NHS HIGHLAND AND INTERNET POLICY

Size: px
Start display at page:

Download "NHS HIGHLAND EMAIL AND INTERNET POLICY"

Transcription

1 NHS HIGHLAND AND INTERNET POLICY ehealth Department Policy Reference: Date of Issue: August 2007 Prepared by: A Fraser Date of Review: August 2009 Lead Reviewer: Version: 2 Area Information Security Manager Authorised by: Date: February 2005 ehealth Steering Group Distribution All staff Method CD Rom Paper Intranet

2 and Internet Policy Introduction 1. This Policy contains important rules covering and access to the Internet. Many of the rules apply equally to NHS Highland s other methods of external communications such as letter, fax and telephone. 2 This Policy explains how and Internet access should be used. It explains what you are allowed to do and what you are not allowed to do. 3 The Policy starts with some general rules covering dos and don ts. Six areas have been identified where legal problems might arise for you and for NHS Highland. These areas are: harassment, defamation, copyright, entering contracts, pornography, and confidential and personal information. Under each section there is an explanation of the potential legal problems and some rules to help avoid those problems. 4. Failure to comply with the rules set out in this Policy: a) may result in legal claims against you and NHS Highland; and b) may lead to disciplinary action being taken against you, including dismissal. 5. When sending external s the system automatically includes the following disclosure statement: This and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this in error please notify the system manager. This footnote also confirms that this message has been swept by.. for the presence of computer viruses. 6. It is very important that you read this Policy/Code of Conduct carefully. If there is anything you don t understand, it is your responsibility to ask your line manager/supervisor or contact the NHS Highland Helpdesk who will log a call and pass it to an appropriate person for advice. Page: 2 Date of review: August 2009

3 General Rules: Must, Must Not, Should and General Advice General Advice The NHS Highland system is primarily for business use. Occasional and reasonable personal use is permitted in your own time and provided that this does not interfere with the performance of your duties/other staff s business requirements or have an impact on the performance of the network. may be received by individuals or organisations which are not intended recipients. No use or reliance on the contents of the should be made by any party who is not an intended recipient. All is stored and the organisation may audit (including personal ) without notice. Use of is subject to monitoring for security and/or network management issues. Staff should be aware that they neither own the documents that they or their colleagues create, nor have intellectual property rights thereto. Ask yourself before sending an , how would you feel if your message was read out in court. messages may have to be disclosed in litigation. attachments to a large number of staff can cause problems on the NHS Highland network. The correct method of dealing with this type of communication is to publish the document on the Intranet and all recipients with the relevant link to the file. Should you have any problems accessing this link you should contact Helpdesk. MUST Must keep all passwords secure - do not share with anyone. MUST NOT Must not impersonate any other person when using or amend messages received. Must not leave your PC logged on and unattended if you have access. If anyone uses the PC while logged on it will appear that the actions were carried out by you and you will be held accountable for any misdemeanour that they may commit. Must not create congestion by sending trivial messages or personal messages or by copying s to those who do not need to see them. Chain Mail, if received, should be deleted. Page: 3 Date of review: August 2009

4 MUST NOT Must not send any sensitive information, whether business, staff or patient data, to or from a non-nhs account. A non-nhs account is defined as an address that does not end with either nhs.net or nhs.uk. The exception to this is that s can be securely exchanged between accounts that end with nhs.net or nhs.uk and those which end in gsx.gov.uk or gsi.gov.uk. SHOULD Should report any received by you which is regarded as illegal or offensive to your manager, the NHS Helpdesk and the Human Resources Department. It should not be forwarded onto anyone else. Should obtain confirmation of receipt for important s sent. Should make and keep hard copies of important s sent and received. Should reply promptly to all messages requiring a reply. Where a prompt detailed response is not possible, send a short acknowledging receipt and giving an estimate of when a detailed response will/should be sent. Should enable the Out of Office facility if you are to be away for more than one day. Page: 4 Date of review: August 2009

