NHS HIGHLAND AND INTERNET POLICY
|
|
- Veronica Elliott
- 8 years ago
- Views:
Transcription
1 NHS HIGHLAND AND INTERNET POLICY ehealth Department Policy Reference: Date of Issue: August 2007 Prepared by: A Fraser Date of Review: August 2009 Lead Reviewer: Version: 2 Area Information Security Manager Authorised by: Date: February 2005 ehealth Steering Group Distribution All staff Method CD Rom Paper Intranet
2 and Internet Policy Introduction 1. This Policy contains important rules covering and access to the Internet. Many of the rules apply equally to NHS Highland s other methods of external communications such as letter, fax and telephone. 2 This Policy explains how and Internet access should be used. It explains what you are allowed to do and what you are not allowed to do. 3 The Policy starts with some general rules covering dos and don ts. Six areas have been identified where legal problems might arise for you and for NHS Highland. These areas are: harassment, defamation, copyright, entering contracts, pornography, and confidential and personal information. Under each section there is an explanation of the potential legal problems and some rules to help avoid those problems. 4. Failure to comply with the rules set out in this Policy: a) may result in legal claims against you and NHS Highland; and b) may lead to disciplinary action being taken against you, including dismissal. 5. When sending external s the system automatically includes the following disclosure statement: This and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this in error please notify the system manager. This footnote also confirms that this message has been swept by.. for the presence of computer viruses. 6. It is very important that you read this Policy/Code of Conduct carefully. If there is anything you don t understand, it is your responsibility to ask your line manager/supervisor or contact the NHS Highland Helpdesk who will log a call and pass it to an appropriate person for advice. Page: 2 Date of review: August 2009
3 General Rules: Must, Must Not, Should and General Advice General Advice The NHS Highland system is primarily for business use. Occasional and reasonable personal use is permitted in your own time and provided that this does not interfere with the performance of your duties/other staff s business requirements or have an impact on the performance of the network. may be received by individuals or organisations which are not intended recipients. No use or reliance on the contents of the should be made by any party who is not an intended recipient. All is stored and the organisation may audit (including personal ) without notice. Use of is subject to monitoring for security and/or network management issues. Staff should be aware that they neither own the documents that they or their colleagues create, nor have intellectual property rights thereto. Ask yourself before sending an , how would you feel if your message was read out in court. messages may have to be disclosed in litigation. attachments to a large number of staff can cause problems on the NHS Highland network. The correct method of dealing with this type of communication is to publish the document on the Intranet and all recipients with the relevant link to the file. Should you have any problems accessing this link you should contact Helpdesk. MUST Must keep all passwords secure - do not share with anyone. MUST NOT Must not impersonate any other person when using or amend messages received. Must not leave your PC logged on and unattended if you have access. If anyone uses the PC while logged on it will appear that the actions were carried out by you and you will be held accountable for any misdemeanour that they may commit. Must not create congestion by sending trivial messages or personal messages or by copying s to those who do not need to see them. Chain Mail, if received, should be deleted. Page: 3 Date of review: August 2009
4 MUST NOT Must not send any sensitive information, whether business, staff or patient data, to or from a non-nhs account. A non-nhs account is defined as an address that does not end with either nhs.net or nhs.uk. The exception to this is that s can be securely exchanged between accounts that end with nhs.net or nhs.uk and those which end in gsx.gov.uk or gsi.gov.uk. SHOULD Should report any received by you which is regarded as illegal or offensive to your manager, the NHS Helpdesk and the Human Resources Department. It should not be forwarded onto anyone else. Should obtain confirmation of receipt for important s sent. Should make and keep hard copies of important s sent and received. Should reply promptly to all messages requiring a reply. Where a prompt detailed response is not possible, send a short acknowledging receipt and giving an estimate of when a detailed response will/should be sent. Should enable the Out of Office facility if you are to be away for more than one day. Page: 4 Date of review: August 2009
