State of New Jersey IT Circular
|
|
|
- Bernice Parrish
- 10 years ago
- Views:
Transcription
1 NJ Office of Information Technology P.O. Box Jon S. Corzine, Governor 300 Riverview Plaza Adel Ebeid, Chief Technology Officer Trenton, NJ State of New Jersey IT Circular Title: Acceptable Internet Usage NO: NJOIT DATE PUBLISHED: 01/30/09 VERSION: 01/30/09 SUPERSEDES: Policy - 02 EFFECTIVE DATE: Date of Signature FOR INFORMATION CONTACT: Office of Policy and Planning [email protected] ATTN: Directors of Administration and Agency IT Directors I. PURPOSE To establish the overall policy for the use of the State Networks and Internet by State Agency employees and other authorized users. Agencies may supplement this policy as needed or desire, as long as such supplement is consistent with this policy. II. AUTHORITY This policy is established under the authority of State of New Jersey P.L.2007.c.56. The New Jersey Office of Information Technology (NJOIT) reserves the right to change or amend this circular to comply with changes in NJOIT Federal or other agency policies. III. SCOPE This policy applies to all Executive branch agency employees and system users whether authorized or unauthorized who access and use the Internet and encompasses all decisions and activities affecting or affected by access or use of the Internet by agency employees and system users whether authorized or unauthorized. The policies set forth in this document are limited and qualified by the Federal Wire Tap Act, 18 U.S.C et seq, and the New Jersey Wiretap Act, N.J.S.A 2A:156A-1 et seq. By accessing the State s network or Internet system a user agrees to adhere to the State s policies, including agency specific policies, regarding their use. IV. DEFINITIONS As used in this policy, unless the context clearly requires a different meaning, the following words shall have the meaning indicated: "Access" means the ability to receive, use, and manipulate data and operate controls included in information technology NJOIT Acceptable Internet Usage Page 1 of 8
2 "Agency" means any agency, authority, board, department, division, commission, institution, institution of higher education, bureau, or like governmental entity of the executive branch of the state government. A "cache" (pronounced CASH) is a block of memory dedicated for the temporary storage and high-speed retrieval of frequently used or requested data. A "cookie" is a special text file that a web site puts on the user's hard disk so that it can remember something about the user at a later time. Typically, a cookie records the user's preferences when using a particular site. "Information infrastructure" means telecommunications, cable, and computer networks and the Internet, including the World Wide Web, , File Transfer Protocol, Usenet, bulletin board systems, on-line systems, and telephone networks. "Instant messaging" is a type of communications service that enables a user to create a private chat room with another individual. Typically, the instant messaging system alerts a user whenever somebody on the user's private list is online. A user can then initiate a chat session with that particular individual. "Information technology" means all electronic information processing hardware and software, including telecommunications. The "Internet" is a worldwide system of interconnected computer networks in which users at any one computer can obtain and exchange information with any other computer connected to the network. Malicious software is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. Network in information technology, a system that transmits any combination of voice, video and/or data between users. The network includes the network operating system in the client and server machines, the cables connecting them and all supporting hardware in between such as bridges, routers and switches. In wireless systems, antennas and towers are also part of the network. "Path Records" are the combination of history, cache, cookie, header files that record the Internet pages visited. Personal Information is information about a natural person that identifies or describes an individual, including, but not limited to, his or her name, social security number, physical description, home address, home telephone number, education, financial matters, and medical or employment history, readily identifiable to a specific individual. "Sexually explicit content" means content having as a dominant theme (i) any lascivious description of or (ii) any lascivious picture, photograph, drawing, motion picture film, digital image or similar visual representation depicting a lewd exhibition of nudity, sexual excitement, or sexual conduct NJOIT Acceptable Internet Usage Page 2 of 8
3 "State-provided" means access to the Internet via computer system networks owned, leased or operated by the State of New Jersey. Use of these services may be subject to monitoring for security or network management reasons. "Streaming media" is streaming video with sound. With media streaming, a web user does not have to wait to download a large file before seeing the video or hearing the sound. Instead the media is sent in a continuous stream and is played as it arrives. Streaming media requires larger amounts of network resources (bandwidth). "Streaming video" is a sequence of "moving images" that are sent in compressed form over the Internet and displayed by the viewer as they arrive. An example of a streaming video is a stock market ticker. With streaming video, a web user does not have to wait to download a large file before seeing the video. Instead the video is sent in a continuous stream and is played as it arrives. Streaming video requires larger amounts of network resources (bandwidth). "Telecommunications" means the transmission of