SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY



Similar documents
POLICY ON USE OF INTERNET AND

Other Review Dates: 15 July 2010, 20 October 2011

SAS TRUSTEE CORPORATION ( STC )

Revelstoke Board of Education Policy Manual

COMPUTER USAGE -

USE OF INFORMATION TECHNOLOGY FACILITIES

COMPUTER, INTERNET, & USE POLICY

Online Communication Services - TAFE NSW Code of Expected User Behaviour

INTERNET, AND COMPUTER USE POLICY.

How To Behave At A School

ACCEPTABLE USE POLICY

Human Resources Policy and Procedure Manual

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007

The Internet and 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

ICT POLICY AND PROCEDURE

CARRAMAR PUBLIC SCHOOL

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

Acceptable Use of Information and Communication Systems Policy

Sample Policies for Internet Use, and Computer Screensavers

1. Computer and Technology Use, Cell Phones Information Technology Policy

COMPUTER USE POLICY. 1.0 Purpose and Summary

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

Technology Department 1350 Main Street Cambria, CA 93428

Information Security Code of Conduct

ONE TO ONE LAPTOP PROGRAMME POLICY

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

St. Peter s C.E. Primary School Farnworth , Internet Security and Facsimile Policy

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014

Information Management and Security Policy

Acceptable Usage Policy

Internet Use Policy and Code of Conduct

Franciscan University of Steubenville Information Security Policy

Acceptable Use Policy

Student Laptop Program

INTERNET ACCEPTABLE USE POLICY

Information Technology and Communications Policy

Newcastle University Information Security Procedures Version 3

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No

How To Protect Decd Information From Harm

City of Venice Information Technology Usage Policy

Berwick Academy Policy on E Safety

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF

ICT Security Policy for Schools

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306)

Organizational Policy

Dene Community School of Technology Staff Acceptable Use Policy

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Internet, Social Networking and Telephone Policy

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

Conditions of Use. Communications and IT Facilities

Information Technology Network/ /Internet Acceptable Use Agreement Form IT-D

DUVAL COUNTY PUBLIC SCHOOLS (DCPS) INFORMATION SECURITY PROGRAM SUBJECT: ACCEPTABLE USE POLICY (AUP) POLICY NUMBER: 8.71

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

PHI- Protected Health Information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

ITU Computer Network, Internet Access & policy ( Network Access Policy )

GROUP POLICY MANUAL CODE OF CONDUCT AND ETHICS POLICY

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

Transcription:

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy applies to all Council owned and operated information technology resources and all users. ETHICS AND CONFLICTS OF INTEREST Users shall refrain from personal activities that would conflict with proper execution and management of this Policy. Council s Code of Conduct provides guidance for recognising and disclosing any conflicts of interest. DEFINITIONS Information Technology Resources means computer equipment, including personal computers, Scanners and printers, including those connected to any council network, email, facsimiles, internet, mobile telephones, telephones, two way radios, digital cameras and tablets (ipads). This definition will be automatically updated as new technology is added to these resources. Users means Councillors, members of council staff, casual and temporary staff, contractors, consultants, volunteers, members and community representatives on council advisory committees and community groups given permission, in writing, to use council s information technology resources by the General Manager.

USES Proper Use Southern Slopes County Council provides information technology resources to enable its users to do business in an ethical, effective, efficient and careful manner. Users are reminded that they must observe Southern Slopes County Council s Code of Conduct. Improper use Users must not use information technology resources to search for, access, download or communicate any improper material. Improper material is material of an offensive, obscene, pornographic, threatening, abusive or defamatory nature. Responsibility of users Users are responsible for ensuring they are familiar with the contents of this Policy, including any amendments that may be made from time to time. SURVEILLANCE Council may at any time undertake surveillance of an employee s computer or email use to ensure that it is not being used for any inappropriate purpose. This policy shall be considered as compliant with Section 12 of the Workplace Surveillance Act 2005. SECURITY Each user that is required to use any of Council s computer systems will be issued with a logon ID and password and no user is to divulge their logon ID or password to another user or to persons outside of Council. All information, data or files created by users while using Council s information technology resources are subject to scrutiny. It is important to remember that data files are official documents that are subject to the same laws as any other form of correspondence. They are subject to statutory record keeping requirements and can be subpoenaed or discovered during legal processes. The requirements of the State Records Act 1998 and associated policies must be observed. The Council may access or disclose private electronic messages or files of an employee with good cause, provided that it follows appropriate procedures designed to assure compliance with Council policies. Good cause shall include the need to protect system security, fulfil Council obligations, detect employee wrongdoing, comply with legal process, or protect the rights or property of the Council. To prevent unauthorised use after hours, personal computers should be logged off at the end of day or when last used for the day, and shall be locked during employee breaks away from the computer at any time during the day.

