governance Committee Approver: President s Council Effective: October 16, 2007 Replaces:
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or
Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or desktop for their use while in training. If a recruit
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
Massachusetts College of Pharmacy and Health Sciences Information Services Acceptable Use Policy
Massachusetts College of Pharmacy and Health Sciences Information Services Acceptable Use Policy Due to the ever-increasing need for integrated technology and data sharing, and because of legal and ethical
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
POLICIES AND REGULATIONS Policy #78
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
COMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
COLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students AUP Sections 1. Acceptable Use 2. Privileges 3. Internet Access 4. Procedures & Caveats 5. Netiquette
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
TECHNOLOGY ACCEPTABLE USE POLICY
Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources
Boston Public Schools Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and Scope of Policy Technology Resources ACCEPTABLE USE POLICY AND GUIDELINES Boston
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
POLICY 4526. Adopted by Board of Education: 4/20/05
POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY CONTENTS I. Introduction II. Violation of this Acceptable Use Policy III. Prohibited Uses and Activities IV. Customer
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks
MAINE COMMUNITY COLLEGE SYSTEM GENERAL ADMINISTRATION Section 203 SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks As with any college
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Terms and Conditions- OnAER Remote Monitoring Service
Terms and Conditions- OnAER Remote Monitoring Service TERMS OF SERVICE Please read these terms of user ( Agreement or Terms of Service ) carefully before using the services offered by AERCO International,
------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
Technology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
[Acceptable Use Policy]
South College Computer Code of Ethics [Acceptable Use Policy] Introduction Freedom of expression and an open environment to pursue scholarly inquiry and for sharing of information are encouraged, supported,
RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES
Administrative RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES For any individual or group utilizing WRDSB technology Responsibility: Legal References: Related References:
Electronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
