Sample Policies for Internet Use, and Computer Screensavers
|
|
|
- Brittany Lee
- 10 years ago
- Views:
Transcription
1 Sample Policies for Internet Use, and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies that address employee use of the Internet and . Less frequently mentioned is the importance of protecting data and information on computers through screensavers with password security. In a city, the mayor issues policies for the executive branch of government. In a town, the board of selectmen is the chief policy making body. There will be instances when other municipal boards or individuals will originate a draft or recommend a permanent policy, but final adoption typically requires the approval of the mayor or selectmen. A standard format for all local policies should be developed. As a rule, a section should be devoted to specifying who the policy applies to. Then, the rules should be enumerated. Expectations relative to employee behavior should be clear. Actions that are regarded as violations should be listed as well as penalties for non-compliance. The policy should also describe an appeal process for an employee, who is found to violate the policy. By way of example, included below are two policies adopted and implemented by the State Department of Revenue: Electronic Messaging and Internet Acceptable Use Policy Screensaver Standard 1 SAMPLE POLICIES FOR INTERNET USE
2 MASSACHUSETTS Electronic Messaging and Internet Acceptable Use Policy Effective September 16, 2008 Introduction The Massachusetts Department of Revenue (DOR) encourages responsible, effective and lawful use of the Internet and electronic mail ( ) as a means for employees to fulfill their individual job duties and responsibilities. Inappropriate use of your Internet and privileges can result in disciplinary action up to and including termination of your employment with DOR. Purpose In view of the potentially serious consequences that may result from the misuse of the Internet and E- mail at work, DOR has issued this policy to provide you with direction and guidance for the acceptable and responsible use of the Internet and systems. Scope This policy applies to all employees. Employees for the purpose of this policy shall include: all full or part-time employees of DOR or its vendors: contract employees; individual consultants; temporary employees; seasonal employees; volunteers; trainees; student interns; members; directors; officers; partners; agents; and subcontractors. The use of DOR resources implies an understanding of an agreement to this policy. Policy Employees should have no expectation of privacy when using the Internet and Exchange/Outlook, the messaging system. All Internet and use is continuously monitored to ensure compliance with this policy. The use of DOR resources constitutes express consent for DOR to monitor and/or inspect any data that users create or receive, any messages they send or receive, and any web sites that they access. Employees should not use state provided messaging systems for confidential matters that are not intended for public disclosure. All DOR users are strongly encouraged to use, Secure Mail Gateway, DOR s authorized encrypted secure option when sending messages outside of DOR. DOR provided Internet and messaging systems are state property. Internet and content residing on DOR networks and computer systems and Internet/ content sent to or from DOR networks and computer systems is DOR property. Incidental personal use of DOR Internet and systems, while not encouraged, is permissible at the discretion of divisional management. Personal use must not interfere with an employee s work performance and must not violate the unauthorized use guidelines within this policy. Internet and access is a privilege provided to employees to help them conduct official DOR business and may be revoked at any time. 2 SAMPLE POLICIES FOR INTERNET USE
3 Employees are prohibited from accessing Internet sites or sending any containing material that is sexually explicit, gambling related or that contains defamatory, harassing, threatening or otherwise offensive content. Any employee that is requested by an external vendor/consultant/contractor to participate in a remote control type session with the external vendor/consultant/contractor must contact ISO's User Support line at or x79511 to request the ability to participate. Each request will be reviewed on an individual basis and a determination issued upon review by ISO. Employees must not send, forward, receive or store confidential or sensitive DOR information utilizing non-dor approved mobile devices. Mobile devices include, but are not limited to, Blackberries, Personal Data Assistants (PDA), two-way pagers, cellular telephones or laptops. Employees must not use the Internet or to conduct any personal business activity, such as personal banking, purchasing or selling transactions or solicit for religious, charitable or other causes. Confidential, federal or personally identifiable information must never be transmitted via unless it is sent utilizing DOR s authorized encrypted secure option Secure Mail Gateway, which is a messenger gateway that allows secure transmission of confidential information through E- mail. , including sent utilizing the Secure Mail Gateway, must not contain confidential information in the subject line. Faxes received in an employee s inbox may not be forwarded to non DOR addresses unless they are sent via the secure option. Non-business related sent into DOR via the Internet may be blocked and not delivered to the intended recipient. DOR may block and prevent employee access to any Internet site. Employees utilizing DOR issued devices may only access the Internet through DOR approved firewalls. Under no circumstances may employees use modem, WLAN (Wireless Local Area Network), WWAN (Wireless Wide Area Network), connections to access the Internet, thereby, bypassing DOR s Internet infrastructure. The only exception to this prohibition would be to utilize the Internet for remote access purposes to gain access to DOR s VPN (Virtual Private Network) environment. All Internet pages and content are scanned for viruses and malicious software and any Internet content containing a virus or malicious software will not be allowed into the DOR network. DOR s Global Address List will not be made available for public access. As with any other application, DOR employees are forbidden from sharing their accounts with anyone including but not limited to supervisors, administrators, colleagues, consultants, seasonal staff, etc. 3 SAMPLE POLICIES FOR INTERNET USE
