Policy For Staff and Students
|
|
|
- Mildred Goodman
- 10 years ago
- Views:
Transcription
1 Policy For Staff and Students Document Version Date Policy Owner Approval Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management Committee May 2012 Update approval section
2 CONTENTS PAGE 1. INTRODUCTION PURPOSE.3 3. SCOPE AUTHORIZED USERS STANDARDS OF ACCEPTABLE USE RESPONSIBILITIES OF USERS OFFICIAL CORRESPONDENCES WITH STUDENTS QUOTA & LIMITS USEFUL PRACTICES AND HELPDESK SUPPORT ENFORCEMENT..8 ITS policy document Page 2
3 ITS policy document Page 3
4 1.0 INTRODUCTION This Policy is developed in response to the need for guidelines describing the acceptable use of services. It applies to IMU Education Sdn Bhd ( IMU ), which includes International Medical University ( the University ). The Policy will be reviewed on a periodic basis and if necessary, updates will be made to reflect changes to the services and technology standards. 2.0 PURPOSE The Policy provides guidance on acceptable use of , for the purpose of sending or receiving messages and attachments. It describes the standards that users are expected to observe when using these facilities for , and ensures that users are aware of the legal consequences attached to inappropriate use of the facilities. 3.0 SCOPE This policy applies to all members of the faculty, staff and authorized users entitled to facilities provided by IMU. It also applies to students using the Microsoft Outlook Office 365 registered under the University s domain name, and provided by Microsoft. 4.0 AUTHORISED USERS IMU owns the accounts and data transmitted or stored using IMU facilities, subject to underlying copyright and other intellectual property rights under applicable laws. Any use of IMU facilities in an unacceptable and inappropriate manner may be treated as a disciplinary offence or a matter of legal action depending on the seriousness of the offence. Faculty and Staff services are available for faculty and staff to conduct and communicate University business. Contract workers, part-timers and/or guest visitors may be provided with facilities, as approved by the Dean/ Corporate Head of Department. Incidental personal use of is allowed with the understanding that the primary use should be job-related, and that occasional use does not adversely impact work responsibilities or the performance of the network. When a faculty or staff member leaves IMU by retirement, resignation or termination, the account and contents of the mailbox will no longer be accessible to the person. The account holder is expected to clear all personal correspondence before leaving. If required, ITS policy document Page 4
5 the account holder s supervisor will be given access to the account, up to a period of 3 months, and will notify Information Technology Services as to when the account can be terminated. Students and alumni services are available for students and alumni members to support learning and for communication between IMU and themselves. During the orientation week, the Information Technology Services department will assign every student with a unique account on Microsoft Outlook Office 365, e.g. [email protected]. Students will access the system by logging in to via any popular web browsers for Windows, Mac or Linus operating system. 5.0 STANDARDS OF ACCEPTABLE USE The main purpose for the provision of facility is for the use in connection with teaching, learning, research and business activities of IMU. The use of IMU address, mailbox and facilities must be lawful and professional at all times. If users are in any doubt about what constitutes acceptable and appropriate use of facilities, they should seek the advice and guidance from the Information Technology Services department. 5.1 Unlawful use of facilities Unlawful use of IMU address, mailbox and systems may lead to criminal or civil legal action being taken against the individual users. Where there is evidence of a criminal offence, the issue will be reported to the police for them to take appropriate action. IMU will co-operate with the police and other appropriate external agencies in the investigation of alleged offences. Unacceptable uses of the facilities include, but are not limited to, the following: 1. transmission of materials that infringes on the copyright laws, including intellectual property rights 2. using the facilities for any purpose that violates federal or state laws 3. using the facilities for conducting personal business 4. sending / forwarding s that are libelous, abusive, defamatory, derogatory, threatening, offensive or contains obscene or indecent materials 5. unauthorized transmission of confidential material concerning the activities of IMU 6. creation or transmission of anonymous messages or using someone else s identity/password 7. creation or transmission of material which is designed or likely to cause annoyance, harassment, inconvenience or needless anxiety to the recipients ITS policy document Page 5