5 INTERNET General Advice All Internet sites accessed are stored and monitored and the organisation audits this activity routinely. Use of Internet is subject to monitoring for security and/or network management issues. Access to certain websites is prevented as they are deemed to be inappropriate for business use. The following are examples of the categories which are blocked: Adult/Sexually Specific Gambling Criminal Skills Hate Speech Violence Weapons Glamour & Intimate Apparel Remote Proxies Drugs, Alcohol & Tobacco Hacking Don ts Do not access the Internet (World Wide Web) during working hours for purposes other than those for which you were employed. Outside working hours the web may be accessed for personal purposes but this must be within the requirements and constraints of this policy document. In particular personal use of NHS Highland s Internet facilities must not interfere with the performance of your duties/other staff s business requirements or have an impact on the performance of the network. If you access the Internet remotely, you should not use the Internet for personal purposes without the permission of your Head of Department as this may incur costs. Do not deliberately visit, view or download any material from any web site containing sexual or illegal material or material which is offensive in any way Do not download software onto Trust systems. This includes software and shareware available for free on the Internet. Do not divulge your password to anyone. Do not leave your PC logged on and unattended if you have Internet access. If anyone uses the PC while logged on it will appear that the actions were carried out by you and you will be held accountable for any misdemeanour that they may commit. To log off the Internet you must close down Internet Explorer. Page: 5 Date of review: August 2009
6 USE OF NEW NHS SYSTEM All use of the NHSmail system must be in accordance with this policy and the National Acceptable Use Policy which you agreed to when registering for an NHSmail account. Access to NHSmail services from Non-NHS Highland sites must be in accordance with the relevant policies eg Working From/At home Policy Home Computer policy Mobile Devices Policy Removable Media Policy NHS Scotland Acceptable Use Policy The following sections discuss the legal obligations of NHSiS organisations and their staff, this includes NHS Highland. Note that the sections are not meant to be either exhaustive or definitive and there may be other legislation in addition to that discussed below. Page: 6 Date of review: August 2009
7 Harassment What is harassment? The Institute of Personnel and Development define harassment as, unwanted behaviour, which a person finds intimidating, upsetting, embarrassing, humiliating or offensive. It can take many forms and may be directed at one person or a group of people. The intention of the perpetrator is irrelevant: it is the impact on the individual, which determines whether harassment has taken place. (Ref PIN Guidelines - Dignity at Work 2.2.1) What you must not do You should not download from the Internet or include in your s any material which contains text and/or images which can be construed as causing fear, stress or anxiety to any individual or group of individuals in the organisation. What are the consequences of not following this Policy? Unless the organisation can show that it has taken action necessary to discourage harassment, it can be held liable for the conduct of its staff and may be subject to court action leading to a substantial penalty. Individuals responsible for harassment may be subjected to appropriate disciplinary action. Further detail can be found in the PIN Guideline - Dignity at Work. Page: 7 Date of review: August 2009
8 Defamation What is defamation? Any false or malicious representation, written, printed or spoken, which hurts the reputation of a person; exposes that person to hatred, ridicule or contempt; injures that person in his or her occupation; or damages the organisation he or she works for eg financially, reputation. What you must not do As a general rule you must not include in s any statement about a person or organisation which is untrue ie cannot be proved. There are, however, certain defences to allegations of defamation. One such defence is that of qualified privilege. This applies to certain situations such as where, in the discharge of a duty, a statement would be protected if honestly made by a person in the discharge of a public or private duty of some kind or in his own affairs in a matter where his interest is concerned. In such a situation a person against whom an allegation of defamation has been made will have a defence unless it can be shown that the statement was motivated by express or actual malice. There are however some circumstances in which even if a statement is true if a person is maliciously abused or held up to public ridicule or contempt causing him loss or hurt to his feelings damages may be recoverable. What are the consequences of not following this Policy? Under the law of defamation you and/or NHS Highland could be taken to court and sued by the subject of the defamatory statement. Page: 8 Date of review: August 2009
9 Copyright What is copyright? A number of laws relating to publication are pertinent to the provision of information via the Internet. These include the Copyright, Designs and Patents Act 1988 which protects the intellectual property of individuals. In general, this Act requires that the permission of the owner of the intellectual property must be sought before any use is made of it whatsoever. This includes storage and display on a website or other electronic information service. The law of copyright still has to be clarified in relation to use of the Internet. Given the nature of the Internet, it seems highly probable that a person who puts material on a website is consenting to its being accessed by users of the system thereby nullifying the infringement by reproduction which would otherwise arise under UK law. If, however, the website contains a notice expressly prohibiting copying, contravention of the notice may constitute a copyright infringement. Copyright is infringed by any person who copies, or who authorises for copy, copyrighted material without the owner s consent. What you must not do Unless you have requested and received formal approval from the owner, you must not attempt to copy, print or download any material from the Internet where there is an explicit notification that the material is protected by copyright. What are the consequences of not following this Policy/Code of conduct? The penalty on summary conviction under the Law is a maximum of six months imprisonment and/or a fine not exceeding 5,000. The penalty on conviction on indictment is a fine or imprisonment for a term not exceeding two years or both. Page: 9 Date of review: August 2009