information, images, pictures, voice or data by radio, video, or other electronic or impulse means. V. POLICY The Internet can provide the State with critical business advantages as a source of research and technical information, improved communication, public access and visibility, business and recruiting contacts and electronic commerce. It is, therefore, in the State of New Jersey's best interest to encourage prudent use of the Internet for State business purposes. The Internet presents employees with opportunities for easy, rapid and efficient global communications and research but also creates certain risks, including security risks and legal liability. In order for the State to maximize the benefits and minimize the risks associated with use of the Internet, this statement sets policy for Internet access and use by all users whether authorized or unauthorized. The only persons who may access the Internet through the State information infrastructure or information technology are State employees and such other persons as the State may specifically authorize. The authorization should be supported by documentation, which could include, but is not limited to, a signed agreement, a memo or a note to file. Employees are given State-provided access to the Internet to assist them in the performance of their jobs. The State may monitor Internet activity and therefore users should have no expectation of privacy. All records created by Internet use, including path records, are property of the State and are subject to monitoring. Users are expected to conduct their electronic communications in a professional, responsible and courteous manner. Misuse of the State's information infrastructure, information technology and electronic communications media, including, but not limited to, the unauthorized transmission of confidential or proprietary information; the use of profane, harassing or other offensive language; or other inappropriate uses, including, but, not limited to, those listed below, may subject the user to discipline, including termination of employment, initiation of civil action, or criminal prosecution. The ability to access the Internet using State-provided software, hardware, information infrastructure, information technology and other facilities is governed by this policy and NJOIT Acceptable Internet Usage Page 3 of 8
4 several existing State policies summarized below. In addition, the following Internet-specific policies must be followed to maintain a secure and hostile free work environment. All users must follow this policy and any additional policy that may be adopted by the State or agency where the user is working. This policy supersedes Statewide IT policy number 02 - Internet Usage. VI. No Privacy Expectations The State reserves the right to access and disclose, for any purpose, the contents of any Internet messages sent to and from or stored on, the State's computer equipment, information infrastructure or information technology including , attachments to , and World Wide Web browsing without prior notice. All users, including State employees, using the Internet waive any right to privacy in such messages, and consent to their being accessed and disclosed by State personnel. Users of the computers and computer network of the State specifically authorize the State to monitor, intercept, read, copy, or capture in any manner any information transmitted or stored using the State s network and Internet access. The State may disclose or use any information monitored, intercepted, read, copied or captured to authorized personnel or law enforcement to be used for disciplinary or civil action or criminal prosecution. Nothing in this policy shall be taken to waive, relinquish or abrogate any privilege or confidentiality recognized by law or to authorize disclosure of any privileged, confidential or proprietary information except as provided by law. VII. State System Security All employees shall ensure that their use of the Internet does not compromise the security and integrity of State's information infrastructure or information technology, networks and computer equipment, whether by allowing intruders into the networks or by introducing viruses or other threats. Employees shall not use another employee's computer to gain access to the Internet without that employee's consent or supervisory approval. An employee shall not permit another person to access the Internet using the employee's computer, except as provided by the agency's policy. An agency may establish a specific policy regarding access to the Internet when necessary to carry out the duties and responsibilities of the agency. VIII. Acceptable Use: Permitted Purposes Employees are given access to the Internet through the State information infrastructure and information technology to carry out State business. All State policies, including but not limited to the State's policy prohibiting discrimination, harassment or hostile environments in the workplace work-place violence and sexual harassment, the Conflict of Interest Law and the Uniform Code of Ethics (as may be supplemented by an agency code approved by the State Ethic Commission, apply to an employee's access or use of State information infrastructure and technology. Users must comply with all state and federal laws and NJOIT Acceptable Internet Usage Page 4 of 8