5 INTERNET General Advice All Internet sites accessed are stored and monitored and the organisation audits this activity routinely. Use of Internet is subject to monitoring for security and/or network management issues. Access to certain websites is prevented as they are deemed to be inappropriate for business use. The following are examples of the categories which are blocked: Adult/Sexually Specific Gambling Criminal Skills Hate Speech Violence Weapons Glamour & Intimate Apparel Remote Proxies Drugs, Alcohol & Tobacco Hacking Don ts Do not access the Internet (World Wide Web) during working hours for purposes other than those for which you were employed. Outside working hours the web may be accessed for personal purposes but this must be within the requirements and constraints of this policy document. In particular personal use of NHS Highland s Internet facilities must not interfere with the performance of your duties/other staff s business requirements or have an impact on the performance of the network. If you access the Internet remotely, you should not use the Internet for personal purposes without the permission of your Head of Department as this may incur costs. Do not deliberately visit, view or download any material from any web site containing sexual or illegal material or material which is offensive in any way Do not download software onto Trust systems. This includes software and shareware available for free on the Internet. Do not divulge your password to anyone. Do not leave your PC logged on and unattended if you have Internet access. If anyone uses the PC while logged on it will appear that the actions were carried out by you and you will be held accountable for any misdemeanour that they may commit. To log off the Internet you must close down Internet Explorer. Page: 5 Date of review: August 2009

6 USE OF NEW NHS SYSTEM All use of the NHSmail system must be in accordance with this policy and the National Acceptable Use Policy which you agreed to when registering for an NHSmail account. Access to NHSmail services from Non-NHS Highland sites must be in accordance with the relevant policies eg Working From/At home Policy Home Computer policy Mobile Devices Policy Removable Media Policy NHS Scotland Acceptable Use Policy The following sections discuss the legal obligations of NHSiS organisations and their staff, this includes NHS Highland. Note that the sections are not meant to be either exhaustive or definitive and there may be other legislation in addition to that discussed below. Page: 6 Date of review: August 2009

7 Harassment What is harassment? The Institute of Personnel and Development define harassment as, unwanted behaviour, which a person finds intimidating, upsetting, embarrassing, humiliating or offensive. It can take many forms and may be directed at one person or a group of people. The intention of the perpetrator is irrelevant: it is the impact on the individual, which determines whether harassment has taken place. (Ref PIN Guidelines - Dignity at Work 2.2.1) What you must not do You should not download from the Internet or include in your s any material which contains text and/or images which can be construed as causing fear, stress or anxiety to any individual or group of individuals in the organisation. What are the consequences of not following this Policy? Unless the organisation can show that it has taken action necessary to discourage harassment, it can be held liable for the conduct of its staff and may be subject to court action leading to a substantial penalty. Individuals responsible for harassment may be subjected to appropriate disciplinary action. Further detail can be found in the PIN Guideline - Dignity at Work. Page: 7 Date of review: August 2009

8 Defamation What is defamation? Any false or malicious representation, written, printed or spoken, which hurts the reputation of a person; exposes that person to hatred, ridicule or contempt; injures that person in his or her occupation; or damages the organisation he or she works for eg financially, reputation. What you must not do As a general rule you must not include in s any statement about a person or organisation which is untrue ie cannot be proved. There are, however, certain defences to allegations of defamation. One such defence is that of qualified privilege. This applies to certain situations such as where, in the discharge of a duty, a statement would be protected if honestly made by a person in the discharge of a public or private duty of some kind or in his own affairs in a matter where his interest is concerned. In such a situation a person against whom an allegation of defamation has been made will have a defence unless it can be shown that the statement was motivated by express or actual malice. There are however some circumstances in which even if a statement is true if a person is maliciously abused or held up to public ridicule or contempt causing him loss or hurt to his feelings damages may be recoverable. What are the consequences of not following this Policy? Under the law of defamation you and/or NHS Highland could be taken to court and sued by the subject of the defamatory statement. Page: 8 Date of review: August 2009