4 Employees are required to notify the Inspectional Services Division upon receipt of any containing sexually explicit material and/or content that is defamatory, harassing, threatening or offensive in nature. Employee Responsibilities Employees must comply with this policy and all standards, guidelines and laws referenced within this policy. Employees must safeguard the confidentiality and integrity of DOR information as part of the ongoing business process and their individual work assignments. Employees are expected to ensure that Internet and content is appropriate for the workplace and must be able to withstand public scrutiny, as any information contained within messages or Internet accesses can be subject to public disclosure. Non-compliance/Unauthorized Use Unauthorized use of Internet and includes, but is not limited to: Accessing personal or non-dor mail servers, including personal accounts, unless granted prior authorization by ISD and ISO. Storing or forwarding DOR information using non-dor mail servers, including personal E- mail accounts, unless granted prior authorization by ISD and ISO. Sending obscene, defamatory, harassing or threatening messages or messages containing sexually explicit material. Sending or posting any material or images that may be offensive or demeaning to any person based upon their race, sex, religion or sexual orientation. Using an unauthorized encryption method or sending unencrypted confidential information, including but not limited to, names, addresses, social security numbers, tax and child support data over the Internet or via . Sending or posting messages with a disguised or false identity. Gaining or attempting to gain unauthorized access to any computer, computer records, data, databases or electronically stored information. Distributing chain letters, conducting illegal activities, or soliciting information for personal gain or profit via the Internet and/or is strictly prohibited. Engaging in public instant messaging and/or accessing bandwidth intensive services (such as RealAudio or Video or MP3). 4 SAMPLE POLICIES FOR INTERNET USE
5 Violating any local, state or federal law. Making or posting indecent remarks and proposals. Uploading or downloading non-dor authorized software. Prior to uploading or downloading any software employees must contact ISO s User Support line at or x75911 for authorization. Depending on the software download request, ISO may require a formal request defining the business need. This request must come from a supervisor and may be reviewed by ISO as well as ISD. Knowingly spreading a computer virus. Penalties Non-compliance or unauthorized use of the Internet and/or may result in the unauthorized disclosure of DOR information, which is a direct violation of federal and state statutes. Under Massachusetts law: The unauthorized disclosure of tax return information is punishable by a fine of up to $1,000 and/or imprisonment for not more than six months and by disqualification from holding office in the Commonwealth for a period not exceeding three years. (M.G.L. c. 62C 21). The unauthorized disclosure of wage reporting information is punishable by a fine of $100 per offense and by administrative discipline. (M.G.L. c. 62E 8). The unauthorized disclosure of child support information is punishable by a fine of up to $1,000 per offense and/or by imprisonment of up to one year and disqualification from holding office in the Commonwealth for a period not exceeding three years. (M.G.L. c. 119A 5A). The unauthorized disclosure of personal information, including any information regarding health insurance is prohibited and may result in damage claims from affected individuals. (M.G.L. c. 66A). DOR is required to notify any individual, as well as the Attorney General and the Director of Consumer Affairs, Information Technology Division (ITD) and Supervisor of Public Records when the individual s personal information has been accessed or used without authorization. (M.G.L. c. 93H). Under federal law: The unauthorized disclosure of federal tax return information and is a felony that may be punished by a fine of up to $5,000 and/or imprisonment for not more than five years. (26 USC 7213). Taxpayers have the right to file a lawsuit against you personally for the unauthorized browsing or disclosure of their federal information. (26 USC 7431). 5 SAMPLE POLICIES FOR INTERNET USE
