COMPUTER AND NETWORK SERVICES POLICY

Size: px
Start display at page:

Download "COMPUTER AND NETWORK SERVICES POLICY"

Transcription

1 Administrative Instruction ICC/AI/2006/001 COMPUTER AND NETWORK SERVICES POLICY The Registrar, for the purpose of delineating the acceptable use of the Information and Communication Technologies of the Court promulgates the following: Section 1 Definition of Terms a. ICT: Information and Communication Technologies b. ICT Resources: all hardware and software issued by the Court related to information and communications technology c. Mobile Devices: Laptops, Personal Desktop tools, mobile telephones, remote access cards and all future mobile devices introduced in the ICC. d. Internet: a public and open network connecting many thousands of computer networks. Internet utilizes multiple communication protocols to create a world wide communication medium. e. Intranet: a private network based on the communication standard of the Internet. Only the staff members of the ICC and authorized users can access this network. f. Authorized Users: All staff members, elected officials of the Court, Visiting Professionals and Interns/Clerks, Consultants, Contractors and other persons granted access to use the ICT Resources. g. Account: The Unique Log on Identification that is allocated to each user by the ICT Section and which is used to access the ICC network or applications. Page 1 of 9 Maanweg 174, 2516 AB The Hague, The Netherlands Maanweg 174, 2516 AB La Haye, Pays-Bas Telephone Téléphone +31(0) / Facsimile Télécopie +31(0)

2 h. Virus: a piece of programming code usually disguised as something else that causes some unexpected and, for the victim, usually undesirable events and which is often designed so that it is automatically spread to other computer users Section 2 Objectives of the Administrative Instruction 2.1. This Administrative Instruction aims to: (a) Ensure that staff members and other authorized users are informed of the rules regarding the use of ICT Resources. (b) Make certain that these resources and services are used in an ethical manner consistent with the nature of the work of the Court. (c) To ensure that the availability, functionality, integrity and security of ICT Resources is maintained. Section 3 Proper usage 3.1. All staff members, elected officials of the Court, Visiting Professionals and Interns/Clerks shall be assigned an account for the duration of their employment or mandate within the ICC. The supervisor of the staff member, Visiting Professional and Intern/Clerk shall be responsible to make the appropriate request to add, modify, or delete an account Contractors or consultants who have signed the Oath of Office and/or the Confidentiality Undertaking may request to be assigned an account if this is necessary to fulfil the terms of their contract. The ICC representative who is responsible for overseeing the work of the contractor or consultant shall make the request on behalf of the contractor or consultant to the ICT Section and shall be responsible for management of the account. Access shall be withdrawn automatically when the contractor or consultant no longer works for the Court or upon the completion or termination of the contract, whichever comes first Any account shall be the responsibility of a specific person assigned to a specific function. Except in the instances of , accounts that allow many people access to information through a single account name are not allowed unless no other technical solution exists All users shall be provided with password protected systems. Users are responsible for the security of their passwords, tokens that store or generate their passwords and their accounts using the guidelines outlined below: (a) Under no circumstances may passwords be shared between users; (b) Passwords must not be written down; (c) Passwords must contain at least six characters containing a number and a symbol. An example would or _doit4me; 2 / 9