9 Copyright What is copyright? A number of laws relating to publication are pertinent to the provision of information via the Internet. These include the Copyright, Designs and Patents Act 1988 which protects the intellectual property of individuals. In general, this Act requires that the permission of the owner of the intellectual property must be sought before any use is made of it whatsoever. This includes storage and display on a website or other electronic information service. The law of copyright still has to be clarified in relation to use of the Internet. Given the nature of the Internet, it seems highly probable that a person who puts material on a website is consenting to its being accessed by users of the system thereby nullifying the infringement by reproduction which would otherwise arise under UK law. If, however, the website contains a notice expressly prohibiting copying, contravention of the notice may constitute a copyright infringement. Copyright is infringed by any person who copies, or who authorises for copy, copyrighted material without the owner s consent. What you must not do Unless you have requested and received formal approval from the owner, you must not attempt to copy, print or download any material from the Internet where there is an explicit notification that the material is protected by copyright. What are the consequences of not following this Policy/Code of conduct? The penalty on summary conviction under the Law is a maximum of six months imprisonment and/or a fine not exceeding 5,000. The penalty on conviction on indictment is a fine or imprisonment for a term not exceeding two years or both. Page: 9 Date of review: August 2009

10 Entering Contracts What is a contract? A contract is a legally enforceable agreement in which two or more people or organisations commit to certain obligations in return for certain rights. Contracts may consist of no more than a single page, an exchange of faxes or even an oral agreement. The words contract and agreement have the same meaning and tend to be used interchangeably. The most important element required for a valid contract is the need for agreement to have been reached on all the essential conditions of the contract. With the exception of certain types of contract which have to be in a certain form, agreements are usually valid as long as the essential elements for creating a contract are met. Rules for contracting by The contract must be agreed to by someone in the organisation who is lawfully capable of agreeing to contracts (sometimes called the capacity to contract ). An exchange of faxes or will normally be valid provided there is agreement on the essential conditions, and intention and authority to create a contract. There could, however, be difficulties in proving the terms of an agreement. Where a contract is of any significance it is wise to back up electronic exchanges (eg fax, ) with a formal agreement or letter. What are the consequences of not following this Policy/Code of Conduct? If as an employee of NHS Highland you enter into a contract you must have the correct authority to do so. Where no such authority exists the contract may be invalid or you as the individual may be held personally liable for that contract. Should NHS Highland appear to have given an individual the authority to enter into a contract it may find itself bound into that contract. It is therefore essential that NHS Highland has control and supervision of staff with access to . Users of need to be aware that exchange of s may be interpreted by suppliers as a contract. users must therefore ensure that the wording and content of their does not mislead the supplier. Page: 10 Date of review: August 2009

11 Pornography What is pornography? Pornography relates to the use of sexually explicit material ie in writings, films or images. Laws on pornography are embodied in the following legislation: The Protection of Children Act 1978, Criminal Justice Act 1988 and Obscene Publications Act 1959 and 1964 have either limited application or do not extend to Scotland. Relevant legislation in Scotland is embodied in the Civic Government (Scotland) Act 1982, Sections 51 and 52. Section 52 of the 1982 Act relates to indecent photographs of children. Photograph is said to include: Data stored on a computer disk, or by electronic means which is capable of conversion into a photograph. Under Section 52, a person commits an offence if he or she: distributes or shows an indecent photograph or pseudo-photograph; has in his/her possession such an indecent photograph or pseudophotograph with a view to its being distributed or shown by him/her or others. A person is said to be regarded as distributing an indecent photograph or pseudophotograph if he/she parts with possession of it to, or exposes or offers it for acquisition by, another person. A defence to the above is provided by stating: Where a person is charged with an offence under sub section (1)(b) or (c) above, it shall be a defence for him/her to prove - that he/she had a legitimate reason for distributing or showing the photograph or pseudo-photograph or (as the case may be) having it in his/her possession; or that he/she had not him/herself seen the photograph or pseudophotograph and did not know, nor had any reason to suspect, it to be indecent. The Telecommunications Act 1984 provides that it is an offence to send by means of a public telecommunications system, a message or other matter that is grossly offensive or of an indecent, obscene or menacing character. What you must not do You must not include in any , or download from the Internet, information in the form of text or images which could be regarded as indecent or obscene. You must not ignore any incident where pornographic material is discovered in your organisation. If you or your staff happen upon a website which contains pornographic material or receive an which contains indecent or obscene text, audio or graphic images, the proper reporting procedures should be followed to allow Page: 11 Date of review: August 2009