Email should not be used for highly sensitive or confidential information, unless appropriate actions are taken to secure the contents against disclosure, alteration and forgery. INFORMATION Information produced by users as part of their duties is not to be released to external bodies without approval from the appropriate supervisor unless its release is covered by legislation or policy governing its release. Users must consider the sensitivity of information and not use information contrary to Council s Code of Conduct and privacy legislation. Users should consider record keeping requirements when choosing a means to communicate information. Some methods such as SMS and instant messaging will not provide evidence that record keeping requirements are being met and therefore they should not be used. Email messages, which become Council records, must be retained in accordance with Council s Record Management Policy and Gathering Information Code of Practice. Users should not use Council email or electronic messaging systems to distribute improper material, fraudulent or harassing messages, to infringe the copyright or other intellectual property rights of third parties, or otherwise to engage in any illegal or wrongful conduct. The Council reserves the right to audit and remove any illegal material from its information technology resources without notice. Messages conveyed by email and through the internet are capable of being intercepted, traced or recorded by others. Although such practices may be illegal, users should not have an expectation of privacy and must take care with confidential documents. Users who have technology provided by Council that provides remote access to Council are to ensure the resource is used only by those so authorised. ACCESS TO THE INTERNET Access will be granted based on the identification of a genuine business need with approval from the appropriate supervisor as indicated in the User Agreement at Attachment A. This approval process will ensure Council meets a business need, and does not sacrifice capacity or security of Council s information technology resources. Any user with internet access will connect through Council s gateway to ensure use of Council s firewall and security features. Additional connections to Internet providers are prohibited unless prior approval has been obtained from the General Manager. Examples of unacceptable use of the internet include, but are not limited to, the following: using Council Internet access for personal commercial purposes; the viewing, downloading or redistribution of improper material; downloading of information causing a breach of copyright legislation;

the playing of games over the Internet and the downloading of games or video footage from the Internet. PERSONAL USE Council accepts some personal use of the information technology resources may occur. Users are advised to limit the amount of personal use so as not allow it to impact on their normal duties. When considering personal use, the user should use discretion and ensure it remains within the guidelines set in this policy. Reasonable private use of the systems provided by Council is a privilege and such use needs to be balanced in terms of the Council s commitment to meeting operational needs. The home directory for each individual is not to contain excessive quantities of nonbusiness related material. Examples of limited personal use would include; Internet browsing in the employee s lunch break, which could include access to banks for bill payment and the like. This would require the Managers approval, and be within guidelines as listed in this Policy; Personal emails that require no more than 510 minutes of an employee s time per day; No more than 5 MB of files stored in the employees Home Directory. Councillors who are issued with Council facilities should limit personal use of these facilities. Councillors are reminded of Council s Code of Conduct. Personal use will always be at the General Manager s discretion. MOBILE PHONES Mobile phones should be used appropriately and in accordance with Boorowa Council s Mobile Phone Use Policy. LOGGING OF ACTIVITY Council reserves the right to, and may, monitor activity for the purpose of: Monitoring the levels of demand of the technology, and use this information in planning for future needs. To ensure usage of information technology resources is within Council guidelines and to identify any unauthorised use.

SOFTWARE Software considered necessary by Council to enable users to carry out their roles and responsibilities will be provided by Council. Software installed on Council s information technology resources must possess a licence permitting its lawful installation and use. Users are not permitted to install software other than that provided by Council. This includes software from home, sales personnel and consultants. Should a program need to be installed then approval is to be sought from the relevant supervisor and the IT consultant is to be contacted. If software is to be downloaded at the instruction of a supplier, then it should be referred to the IT consultant. No copying of Council software is permitted, and users found to be in possession of copies of Council software may be the subject of disciplinary action or forfeiture of rights to use the information technology resources. HARDWARE No hardware may be removed from Council premises without written permission from the relevant supervisor. No hardware or software (including portable equipment) will be loaned to persons, other than members of Council staff, unless prior approval in writing is obtained from the relevant supervisor. DATA RETENTION Files created during daytoday Council business are to be stored on Council servers to ensure the data is secured by suitable means and is included in backup and archive methods as provided by Council. Retention and storage of data should be in accordance with procedures as set down under the State Records Act 1998.

CONTRACTORS & COMMUNITY GROUPS All users, other than members of Council staff, are not permitted to connect PC s, laptops, servers and the like, to Council s local area network or wide area network, without prior approval from the IT Consultant. This includes, but is not limited to, direct connection or connection via dialup. Managers who identify a need to have such a facility must obtain approval from the IT Consultant for the third party to connect. This is to protect Council s investment in technology and no exceptions should be considered due to the risk potential. An audit of the third party equipment will be conducted prior to approval, and repeated at regular intervals dependant on the duration of the activity. Long durations will require monthly audit of noncouncil equipment ensuring: antivirus software owned by the third party is current; that the equipment is not configured in such a way that may adversely affect Council s information technology resources; that no equipment contains network sniffers, data packet capture software, password cracking utilities and the like; and that the equipment that has approval is the only equipment being used and has not been substituted. REPORTING BREACHES Users are encouraged to report breaches of this policy to their supervisor, an appropriate senior officer or the General Manager. All use should be consistent with the Council's Code of Conduct, which also has guidance on reporting misuse of public resources.

Attachment A Computer and Information Technology User Agreement Name: Position: I have read, understand and will abide by the Southern Slopes County Council Computer and Information Technology Use Policy. I understand my responsibilities as a User of Council s Information Technology Resources, particularly my responsibilities when using the Southern Slopes County Council Computer Network. I further understand that violation of the Computer and Information Technology Use Policy is unethical and may constitute a criminal offence in extreme circumstances. Should I commit any violation, my access privileges may be revoked and disciplinary action and/or appropriate legal action may be taken in accordance with Council s Code of Conduct or relevant legislation....... User Signature/Date