3 (d) The password administration system forces a password change every three (3) months With the exception of material owned by third parties, the Court is the legal owner of all information stored on or passing through its systems. Section 4 Prohibited Use 4.1. Certain materials are incompatible with the ethical standards of the Court. The ICT Resources must not be used to view, store or disseminate such materials. These include, but are not limited to: a) Pornographic texts or images; b) Material promoting sexual exploitation or discrimination, racism and violence; c) Messages that are derogatory, inflammatory or discriminatory regarding race, age, disability, religion, national origin and sexual preference; d) Destructive codes (e.g. viruses, self replicating programs) and material concerning ʹhackingʹ mass mail or chain letters; e) Personal solicitations, promotions, and commercial advertisements; 4.2. In general, the Court shall not allow its ICT Resources to be used to display, store or send (by or any other form of electronic communication such as external bulletin boards, chat rooms, Usenet groups) material that is: fraudulent, harassing, embarrassing, sexually explicit, profane, obscene, intimidating, defamatory or otherwise inappropriate or illegal In cases where there is a professional need to use the ICT Resources and Internet services to consult material prohibited above; authorization from the appropriate supervisor should be obtained Users must not post Court related information to public forums on the Internet (such as public discussion or chat groups), unless this refers to materials that have been appropriately authorized and express permissions have been granted Use and treatment of the ICT Resources and Internet services that may limit computer resources availability or unfairly monopolize these resources are not allowed. This includes, but is not limited to: a) Downloading games or entertainment software for playing on line games; b) Copying of private audio CDs onto the network; c) Engaging in on line chat groups, uploading or downloading large files for other purposes than discharging duties as established by the Rome Statute, the Rules of Procedure and Evidence or any other applicable rules or regulations governing the procedures and work at the ICC; 3 / 9

4 d) Subscription to real time automatic information distribution services the Internet (socalled ʹpush servicesʹ) unless related to work activities e) Peer to peer networking, file sharing services; f) Instant messaging or similar; g) Any services which can disrupt, disable or otherwise affect the proper functioning of the Court or its ICT Resources In principle, the ICC does not allow the personal use of its ICT Resources. However, authorized users may exceptionally use their account for urgent personal matters if this does not affect their work or the integrity and security of the system and does not unduly consume ICT Resources. Users must be aware that the ICC will not guarantee any privacy of personal usage of its ICT Resources Personal use of the ICT Resources, including network, internet and the e mail system, must satisfy the following provisions: (a) The ICT Resources should not be used in a manner that has a negative impact on the availability of the resources; (b) No personal use may be made by, or on behalf of, any organization or third party; (c) No personal soliciting is allowed. Resources may not be used to lobby, solicit, recruit, sell, or persuade for or against commercial ventures, products, religious or political causes, outside organizations, or the like; (d) Other than minor transactions like Internet banking and online purchases, the resources may not be used for any activity that would result in a commercial gain for an employee; (e) Resources must not be used to engage in or support offensive activities. Section 5 Copyright Compliance 5.1. The ICT Section shall be the sole distributor of licensed software in the organization Users are responsible for complying with copyright law and licenses that apply to software, files, graphic, documents, messages or other material that can be downloaded or copied. Users must neither use nor make copies of software unless they have verified that the copies comply with the license agreement signed between the vendor and the Court Users may not use the Court s ICT Resources to copy material protected under copyright law or make such material available to others for copying The ICT Section reserves the right to remove unauthorized or improperly licensed software from its ICT Resources. 4 / 9

5 Section 6 Use of There is no guarantee of privacy or confidentiality for e mail; therefore, users of the e mail system should carefully consider the nature of information sent via e mail Mailbox messages must be archived regularly by the authorized user to ensure the proper functioning of the mail servers and the roaming profiles of the users. Mailbox messages shall be automatically archived by the e mail system 30 days after reading; sent mail shall be automatically archived by the e mail system 30 days after sending. Trash shall be deleted automatically 7 days after deletion from the mailbox. Manually deleted trash is not retained in any way Incoming is checked by a virus checker. In some cases may be blocked if it is flagged as suspicious. The ICT Section shall release blocked only after the has been declared virus free There is a limit of 2MB file size on incoming and outgoing mail for personal use Functional accounts (like Personnel, Public Information, Investigation Teams, etc) shall be allowed broader access on request used for business purposes (attachment sizes of functional accounts) shall be dealt with on a case by case basis, depending on the services required. Alternative methods for the electronic transfer of large amounts of data will be available The following official disclaimer (both the English and French version) shall be added automatically at the foot of every outgoing message. This message contains information that may be privileged or confidential and is the property of the International Criminal Court. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized by the owner of the information to read, print, retain copy, disseminate, distribute, or use this message or any part hereof. If you receive this message in error, please notify the sender immediately and delete this message all copies hereof «Les informations contenues dans ce message peuvent être confidentielles ou soumises au secret professionnel et elles sont la propriété de la Cour pénale internationale. Ce message n est destiné qu à la personne à laquelle il est adressé. Si vous n êtes pas le destinataire voulu, le propriétaire des informations ne vous autorise pas à lire, imprimer, copier, diffuser, distribuer ou utiliser ce message, pas même en partie. Si vous avez reçu ce message par erreur, veuillez prévenir l expéditeur immédiatement et effacer ce message et toutes les copies qui en auraient été faites.» 6.8. When an account holder leaves the employ of the Court, the corresponding e mail account shall be suspended for 30 days. After that it shall be deleted. During the 30 days period and upon request (with authorization) it may be possible to add an out of office message that tells the recipient who to contact within the Court or to retrieve information from the account. 5 / 9