12 appropriate investigation and resolution to take place. Reporting should initially be to your Head of Department and the Head of Information Services. What are the consequences of not following this Policy/Code of Conduct? Possession/storage and distribution/transmission of child pornography is a criminal offence which carries a prison sentence. Any staff found storing or distributing pornographic material will be subject to disciplinary proceedings and may be dismissed. Page: 12 Date of review: August 2009

13 Confidential /Personal Information What is confidential information? Confidential information includes (a) data relating to identifiable individuals eg patients, staff or practitioners and (b) commercially sensitive data eg financial, contractual. Confidential information can be held on a document, microfiche, CD or other magnetic or optical medium such as disk or tape and can be in hand-written, typewritten or in machine readable form. Individuals may be identified by name, address, postcode, unique reference number eg CHI number. Other, less obvious, data items may also identify individuals eg date of birth, rare diagnosis. The primary legislation relating to confidentiality of information is the Data Protection Act 1998 which deals specifically with the treatment and use of personal data held both in computer and in manual form. Detailed guidance on the Act is to be made available in the NHSiS Data Protection Manual. What you must do and what you must not do All systems containing data from which individuals can be identified should be registered with the Data Protection Registrar/Commissioner. If you are responsible for processing personal information, you must ensure that you are aware of the requirements of the Act(s) and of any additional local confidentiality rules covering disclosure. Any staff who deliberately disclose personal or confidential information to unauthorised individuals or organisations will be subject to disciplinary action. If in doubt, seek advice from your line manager or contact the NHS Highland Helpdesk who will log a call and pass it to an appropriate person for advice. What are the consequences of not following this Policy? Organisations/individuals who contravene the terms of the 1998 Data Protection Act can be prosecuted by the Data Protection Registrar/Commissioner or an offended party. Any staff who knowingly disclose personal or confidential information to unauthorised individuals or organisations will be subject to disciplinary action and my be subject to prosecution that could lead to a fine of up to 5000 and/or up to 6 m onths imprisonment Amendments NHS Highland may amend this Policy at any time. Page: 13 Date of review: August 2009

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

LCC xdsl Usage Policy

LCC xdsl Usage Policy LCC xdsl Usage Policy 1. Introduction For the Internet to operate in a manner that satisfies the majority of its users, all users need to observe some rules and etiquette governing their use of it. These

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

BOBCAT COMPUTING POLICY

BOBCAT COMPUTING POLICY BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained

More information

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either: POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by : GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

Internet, Social Media and Email Policy

Internet, Social Media and Email Policy West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...

More information

Using Public Computer Services in Somerset Libraries

Using Public Computer Services in Somerset Libraries Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Advice leaflet Internet and e-mail policies

Advice leaflet Internet and e-mail policies Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

FMGateway by FMWebschool

FMGateway by FMWebschool FMGateway by FMWebschool Hosting Service Agreement 1. OVERVIEW This Hosting Service Agreement (this Agreement ) is entered into by and between FMWebschool, LLC, a/an Delaware limited liability company

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND

More information

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4 Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User

More information

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois 6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information

COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT

COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT 1. Introduction The Company is committed to maintaining ethical standards in the conduct of its business activities. The Company's reputation as an ethical

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

CHAPTER 124B COMPUTER MISUSE

CHAPTER 124B COMPUTER MISUSE 1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.

More information

COMPUTER USE POLICY. 1.0 Purpose and Summary

COMPUTER USE POLICY. 1.0 Purpose and Summary COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

Acceptable Use Policy - NBN Services

Acceptable Use Policy - NBN Services OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

North Clackamas School District 12

North Clackamas School District 12 North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology

More information

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE TITLE: COMPUTER USE POLICY PAGE 1 OF 5 EFFECTIVE DATE: 07/2001 REVIEW DATES: 02/2003, 09/2006 REVISION DATES: 03/2005, 03/2008 DISTRIBUTION: All Departments PURPOSE APPROVED BY: Signatures on File Chief

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

Internet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014

Internet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014 Internet Acceptable Use Policy A council-wide information management policy Version 1.5 June 2014 Copyright Notification Copyright London Borough of Islington 20134This document is distributed under the

More information

Acceptable Use of Information and Communication Systems Policy

Acceptable Use of Information and Communication Systems Policy Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help

More information

POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES)

POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES) Policy Document POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES) For the definitions of terms used in this policy document refer to the Delegations of

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

Networking and Social Media Policy

Networking and Social Media Policy Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools

More information

Minor, for the purposes of this policy, is an individual who has not attained the age of 17.