6 8. provide unauthorized use of IMU facilities to 3 rd party 9. transmission of unsolicited commercial or advertising material, chain letters, spam mail or other junk-mail of any kind 10. activities that can corrupt other users information or cause network interruptions, such as unauthorized broadcasting or mass mailings 5.2 Preventing the Spread of Malicious Software (Viruses) Users of IMU IT facilities must take all reasonable steps to prevent the receipt and transmission by of malicious software e.g. computer viruses. In particular, users must not transmit any file attachments which they know to be infected with a virus must ensure that an effective anti-virus system is operating on any computer which they use to access University IT facilities must not open file attachments from unsolicited or untrusted sources 5.3 Spam mail A SpamTitan Anti- Spam software has been installed on IMU gateway server to protect the system from Spam mail. Spam can be defined as "the mass electronic distribution of unsolicited to individual accounts". All incoming s will be checked by the Spam Titan system and any suspected spam mail will be moved to the Spam Titan server and a notification sent to the recipient user. The user has the option to review/download the and must be responsible to blacklist the sender if it is a spam mail. 5.4 Mass mailings Mass electronic mailings are permitted only for official communication to IMU staff, faculty and students by the appropriate offices such as Chancellery, Corporate Communication, Faculty and corporate departments. Other than the above, users may not send mass s without prior approval from Provost (or designee) for distribution to staff and/or students. 6.0 RESPONSIBILITIES OF USERS All users must familiarize themselves with the contents of this Policy. Failure to comply with the policy may lead to serious consequences, which include IMU taking necessary disciplinary action and/or legal action depending on the seriousness of the matter. ITS policy document Page 6
7 Every faculty member, staff member and students will be provided with IMU official address. This will be the formal address for all communication between students and IMU and among the members of IMU. The format for this official address is as follows: For staff & faculty (IMU Exchange Outlook) For students (Microsoft Office 365) : <username>@imu.edu.my : <studentname>@student.imu.edu.my 6.1 Individual users are expected to assume full responsibility and accountability for their actions and mailbox when using IMU facilities. The use of facilities by individuals at IMU assumes and implies compliance with this policy, without exception, and every user of system has a duty to ensure they practice appropriate and proper use and must understand their responsibilities in this regard. 6.2 Senior management of IMU will be responsible for ensuring heads of Faculties, Departments and Business Units are aware of this policy; and they in turn will be responsible for informing their people of this policy. 6.3 The Information Technology Services department is responsible for providing and maintaining central systems. The server will be back-up as per standard backup and recovery procedures. Should there be any database corruption due to failure of the system, the Information Technology Services department will recover the data loss to the best of their ability. 7.0 OFFICIAL CORRESPONDENCE WITH STUDENTS All official communication between students and the University will be via the official address as stated in section 6.0. Students are expected to check on a frequent and regular basis in order to stay current with University-related communications, recognizing that certain communications may be time-critical. It is recommended for to be checked daily, but at a minimum, twice per week. Regular management will also minimize the risk that the inbox will be full, causing the to be returned to the sender with an error. Undeliverable messages returned because of either a full inbox or use of a "spam" filter will be considered delivered without further action required of the University. It is the responsibility of every student to keep the University informed of changes in his or her official address. Consequently, returned to the University with "User Unknown" is not an acceptable excuse for missed communication. 8.0 QUOTA & LIMITS ITS policy document Page 7
8 8.1 The mailbox storage capacity is determined by IMU. Users may apply for additional storage space with a written recommendation from the Executive Dean/ Head of Department, stating the purpose and reason to justify the additional storage space request. The standard allowable storage limits are set as follows: For staff & faculty For students (under Microsoft Office 365) : 1GB : 25GB Once the quota has been reached, no further can be delivered to an individual's inbox until he has have reduced his storage to below the limit. Users will receive an notification when they are approaching their quota limit. It is the responsibility of the users to clear/maintain their mailbox according to the limit provided. 8.2 The maximum size of an that can be transmitted or received via IMU account is <25MB. Any exceeding this limit will not be accepted by IMU s server. However, whether an sent to external party is received by them will depend on the file-size limit set by the external party s servers. 8.3 All messages on IMU Exchange Outlook system, which is more than 90-days old, will be auto-archived to the Archive folder and removed from the Active folders. This auto-archive function assists users in managing their allowable storage capacity. The Archive folder is still accessible via the Outlook system but the physical data file is moved to the user s computer on C:\Documents\Outlook Files\ <archive filename>. It is the responsibility of IMU staff to back-up the file to external drive. Please contact Information Technology Services should you have require further information on the archiving procedures. 9.0 USEFUL PRACTICES AND HELPDESK SUPPORT 9.1 IMU considers as an important means of communication among its community and as well as to external parties. Below are some useful practices on usage : Do not send large files attachments. If possible, send a link to the content page or compress attachments larger than 200K before sending them. Read all messages regularly and delete unwanted messages to maintain adequate storage in your mailbox. Download and save important messages and/or associated attachments into network drives or your computer. Activate the Auto-Reply function when you are away from office for a period of time. Do not send a REPLY ALL if you only need to respond to the sender and/or selected persons. Be responsible and courteous in your correspondence as the message can easily be forwarded beyond the initial circle of recipients. 9.2 Disclaimer ITS policy document Page 8