6 6.9. E mail shall not be automatically forwarded to external accounts. All requests for automatic e mail forwarding shall not be granted. Users are not permitted to configure their account to automatically forward their e mail to an external account Individuals are not permitted to send (personal or business) messages to all ICC. The ICT Section provides functional e mail accounts for this purpose. Requests for functional accounts of this nature must be made through ICT Service Desk. This measure does not apply to the Heads of Organ The ICT Section may block inappropriately addressed and inappropriately named addresses Users may request secure remote access to Court by contacting the ICT Service Desk, using the appropriate procedures as advertised on the Court s Intranet. Section 7 Internet Access 7.1. The Internet is not to be regarded as a safe medium and should not be used to transmit confidential or sensitive information without encryption The domain ICC CPI.INT is the unique official registration for the International Criminal Court. Internet registration is effected through the ICT Section Court computers or networks may only be connected to the public Internet through approved access control systems Users must be aware that Internet usage is not anonymous; Internet usage leaves traces on the ICT Resources of the Court and external parties. Users must therefore not misrepresent, obscure, suppress or replace their own or another userʹs identity on the Internet or on any Court information system. 6 / 9

7 Section 8 Monitoring and logging 8.1 Under the guidance of the Chief of Section, the ICT Section monitors all ICT Resources for business continuity purposes, proactive support and integrity checking. This routine monitoring shall not extend to the content of the information communicated or stored by such resources, which shall be monitored only in accordance with sections 8.2 and 8.3 below The Court reserves the principled right under conditions laid in item 8.3, to monitor and log any and all aspects of its ICT Resources, for the purpose of verifying compliance with this Administrative Instruction and guaranteeing the integrity and security of the ICT Resources. Such monitoring and logging may include but is not limited to: (a) The content inventory of its personal computers; (b) Chat groups, news groups; (c) Internet sites visited; (d) Files downloaded; (e) Communications sent and received electronically The Court may monitor and log the use of its ICT Resources by authorised users whenever there is a well founded suspicion that illegal or otherwise prohibited or wrongful conduct is taking place. Supervisors shall submit requests to monitor application and system usage, including but not limited to e mail use and messages for cause to the relevant authorizing executive: The President (for Presidency and Chambers staff), The Prosecutor (for staff of the Office of The Prosecutor), the Registrar (for Registry staff), and the Director of the Secretariat of the Assembly of States Parties (for staff of the Secretariat of the Assembly of States Parties) Users can request or consent to monitoring for the purposes of identifying and/or neutralizing threatening, offensive or otherwise inappropriate s addressed to them The monitoring activity shall be executed by the staff of the ICT Section under the guidance of the Information Security Officer and will be logged. The log files shall be made available to the appropriate relevant authorizing executive on request Any personal data that is collected by the ICT Section shall, as a minimum, be treated in conformity with the International Labour Organisation s Code of practice on the protection of workers personal data. All authorised users shall be informed about any data collection process, the rules that govern that process and their rights in this respect. 7 / 9