6 MASSACHUSETTS Screensaver Standard Effective December 3, 2008 Introduction Department of Revenue (DOR) employees must understand the importance of protecting sensitive and confidential data from unauthorized access or acquisition. The information systems used by all DOR employees to carryout day-to-day responsibilities contain very sensitive, confidential information. Employees with direct access to information systems that maintain confidential information such as tax and child support information, as well as those employees that do not have direct access to confidential information, must understand that an unauthorized access to any computer could result in a serious breach of the entire DOR information systems structure. Purpose In an effort to ensure the confidentiality and integrity of DOR information, the Department requires all DOR computers to use a timed screen saver with password security enabled. Scope This standard applies to all employees. Employees for the purpose of this policy shall include: all full or part-time employees of DOR or its vendors: contract employees; individual consultants; temporary employees; seasonal employees; volunteers; trainees; student interns; members; directors; officers; partners; agents; and subcontractors. The use of DOR resources implies an understanding of and agreement to this standard. Standard DOR requires screen saver activation after 10 minutes of user inactivity. Each DOR computer is configured for automatic screen saver activation for the maximum time limit of 10 minutes. Employees are not permitted to manage their own time limit. Requests for exceptions to the 10 minute time limit must be submitted to an employee s respective Deputy Commissioner. Any exception to the 10 minute time limit must be approved by the Senior Deputy Commissioner and will be considered only for legitimate business reasons and for a specified period of time. Employee Responsibilities Employees must comply with this standard and all policies referenced within this standard. Employees must activate the screen saver when stepping away or leaving their workstation. The screensaver may be activated by using Ctrl, Alt, & Delete and selecting Lock Workstation or by selecting the Screensaver Shortcut button on the Windows Taskbar. Employees must be aware of other individuals in and around your work station when looking at or discussing confidential information. Employees must abide by the Department s Password Policy. Resources and Contact Information 6 SAMPLE POLICIES FOR INTERNET USE
7 Technical problems with the screen saver functionality should be reported to the ISO Help Desk at Questions regarding the Screensaver Standard should be directed to the Inspectional Services Division at Compliance Unauthorized use and/or access of DOR computers may result in the unauthorized disclosure of DOR information, which is a direct violation of federal and state statutes. Under Massachusetts law The unauthorized disclosure of tax return information is punishable by a fine of up to $1,000 and/or imprisonment for not more than six months and by disqualification from holding office in the Commonwealth for a period not exceeding three years. (M.G.L. c. 62C 21). The unauthorized disclosure of wage reporting information is punishable by a fine of $100 per offense and by administrative discipline. (M.G.L. c. 62E 8). The unauthorized disclosure of child support information is punishable by a fine of up to $1,000 per offense and/or by imprisonment of up to one year and disqualification from holding office in the Commonwealth for a period not exceeding three years. (M.G.L. c. 119A 5A). The unauthorized disclosure of personal information, including any information regarding health insurance is prohibited and may result in damage claims from affected individuals. (M.G.L. c. 66A). DOR is required to notify any individual, as well as the Attorney General and the Director of Consumer Affairs, Information Technology Division (ITD) and Supervisor of Public Records when the individual s personal information has been accessed or used without authorization. (M.G.L. c. 93H). Under federal law The unauthorized disclosure of federal tax return information is a felony that may be punished by a fine of up to $5,000 and/or imprisonment for not more than five years. (26 USC 7213). Taxpayers have the right to file lawsuits against you personally for unauthorized browsing or disclosure of their federal tax information. (26 USC 7431). 7 SAMPLE POLICIES FOR INTERNET USE
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
INTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to interconnected computer systems within the district
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to the Internet, and a Bring
City of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT
Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT I. Purpose This directive provides Department of Homeland
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Organizational Policy
Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
U.S. Chemical Safety and Hazard Investigation Board
BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1
Computer, Network, and Internet Use Student Policy (As of 8/1/09)
Computer, Network, and Internet Use Student Policy (As of 8/1/09) I. Overview a. Purpose The intent of this regulation is to provide students with general requirements for utilizing Buffalo Valley Public
Commonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
COMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN
LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN TITLE: NUMBER: BUL - 999.8 ISSUER: Acceptable Use Policy (AUP) For District Computer and Network Systems Ronald S. Chandler, Chief Information Officer
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
Internet & Cell Phone Usage Policy
Internet & Cell Phone Usage Policy The Internet usage Policy applies to all Internet & Cell phone users (individuals working for the company, including permanent full-time and part-time employees, contract
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
JHSPH Acceptable Use Policy
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Marion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE
Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
POLICIES AND REGULATIONS Policy #78
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
Lisbon School District 15 Newent Road Lisbon, CT 06351
Pur pose The purpose of this policy is to establish direction, procedures, requirements, and responsibilities to ensure the appropriate protection of the Lisbon Public Schools computer and telecommunication
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