5 regulations applicable to the Internet. Employees must adhere to any conditions or restrictions on Internet access and use set by an agency. Software for browsing the Internet is provided to users for State related business use only. As with the telephone, limited incidental personal use that does not interfere with work duties, that does not consume significant State resources, that does not constitute a use prohibited by this policy and that does not interfere with the activities of others may be permitted by an agency. Personal use of State equipment shall not amount to more than de minimis, occasional use. More than limited incidental personal use may subject an employee to discipline or removal of Internet access. Incidental personal use of the Internet is subject to monitoring or interception like any other Internet use. Except as otherwise provided by an agency's policy, personal use is permitted only during authorized break times, lunch periods or before or after work hours. No agency is under an obligation to make Internet access available to any employee for personal use. Note: Users employing the State s Network or Internet for personal use must present their communications in such a way as to be clear that the communication is personal and does not represent the Agency or the State. Employees shall not engage in any communications that may harm the image, reputation and/or goodwill of the State and/or any of its employees. IX. Examples of Impermissible Uses The following are examples of impermissible uses of the State information infrastructure or information technology systems. This list is by way of example and is not intended to be exhaustive or exclusive. A user may not: Violate or infringe on a recognized privilege or the right to privacy; Violate agency or departmental regulations or policies prohibiting discrimination, harassment or hostile environments in the workplace; Violate any local, state, or federal law; Conduct personal, for profit business activity; Solicit for religious, political, charitable or other causes; Perform any political campaign activities; Conduct any non-governmental related fund raising or public relations activities; Perform illegal, unethical, or criminal activities; Transmit or download, store, install, or display any kind of image or document on any agency system that violates agency and/or State policies on prohibiting discrimination, harassment or hostile environments in the workplace or workplace violence; Download software in violation of licensing agreements or agency policies; Transmit or post agency information without management approval; NJOIT Acceptable Internet Usage Page 5 of 8
6 Gain or attempt to gain unauthorized access to any computer, computer records, data, databases or electronically stored information; Violate licensing, trademark or copyright laws; Knowingly cause the transmission of a program, information, code or command, and as a result of such conduct, intentionally causes damage to a computer; Gamble or play games on the Internet; Engage in instant messaging, streaming media or streaming video for non-work related purposes; Transmit defamatory, false, inaccurate, abusive, profane, pornographic, threatening, racially offensive, or otherwise biased, discriminatory or illegal material. The use of State equipment or assets by an individual to access, transmit, copy, convey information in violation of an executed agency or department non-disclosure agreement. Except to the extent required in conjunction with a bona fide, agency approved project or assignment or other agency approved undertaking, no user shall utilize State owned or leased information infrastructure or information technology to access, download, print or store any information infrastructure files or services having sexually explicit content. Such agency approvals shall be given in writing by agency heads or their designees. Users shall not use a password or transmit encrypted data through the State Internet system unless they make the password, key or other means of decrypting the transmittal available to their supervisor. X. Monitoring of Site Access and System Use The State reserves the right to monitor and filter site access by users and to review data downloaded from the Internet. The State may also monitor access to the State information infrastructure and information technology system (including successful and failed login attempts and logouts), inbound and outbound file transfers, and sent and received messages. The State may monitor, intercept, read, copy, or capture in any manner any information placed on its computers or computer systems. The State may disclose or use any information monitored, intercepted, read, copied, or captured to authorized personnel or law enforcement in any disciplinary or civil action or criminal prosecution. XI. Software The agency IT Director must approve all software used to access the Internet. XII. Virus Scanning All files downloaded must be scanned for viruses and other malicious software, using virus detection software approved by the agency in consultation with OIT NJOIT Acceptable Internet Usage Page 6 of 8
7 XIII. Representing the State Employees must exercise the same care in posting information to the Internet as they would with any external communication by the agency. XIV. Proprietary and Confidential Information Users shall maintain all proprietary and confidential information in confidence and shall not use the Internet or the State information infrastructure or technology to access, disclose or distribute such information in an unauthorized manner or attempt to do so. XV. Copyright Users should not violate any of the copyright laws when accessing printing or disseminating materials found on the Internet. XVI. Consent Access or use of State-furnished computers or Internet facilities constitutes consent to this policy on Acceptable Use of the Internet. XVII. Technical Users should schedule, wherever possible, communications-intensive operations such as large file transfers, video downloads, mass ings and the like for off-peak times. XVIII. RESPONSIBILITIES Employee Employees shall follow this policy and all agency Internet policies and procedures. Users should report any misuse or policy violations to their supervisor or Agency IT Director. Agency Agencies may develop agency guidelines, procedures, and internal controls for monitoring compliance that are in accordance with this policy. All agencies shall immediately furnish their current employees copies of this notice, and shall furnish all new employees copies of this policy concurrent with authorizing them to use agency computers. Agencies may discipline employees for violations of this policy or any standards or guidelines referenced. Agencies may promote awareness of acceptable use of the Internet by training employees in the use of tools to access the Internet NJOIT Acceptable Internet Usage Page 7 of 8