8 Section 9 Conditions of use of telephones and Mobile Devices (PDA s, laptops, mobile telephones) 9.1. Identified Court Sections (i.e. Finance and ICTS) shall have access to detailed mobile and landline phone call records for the sole purpose of invoicing staff members for those calls where appropriate Unless noted in the contract of employment, or authorized in writing by the Division Head or Senior Manager, staff members and other registered users shall be responsible for the cost of all personal telephone calls and other communications (both outgoing and incoming, if roaming charges apply). These costs will be automatically deducted from the salary For property control and audit purposes, the loss or theft of a Mobile Device must be reported immediately to the local police, ICT Service Desk, the Court Security Section, Property Control and Inventory Unit and followed up with a written report. Liability for loss of such device shall be ascertained and dealt with in accordance with Administrative Instruction ICC/AI/2005/04. Section 10 Viruses The Court has strict zero tolerance for viruses. A file identified as infected by a virus shall not be allowed on the Court network. The sender shall receive an notification indicating the action taken All files coming through the central e mail service shall be scanned for viruses. All files that are considered to be suspicious shall be moved to a safe area and the user shall receive a message that a suspicious e mail has been received In order to avoid infection of files, the ICT Section may shut down ICT services as necessary for a limited time in case of threats to its proper functionality. The ICT Section shall inform the Heads of Organ and users as appropriate. Section 11 Responsibility The Chief of the ICT Section shall be responsible for the day to day implementation of this Administrative Instruction, under the supervision and delegated authority of the Registrar, and in consultation with the Prosecutor, the President and the Information Systems Technology Board In addition, the Chief of the ICT Section is responsible for; (a) Security of communications and protection of electronic data; 8 / 9

9 (b) Providing a standard desktop configuration that complies with the security standards of the Court; (c) Administering the Court network, network servers and client configurations, including provision of access rights that may affect configuration changes; (d) Provision of secure services for data exchange of large data transfers (like secure FTP). Section 12 Final Provisions Violations of this Administrative Instruction or other Court policies governing the use of the ICT Resources may result in disciplinary action in accordance with the Staff Rules and Regulations, as applicable Users wishing to request exceptions to any section of this policy should do so by written communication to the ICT Section This policy applies to all users based in the Headquarters and in Field Offices of the Court This policy shall be reviewed at least annually This Administrative Instruction takes effect on 7 th August 2006 Bruno Cathala Registrar 9 / 9

ANNEX 1. Le Greffe. The Registry

ANNEX 1. Le Greffe. The Registry ICC-01/04-01/10-102 -Anx1-Red 24-05-2011 1/5 FB PT Le Greffe The Registry ANNEX 1 Maanweg 174, 2516 AB The Hague, The Netherlands Maanweg 174, 2516 AB La Haye, Pays Bas Telephone Téléphone +31(0)70 515

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

COLLINS CONSULTING, Inc.

COLLINS CONSULTING, Inc. COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

DIOCESE OF DALLAS. Computer Internet Policy

DIOCESE OF DALLAS. Computer Internet Policy DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used

More information

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy 1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

Dauphin County Technical School

Dauphin County Technical School Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

INTERNET ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer

More information

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer

More information

City of Grand Rapids ADMINISTRATIVE POLICY

City of Grand Rapids ADMINISTRATIVE POLICY City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC

More information

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

Franciscan University of Steubenville Information Security Policy

Franciscan University of Steubenville Information Security Policy Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,

More information

Introduction. General Use

Introduction. General Use Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use

More information

SAS TRUSTEE CORPORATION ( STC )

SAS TRUSTEE CORPORATION ( STC ) SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE

SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

How To Monitor The Internet In Idaho

How To Monitor The Internet In Idaho Idaho Technology Authority (ITA) ENTERPRISE POLICY P1000 GENERAL POLICIES Category: P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING CONTENTS: I. Authority II. Abstract III. Definitions IV. Policy