Minor, for the purposes of this policy, is an individual who has not attained the age of 17. POLICY TITLE: Computer and Network Services: Acceptable Internet Use Policy POLICY NO: 698 PAGE 1 of 9 GENERAL Internet access is a service provided for students and staff members by this school district.

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.

PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES. Brightcore Consulting Moodle Hosting Service Agreement Last Revised: September 30, 2013 PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.

More information

Terms and conditions of use

Terms and conditions of use Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree

More information

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating

More information

Chicago State University Computer Usage Policy

Chicago State University Computer Usage Policy Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within

More information

TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY. POLICY TITLE: Technology Use Policy

TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY. POLICY TITLE: Technology Use Policy TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY POLICY TITLE: Technology Use Policy The technology resources at Northeast Wisconsin Technical College support the instructional, research and administrative

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT

More information

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance. 1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following

More information

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information. and Communication Systems Policy Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,

More information

DISCIPLINARY PROCEDURE

DISCIPLINARY PROCEDURE DISCIPLINARY PROCEDURE 1. Purpose and Scope 1.1 The Company s procedure is designed to help and encourage all workers to achieve and maintain standards of conduct, attendance and job performance. The Company

More information

ST MARY S COLLEGE, AUCKLAND POLICY ON USE OF INFORMATION & COMMUNICATION TECHNOLOGY (ICT)

ST MARY S COLLEGE, AUCKLAND POLICY ON USE OF INFORMATION & COMMUNICATION TECHNOLOGY (ICT) ST MARY S COLLEGE, AUCKLAND POLICY ON USE OF INFORMATION & COMMUNICATION TECHNOLOGY (ICT) Rationale: 1. As information that can be accessed on the ICTs is uncensored, this policy will ensure that material

More information

ContentPros LLC Web Site and Email Hosting Service Agreement

ContentPros LLC Web Site and Email Hosting Service Agreement ContentPros LLC Web Site and Email Hosting Service Agreement This Web Site and Email Hosting Service Agreement ("Agreement") is by and between ContentPros, LLC ("ContentPros "), a/an Colorado Corporation,

More information

Electronic Communications System

Electronic Communications System Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as

More information

E-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy

E-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy E-Safety Policy Reviewed and Adopted: July 2014 Reviewed by: HT/ LTS Next Review: July 2015 Annual Policy 1 1. Introduction Internet is an essential element of life in 21st Century; it is also a part of

More information

Terms and conditions of use

Terms and conditions of use Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

EMPLOYEE COMPUTER USE POLICY

EMPLOYEE COMPUTER USE POLICY EMPLOYEE COMPUTER USE POLICY SECTION ONE PURPOSE A. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, Navigator Pointe Academy makes available

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )

TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide

More information

CODE OF CONDUCT as adopted by the Board of Directors on 20 February 2015

CODE OF CONDUCT as adopted by the Board of Directors on 20 February 2015 GOLDFIELDS MONEY LIMITED ACN 087 651 849 CODE OF CONDUCT as adopted by the Board of Directors on 20 February 2015 1. Purpose This Code of Conduct (Code) clearly states the standards of responsibility and

More information

With the increasing popularity of social media you need a Social Media Policy to protect your company.

With the increasing popularity of social media you need a Social Media Policy to protect your company. Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

any Service that involves gambling, betting, adult, sex or over 18 services or information;

any Service that involves gambling, betting, adult, sex or over 18 services or information; emobile Bulk Text Services Terms and Conditions of Use These terms and conditions apply to the supply of the emobile Bulk Text service (the "Service") and are in addition to and form part of the emobile

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

DIOCESE OF DALLAS. Computer Internet Policy

DIOCESE OF DALLAS. Computer Internet Policy DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used

More information