10 Entering Contracts What is a contract? A contract is a legally enforceable agreement in which two or more people or organisations commit to certain obligations in return for certain rights. Contracts may consist of no more than a single page, an exchange of faxes or even an oral agreement. The words contract and agreement have the same meaning and tend to be used interchangeably. The most important element required for a valid contract is the need for agreement to have been reached on all the essential conditions of the contract. With the exception of certain types of contract which have to be in a certain form, agreements are usually valid as long as the essential elements for creating a contract are met. Rules for contracting by The contract must be agreed to by someone in the organisation who is lawfully capable of agreeing to contracts (sometimes called the capacity to contract ). An exchange of faxes or will normally be valid provided there is agreement on the essential conditions, and intention and authority to create a contract. There could, however, be difficulties in proving the terms of an agreement. Where a contract is of any significance it is wise to back up electronic exchanges (eg fax, ) with a formal agreement or letter. What are the consequences of not following this Policy/Code of Conduct? If as an employee of NHS Highland you enter into a contract you must have the correct authority to do so. Where no such authority exists the contract may be invalid or you as the individual may be held personally liable for that contract. Should NHS Highland appear to have given an individual the authority to enter into a contract it may find itself bound into that contract. It is therefore essential that NHS Highland has control and supervision of staff with access to . Users of need to be aware that exchange of s may be interpreted by suppliers as a contract. users must therefore ensure that the wording and content of their does not mislead the supplier. Page: 10 Date of review: August 2009
11 Pornography What is pornography? Pornography relates to the use of sexually explicit material ie in writings, films or images. Laws on pornography are embodied in the following legislation: The Protection of Children Act 1978, Criminal Justice Act 1988 and Obscene Publications Act 1959 and 1964 have either limited application or do not extend to Scotland. Relevant legislation in Scotland is embodied in the Civic Government (Scotland) Act 1982, Sections 51 and 52. Section 52 of the 1982 Act relates to indecent photographs of children. Photograph is said to include: Data stored on a computer disk, or by electronic means which is capable of conversion into a photograph. Under Section 52, a person commits an offence if he or she: distributes or shows an indecent photograph or pseudo-photograph; has in his/her possession such an indecent photograph or pseudophotograph with a view to its being distributed or shown by him/her or others. A person is said to be regarded as distributing an indecent photograph or pseudophotograph if he/she parts with possession of it to, or exposes or offers it for acquisition by, another person. A defence to the above is provided by stating: Where a person is charged with an offence under sub section (1)(b) or (c) above, it shall be a defence for him/her to prove - that he/she had a legitimate reason for distributing or showing the photograph or pseudo-photograph or (as the case may be) having it in his/her possession; or that he/she had not him/herself seen the photograph or pseudophotograph and did not know, nor had any reason to suspect, it to be indecent. The Telecommunications Act 1984 provides that it is an offence to send by means of a public telecommunications system, a message or other matter that is grossly offensive or of an indecent, obscene or menacing character. What you must not do You must not include in any , or download from the Internet, information in the form of text or images which could be regarded as indecent or obscene. You must not ignore any incident where pornographic material is discovered in your organisation. If you or your staff happen upon a website which contains pornographic material or receive an which contains indecent or obscene text, audio or graphic images, the proper reporting procedures should be followed to allow Page: 11 Date of review: August 2009
12 appropriate investigation and resolution to take place. Reporting should initially be to your Head of Department and the Head of Information Services. What are the consequences of not following this Policy/Code of Conduct? Possession/storage and distribution/transmission of child pornography is a criminal offence which carries a prison sentence. Any staff found storing or distributing pornographic material will be subject to disciplinary proceedings and may be dismissed. Page: 12 Date of review: August 2009