More information

BOARD OF EDUCATION POLICY

BOARD OF EDUCATION POLICY BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students. POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive

More information

Revelstoke Board of Education Policy Manual

Revelstoke Board of Education Policy Manual Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS

More information

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

EMPLOYEE COMPUTER USE POLICY

EMPLOYEE COMPUTER USE POLICY EMPLOYEE COMPUTER USE POLICY SECTION ONE PURPOSE A. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, Navigator Pointe Academy makes available

More information

POLICY ON USE OF INTERNET AND EMAIL

POLICY ON USE OF INTERNET AND EMAIL POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic

More information

Board Adopted Policy

Board Adopted Policy Board Adopted Policy Policy Title Information Technology Systems Usage Effective Date:03/14/2012 Board Approval Date: 6/19/2014 Review Cycle: three (3) years I. Application: Authority wide. II. Intent:

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

Technology Standard. Electronic Communications Standard PURPOSE SCOPE APPLICABILITY

Technology Standard. Electronic Communications Standard PURPOSE SCOPE APPLICABILITY Technology Standard Electronic Communications Standard Version: 2.0 Status: Approved 06/17/09 Contact: Director, Technology Services PURPOSE The Virginia Community College System is committed to using

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

Rules of the Road for Users of Smithsonian Computers and Networks

Rules of the Road for Users of Smithsonian Computers and Networks Rules of the Road for Users of Smithsonian Computers and Networks Introduction Smithsonian systems, networks and other computer resources are shared among Smithsonian employees, interns, visiting scholars,

More information

COMPUTER, INTERNET, & EMAIL USE POLICY

COMPUTER, INTERNET, & EMAIL USE POLICY COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

INFORMATION AND COMMUNICATION TECHNOLOGY REGULATIONS (Acceptable Use and Internet Safety)

INFORMATION AND COMMUNICATION TECHNOLOGY REGULATIONS (Acceptable Use and Internet Safety) INFORMATION AND COMMUNICATION TECHNOLOGY REGULATIONS (Acceptable Use and Internet Safety) Purpose The Information and Communication Technology (ICT) systems of the District are limited to an educational

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

6141.9. Internet and Computers. Acceptable Use and Internet Safety

6141.9. Internet and Computers. Acceptable Use and Internet Safety 6141.9 Acceptable Use and Internet Safety The Board of Education provides computers, a computer network, including Internet access and an email system, as well as electronic devices such as cellular telephones

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN TITLE: NUMBER: BUL - 999.8 ISSUER: Acceptable Use Policy (AUP) For District Computer and Network Systems Ronald S. Chandler, Chief Information Officer

More information

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE TITLE: COMPUTER USE POLICY PAGE 1 OF 5 EFFECTIVE DATE: 07/2001 REVIEW DATES: 02/2003, 09/2006 REVISION DATES: 03/2005, 03/2008 DISTRIBUTION: All Departments PURPOSE APPROVED BY: Signatures on File Chief

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

ICT Acceptable Use Policy

ICT Acceptable Use Policy ICT Acceptable Use Policy Document Management Document Disclaimer This document is issued only for the purpose for which it is supplied. Document Owner This document is produced and owned by Staffordshire

More information

a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers.

a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers. CAYUGA COUNTY POLICY MANUAL Section 11 Subject: Electronic messaging and internet 1 Effective Date: 5/25/10; Res. 255-10 Supersedes Policy of: November 28, 2000 Name of Policy: County Computer Hardware-Software

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) YUKON PUBLIC SCHOOLS: DISTRICT POLICY BJ-R1 YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) To ensure that our students and employees become proficient in

More information

Asheboro City Schools 1:1 Laptop Handbook for Elementary and Middle Schools

Asheboro City Schools 1:1 Laptop Handbook for Elementary and Middle Schools Asheboro City Schools 1:1 Laptop Handbook for Elementary and Middle Schools Students should use technology and the Internet in an appropriate manner. Technology is an integral part of a student s educational