9 An disclaimer is added to outgoing and forms a distinct section which is separate from the main message. For all outgoing from IMU server, the following disclaimer is as attached: "The information transmitted is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon this information by persons or entities other than the intended recipient is prohibited. If you have received this in error, please notify us immediately by return or telephone and destroy the original message without delay." 9.3 Helpdesk Services All queries on IMU facilities can be forwarded to [email protected] or call us at (+6) ENFORCEMENT IMU may, at its discretion, apply automatic message monitoring, filtering and deny transmission of messages with content that is unacceptable in the terms of this Policy. Violations of this policy will be handled consistent with IMU disciplinary procedures applicable to the relevant persons or departments. IMU may temporarily suspend, block or restrict access to information and network resources when it reasonably appears necessary to do so in order to protect the integrity and security of IMU resources or to protect IMU from liability. ITS policy document Page 9
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
Terms of Service. This online privacy policy applies only to information collected through our website and not to information collected offline.
Terms of Service Privacy Policy Mahavitaran (mahadiscom) respects and protects the privacy of the individuals that access the information and use the services brought through them. Individually identifiable
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Email Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
SAS TRUSTEE CORPORATION ( STC )
SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3
LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Email Policy V1.3 Document Control Reference V1.3 Email Policy Date 17 July 2015 Author Approved by Version History David
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website
Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
System and Network Security Policy Internet User Guidelines and Policy. North Coast Council. 5700 West Canal Road Valley View, Ohio 44125
North Coast Council 5700 West Canal Road Valley View, Ohio 44125 Telephone: 216-520-6900 Fax: 216-520-6969 1885 Lake Avenue Elyria, Ohio 44035 Telephone: 440-324-3185 Fax: 440-324-7355 URL: www.nccohio.org
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION
FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION DATE: June 10, 2015 REGULATION CHAPTER NO.: Chapter 5 REGULATION CHAPTER TITLE: Miscellaneous REGULATION TITLE AND NUMBER:
Administrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
1.2: The name the shellies includes theshellies.co.uk.
Welcome to our web site and blog. If you continue to browse and use our blog and web site you are agreeing to comply with and be bound by the following terms. Together with our Privacy Policy these terms
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
UTC Cambridge ICT Policy
UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
ACCEPTABLE USE OF TECHNOLOGY
IIBE Page 1 ACCEPTABLE USE OF TECHNOLOGY Internet and computer network and non-network access is available to authorized students, teachers, and other staff in the. Albemarle County Public Schools primary
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
SURE E-Mail Services Terms and Conditions SURE MAIL
SURE E-Mail Services Terms and Conditions SURE MAIL Sure offers an E-mail service that allows access to a mailbox provided by a 3 rd party partner ( Service ). The Service is accessed via the internet.
Hyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
WCCM XII & APCOM VI Secretariat is in Seoul. Your use of http://wccm2016.org will always be
Terms & Conditions Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY CONTENTS I. Introduction II. Violation of this Acceptable Use Policy III. Prohibited Uses and Activities IV. Customer
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use
TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )
TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide
Acceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
Service Schedule for Business Email Lite powered by Microsoft Office 365
Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft
Small Pond Web Hosting Terms and Conditions
Small Pond Web Hosting Terms and Conditions Small Pond Web Hosting (referred hereinafter as 'Small Pond Web Hosting ', 'SmallPond ', 'our', 'we' and 'us') is a web hosting business. All accounts on our
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
CENTURIC.COM HOSTED MICROSOFT EXCHANGE ADDENDUM TO TERMS OF SERVICE
CENTURIC.COM HOSTED MICROSOFT EXCHANGE ADDENDUM TO TERMS OF SERVICE This Agreement, named the Hosted Microsoft Exchange addendum to Centuric s Terms of Service, ( Agreement ) is entered by and between
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
If you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Internet usage Policy
Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