8 XIX. EXCEPTIONS AND NON-COMPLIANCE Failure to comply with this policy may result in disciplinary action. A compliance exception must be requested if there is an inability to comply with this policy because of a business reason or system constraint. All requests for a compliance exception shall be made to the Statewide Information Security Officer (SISO) in writing. XX. REFERENCES Title 7 of the Civil Rights Act of 1964 as amended Communications Decency Act of 1996 N.J.S.A. 10:5-1 et. seq. N.J.S.A. 11A:1-1 et. seq. N.J.A.C. 4A:7-1.3 Uniform Code of Ethics/New Jersey Conflicts of Interest Law Executive Order 49 (Issued April 17, Governor Whitman) The Computer Fraud and Abuse Act Signature on File 1/30/2009 ADEL EBEID Chief Technology Officer DATE NJOIT Acceptable Internet Usage Page 8 of 8
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
RIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
COMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
INTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
How To Monitor The Internet In Idaho
Idaho Technology Authority (ITA) ENTERPRISE POLICY P1000 GENERAL POLICIES Category: P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING CONTENTS: I. Authority II. Abstract III. Definitions IV. Policy
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Electronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Virginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
City of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
Organizational Policy
Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy
COMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
THE SCHOOL DISTRICT OF PHILADELPHIA
No. 815 SECTION: OPERATIONS THE SCHOOL DISTRICT OF PHILADELPHIA TITLE: ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES ADOPTED: March 15, 2012 REVISED: August 21, 2014 815. ACCEPTABLE USE OF
'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
JHSPH Acceptable Use Policy
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
The responsible use of technology and social media for HCPSS-sanctioned activities.
BOARD OF EDUCATION POLICY 8080 RESPONSIBLE USE OF TECHNOLOGY AND SOCIAL MEDIA Effective: July 1, 2013 I. Policy Statement The Board of Education of Howard County is committed to providing appropriate access
BOARD OF EDUCATION POLICY
BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and
Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources
Boston Public Schools Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and Scope of Policy Technology Resources ACCEPTABLE USE POLICY AND GUIDELINES Boston
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
Chatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320
ACCEPTABLE USE OF VOICE, VIDEO AND DATA NETWORK Policy Code: 3225/7320 Chatham County Schools offers electronic network access for students, teachers, and staff within the school system. A component of
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
WESTERN ASSET MORTGAGE CAPITAL CORPORATION CODE OF CONDUCT
WESTERN ASSET MORTGAGE CAPITAL CORPORATION CODE OF CONDUCT I. Introduction This Code of Conduct (the "Code") sets out basic principles to guide the day-today business activities of directors, officers
Practice Resource. Sample internet and email use policy. Foreword. Policy scope. By David J. Bilinsky 1
Practice Resource Sample internet and email use policy By David J. Bilinsky 1 Foreword Use of email and the Internet can result in a huge productivity increase for a law practice. Through email, lawyers
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
Red Cloud Community Schools Acceptable Use and Internet Safety Policy
Red Cloud Community Schools Acceptable Use and Internet Safety Policy The Red Cloud Community School system maintains quality technology systems (hardware, software, and services) for the purposes of enhancing
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
IT1. Acceptable Use of Information Technology Resources. Policies and Procedures
IT1 Policies and Procedures Acceptable Use of Information Technology Resources Originator: Information Technology Governance Committee Approver: President s Council Effective: October 16, 2007 Replaces:
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
USE OF TECHNOLOGY RESOURCES IN INSTRUCTION
I-6400 2012 Arizona School Boards Association IJNDB USE OF TECHNOLOGY RESOURCES IN INSTRUCTION Appropriate use of Electronic Information Services The District may provide electronic information services
Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Sample Policies for Internet Use, Email and Computer Screensavers
Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies
Computer, Network, and Internet Use Student Policy (As of 8/1/09)
Computer, Network, and Internet Use Student Policy (As of 8/1/09) I. Overview a. Purpose The intent of this regulation is to provide students with general requirements for utilizing Buffalo Valley Public
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT
Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT I. Purpose This directive provides Department of Homeland