More information

Internet, Email and Computer Use Policy

Internet, Email and Computer Use Policy Policy Reference Number Internet, Email and Computer Use Policy 16 CP Responsible Department Related Policies Corporate & Community Services Code of Conduct for Elected Members, Records Management, Risk

More information

Internet Acceptable Use Policy

Internet Acceptable Use Policy 1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

section 15 Computers, Email, Internet, and Communications

section 15 Computers, Email, Internet, and Communications section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property

More information

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources

More information

Virginia Commonwealth University Police Department

Virginia Commonwealth University Police Department Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media

More information

RIVERVIEW SCHOOL DISTRICT

RIVERVIEW SCHOOL DISTRICT No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK

More information

How To Use Your Cell Phone At Renaissance Academy Charter School

How To Use Your Cell Phone At Renaissance Academy Charter School Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance

More information

Sample Policies for Internet Use, Email and Computer Screensavers

Sample Policies for Internet Use, Email and Computer Screensavers Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies

More information

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE 2 of 10 2.5 Failure to comply with this policy, in whole or in part, if grounds for disciplinary actions, up to and including discharge. ADMINISTRATIVE CONTROL 3.1 The CIO Bureau s Information Technology

More information

f. Engaged in for any purpose that is illegal or contrary to Gateway Preparatory Academy policy or business interests.

f. Engaged in for any purpose that is illegal or contrary to Gateway Preparatory Academy policy or business interests. A. Employee Computer use COMPUTER USE POLICY AND AGREEMENT SECTION ONE PURPOSE 1. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, makes available

More information

COMPUTER USE POLICY. 1.0 Purpose and Summary

COMPUTER USE POLICY. 1.0 Purpose and Summary COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive

More information

North Clackamas School District 12

North Clackamas School District 12 North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology

More information

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

CENTRAL CAMBRIA SCHOOL DISTRICT

CENTRAL CAMBRIA SCHOOL DISTRICT No. 815 SECTION: OPERATIONS CENTRAL CAMBRIA SCHOOL DISTRICT TITLE: NETWORK USAGE AND SAFETY ADOPTED: March 2, 2009 REVISED: 815. NETWORK USAGE AND SAFETY ENCOMPASSING LOCAL, INTRANET AND INTERNET NETWORKS

More information

JHSPH Acceptable Use Policy

JHSPH Acceptable Use Policy 1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose

More information

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services Bureau

More information

CODE OF CONDUCT regarding the Data Storage Web Health History ("W.H.H.") Service called Lifepassport provided by Meshpass SA

CODE OF CONDUCT regarding the Data Storage Web Health History (W.H.H.) Service called Lifepassport provided by Meshpass SA CODE OF CONDUCT regarding the Data Storage Web Health History ("W.H.H.") Service called Lifepassport provided by Meshpass SA Updated: 20 Jun 2015 (substitutes previous versions) This Code of Conduct describes

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

CITY OF SALINE CELL PHONE POLICY

CITY OF SALINE CELL PHONE POLICY CITY OF SALINE CELL PHONE POLICY Purpose The City of Saline acknowledges that to provide efficient services to its citizens some of its employees must be available either 24x7 or while they are away from

More information

Policy for the Acceptable Use of Information Technology Resources

Policy for the Acceptable Use of Information Technology Resources Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...

More information

SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081

SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081 SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081 POLICY: COMPUTER/INTERNET ACCEPTABLE USE POLICY AGREEMENT Overview Access to information is fundamental to citizenship and the foundation for further

More information

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007

Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes

More information

Executive Vice President of Finance and

Executive Vice President of Finance and Name of Policy: Policy Number: Electronic mail services policy. 3364-65-01 Approving Officer: Administration Executive Vice President of Finance and Responsible Agent: Vice President of Information Technology

More information

BRIGHAM AND WOMEN S HOSPITAL

BRIGHAM AND WOMEN S HOSPITAL BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information