13 Confidential /Personal Information What is confidential information? Confidential information includes (a) data relating to identifiable individuals eg patients, staff or practitioners and (b) commercially sensitive data eg financial, contractual. Confidential information can be held on a document, microfiche, CD or other magnetic or optical medium such as disk or tape and can be in hand-written, typewritten or in machine readable form. Individuals may be identified by name, address, postcode, unique reference number eg CHI number. Other, less obvious, data items may also identify individuals eg date of birth, rare diagnosis. The primary legislation relating to confidentiality of information is the Data Protection Act 1998 which deals specifically with the treatment and use of personal data held both in computer and in manual form. Detailed guidance on the Act is to be made available in the NHSiS Data Protection Manual. What you must do and what you must not do All systems containing data from which individuals can be identified should be registered with the Data Protection Registrar/Commissioner. If you are responsible for processing personal information, you must ensure that you are aware of the requirements of the Act(s) and of any additional local confidentiality rules covering disclosure. Any staff who deliberately disclose personal or confidential information to unauthorised individuals or organisations will be subject to disciplinary action. If in doubt, seek advice from your line manager or contact the NHS Highland Helpdesk who will log a call and pass it to an appropriate person for advice. What are the consequences of not following this Policy? Organisations/individuals who contravene the terms of the 1998 Data Protection Act can be prosecuted by the Data Protection Registrar/Commissioner or an offended party. Any staff who knowingly disclose personal or confidential information to unauthorised individuals or organisations will be subject to disciplinary action and my be subject to prosecution that could lead to a fine of up to 5000 and/or up to 6 m onths imprisonment Amendments NHS Highland may amend this Policy at any time. Page: 13 Date of review: August 2009
Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08
Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationUNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationInternet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
More informationInformation Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
More informationThe term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
More informationSt. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
More informationLCC xdsl Usage Policy
LCC xdsl Usage Policy 1. Introduction For the Internet to operate in a manner that satisfies the majority of its users, all users need to observe some rules and etiquette governing their use of it. These
More informationAcceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
More informationEmbedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
More informationConditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
More informationBOBCAT COMPUTING POLICY
BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More informationTONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE
GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving
More informationSTRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
More informationThe Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
More informationICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
More informationDCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
More information2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:
POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,
More informationLINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
More informationInformation Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
More informationInformation Systems Acceptable Use Policy for Learners
Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs
More informationAcceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
More informationAngard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
More informationDundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
More informationCity of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
More informationGENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation
More informationPolicy No: 2-B8. Originally Released: 2001. Date for Review: 2016
Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for
More informationInternet, Social Media and Email Policy
West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...
More informationUsing Public Computer Services in Somerset Libraries
Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which
More informationEmail Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
More informationAdvice leaflet Internet and e-mail policies
Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.
More informationTerms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
More informationFMGateway by FMWebschool
FMGateway by FMWebschool Hosting Service Agreement 1. OVERVIEW This Hosting Service Agreement (this Agreement ) is entered into by and between FMWebschool, LLC, a/an Delaware limited liability company
More informationHuman Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationAcceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
More informationGuidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4
Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User
More informationRICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
More informationInternet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
More informationCOLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT
COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT 1. Introduction The Company is committed to maintaining ethical standards in the conduct of its business activities. The Company's reputation as an ethical
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationResponsible Use of Technology and Information Resources
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
More informationInformation Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
More informationCHAPTER 124B COMPUTER MISUSE
1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.
More informationCOMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
More informationDene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
More informationWORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
More informationAcceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
More informationMEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
More informationNorth Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
More informationAPPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE
TITLE: COMPUTER USE POLICY PAGE 1 OF 5 EFFECTIVE DATE: 07/2001 REVIEW DATES: 02/2003, 09/2006 REVISION DATES: 03/2005, 03/2008 DISTRIBUTION: All Departments PURPOSE APPROVED BY: Signatures on File Chief
More informationAcceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
More informationInternet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014
Internet Acceptable Use Policy A council-wide information management policy Version 1.5 June 2014 Copyright Notification Copyright London Borough of Islington 20134This document is distributed under the
More informationAcceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
More informationPOLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES)
Policy Document POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES) For the definitions of terms used in this policy document refer to the Delegations of
More informationTechnology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
More informationComputer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
More informationInformation & Communications Technology Usage Policy Olive AP Academy - Thurrock
Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures
More informationEmail & Internet Policy
Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible
More informationNetworking and Social Media Policy
Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools
More informationMinor, for the purposes of this policy, is an individual who has not attained the age of 17.
POLICY TITLE: Computer and Network Services: Acceptable Internet Use Policy POLICY NO: 698 PAGE 1 of 9 GENERAL Internet access is a service provided for students and staff members by this school district.
More informationINTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
More informationRecommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
More informationICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
More informationCOMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
More informationPLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.
Brightcore Consulting Moodle Hosting Service Agreement Last Revised: September 30, 2013 PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.
More informationTerms and conditions of use
Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree
More informationTerms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website
Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating
More informationChicago State University Computer Usage Policy
Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services
More informationAcceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
More informationWELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY
WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within
More informationTYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY. POLICY TITLE: Technology Use Policy
TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY POLICY TITLE: Technology Use Policy The technology resources at Northeast Wisconsin Technical College support the instructional, research and administrative
More informationAcceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
More informationELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
More informationThe City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
More informationAcceptable Use of Information. and Communication Systems Policy
Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,
More informationDISCIPLINARY PROCEDURE
DISCIPLINARY PROCEDURE 1. Purpose and Scope 1.1 The Company s procedure is designed to help and encourage all workers to achieve and maintain standards of conduct, attendance and job performance. The Company
More informationST MARY S COLLEGE, AUCKLAND POLICY ON USE OF INFORMATION & COMMUNICATION TECHNOLOGY (ICT)
ST MARY S COLLEGE, AUCKLAND POLICY ON USE OF INFORMATION & COMMUNICATION TECHNOLOGY (ICT) Rationale: 1. As information that can be accessed on the ICTs is uncensored, this policy will ensure that material
More informationContentPros LLC Web Site and Email Hosting Service Agreement
ContentPros LLC Web Site and Email Hosting Service Agreement This Web Site and Email Hosting Service Agreement ("Agreement") is by and between ContentPros, LLC ("ContentPros "), a/an Colorado Corporation,
More informationElectronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
More informationE-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy
E-Safety Policy Reviewed and Adopted: July 2014 Reviewed by: HT/ LTS Next Review: July 2015 Annual Policy 1 1. Introduction Internet is an essential element of life in 21st Century; it is also a part of
More informationTerms and conditions of use
Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree
More informationITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
More informationEMPLOYEE COMPUTER USE POLICY
EMPLOYEE COMPUTER USE POLICY SECTION ONE PURPOSE A. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, Navigator Pointe Academy makes available
More informationEmail Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:
Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury
More informationAcceptable Usage Policy
Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY
More informationData Protection Division Guidance Note Number 10/08
Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008
More informationAcceptable Use Policy
Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)
More informationAcceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
More informationTERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )
TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide
More informationCODE OF CONDUCT as adopted by the Board of Directors on 20 February 2015
GOLDFIELDS MONEY LIMITED ACN 087 651 849 CODE OF CONDUCT as adopted by the Board of Directors on 20 February 2015 1. Purpose This Code of Conduct (Code) clearly states the standards of responsibility and
More informationWith the increasing popularity of social media you need a Social Media Policy to protect your company.
Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not
More informationAcceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationany Service that involves gambling, betting, adult, sex or over 18 services or information;
emobile Bulk Text Services Terms and Conditions of Use These terms and conditions apply to the supply of the emobile Bulk Text service (the "Service") and are in addition to and form part of the emobile
More informationATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
More informationDIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
More information