Personal use of computers



Similar documents
Conditions of Use. Communications and IT Facilities

Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

How To Behave At A School

INTERNET ACCEPTABLE USE POLICY

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY " POLICY" Executive Director (AK) [J50]

School Information Security Policy

, Internet & Social Networking Policy Version th December 2014

E Safety Policy. 6 th March Annually. 26 th February 2014

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

West Lothian College. and Computer Network Responsible Use Policy. September 2011

Assistant Director of Facilities

Sibford School Student Computer Acceptable Use Policy

Online Research and Investigation

ITU Computer Network, Internet Access & policy ( Network Access Policy )

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Acceptable Use of ICT Policy. Staff Policy

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & POLICY AND CODE

Computer Network & Internet Acceptable Usage Policy. Version 2.0

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

The Bishop s Stortford High School Internet Use and Data Security Policy

Version: 2.0. Effective From: 28/11/2014

Acceptable Use of Computing and Information Technology Resources

Policy and Code of Conduct

Data Security and Extranet

I N F O R M A T I O N C O M M U N I C A T I O N A N D T E C H N O L O G Y P O L I C Y

Sample Policies for Internet Use, and Computer Screensavers

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Information Governance Framework. June 2015

Acceptable Use of Information Systems Standard. Guidance for all staff

How to Monitor Employee Web Browsing and Legally

Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

Internet Use Policy and Code of Conduct

III. RESPONSIBILITIES

How To Deal With Social Media At Larks Hill J & I School

Notice: Page 1 of 11. Internet Acceptable Use Policy. v1.3

SAS TRUSTEE CORPORATION ( STC )

Acceptable Use of Information Technology Policy

Forbes Shire Council Internet Access Policy

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

Acceptable Use of ICT Policy. Learner School Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February Title: Information Security Policy

ICT Student Usage Policy

RIPA (Regulations and Investigatory Powers Act)

UNIVERSITY OF ST ANDREWS. POLICY November 2005

POLICY ON USE OF INTERNET AND

School policies and Security Risks

Data Protection Division Guidance Note Number 10/08

Acceptable Use of Information. and Communication Systems Policy

ICT POLICY AND PROCEDURE

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

SURVEILLANCE AND PRIVACY

DIGITAL TECHNOLOGY POLICY St Example s School

Information Security

Electronic Communications Monitoring Policy

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)

Acceptable Use of Information and Communication Systems Policy

DIOCESE OF DALLAS. Computer Internet Policy

University of Kent Information Services Information Technology Security Policy

Islington ICT Policy A council-wide information technology policy. Version 0.9 June 2014

Hallett Cove South Primary School Communications/Network Use Policy

Franciscan University of Steubenville Information Security Policy

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

ICT Acceptable Use Policy

Belmont 16 Foot Sailing Club. Privacy Policy

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

Acceptable Use Policy

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:

Security Incident Management Policy

& Internet Policy

ROYAL AUSTRALASIAN COLLEGE OF SURGEONS

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

HomeNet. Gateway User Guide

Acceptable Use of ICT Policy For Staff

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

Employees monitoring of information and communication technologies private usage Guidelines updated in Portugal

Information Technology and Communications Policy

Services Policy

Electronic Communications Guidance for School Staff 2013/2014

University of Liverpool

Reliance Bank Fraud Prevention Best Practices

STRONGER ONLINE SECURITY

Protect yourself online

Security Awareness. ITS Security Training. Fall 2015

Corporate Information Security Policy

Acceptable Use Policy

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:

Use of the Internet and Policy

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

THE PERSONAL USE OF INTERNET, AND TELEPHONES

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Systems Acceptable Use Policy for Learners

Summary Electronic Information Security Policy

Somerset County Council - Data Protection Policy - Final

Privacy policy. 1. Collecting Information We may collect Personal Data about you from a number of sources, including the following:

U 16 Internet Monitoring Policy & Investigation Protocol

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Acceptable Use of Information Systems Policy

Remote Access User Instructions

Transcription:

Personal use of computers

Personal Use In addition to the internal mail system, ICO staff have direct access to the Internet and external email from their IT equipment. This statement of the Commissioner s policy on what is acceptable personal use of computers by his staff lays down general rules and gives examples of what those rules represent. If you consider that your personal use of your computer would fall outside these guidelines, you should ask for authority from your manager to do this. Acceptable Use The ICO computer system exists to support the business purposes of the office. Computers are provided to members of staff to carry out authorised business functions. The equipment should not be used by anyone other than a staff member or someone authorised to act on behalf of the Commissioner. The Commissioner accepts that some personal use, including use of the Internet and external e-mail, will occur within certain parameters. This should only occur when computers are not needed for office work, within your own time and recorded on your flexi sheet as an Other break. It is also accepted that some limited use of the internal e-mail system for personal purposes may occur in normal working hours. Nevertheless, as a generality, personal use should not be frequent or excessive. The following points should be noted: You must not access any website built with a secure connection for personal use. The risk to ICO is that if connections to HTTPS sites are permitted via these secure links, the content of the connection is invisible to our firewalls. This could mean that viruses or malicious code could go undetected from an unknown source and could infect not only our network but also the wider GSi community. You will know if you are accessing a site, or part of a site, of this nature as you will be notified by a pop up box, as shown below, explaining that you are about to connect via a secure connection. At this point you must close the pop up by clicking on the cross in the top right hand corner and proceed no further.

Access to these sites for personal use should only be from the stand alone computers within the office. However, it is accepted that access to these sites will be needed for business purposes and in these circumstances the networked pc s can be used. The purpose for personal use should be limited, for example, you must not use the Internet to conduct transactions on-line, however you can use it to research topics of personal interest. You must not use office computers or services for outside business interests; however it would be acceptable to prepare letters, use a spreadsheet or prepare other documents for personal use. Whilst the Commissioner recognises that you will not always be able to stop a personal e-mail from being received, external personal e- mail should not be encouraged, for example, by giving out your business e-mail address to personal contacts or signing up for e- mail alerts. External e-mails should only be sent occasionally and out of core hours. Any personal external e-mail should be short with no large attachments such as photos. Any personal e-mails you do send should be marked in the subject box Non Work. Personal usage should be within the bounds of the law and decency. You should ensure appropriate courtesy and respect to others. You

should not, for example, use your office e-mail address to express your personal views on issues which may be seen to be related to the office since such use could extend liability for those views to the ICO. Disparaging remarks about others should not be made. For the avoidance of doubt, no sexually explicit or racist material, indecent images of children or any material likely to cause offence or embarrassment to others should be created, downloaded or accessed. You should only visit chat rooms directly related to work purposes, such as Data Protection and Freedom of Information. Laptops This policy applies to the use of ICO laptops and blackberries even when used outside the office. Monitoring It is accepted that some limited personal use will occur. You need to be aware that use of any computer, including which websites have been visited and when, and information about external and internal e- mail traffic, including that marked Non Work, will be monitored and, potentially, will come under scrutiny. This means that monitoring will apply to computers which have been used for personal reasons. The Commissioner does not want to interfere in the personal lives of his employees but monitoring of a secure network is necessary as is use of office equipment. There is also a legitimate business purpose in checking on the use of office time. It is sensible advice to point out that when you use the office computer equipment for personal purposes you should do only those things you would not mind your employer knowing about.

It should be noted that the office does not currently monitor the content of e-mails as a matter of routine. However, it should also be noted that, where there is reason to believe that the law or office policy or procedures have been broken, the content of e-mails may come under scrutiny. The office will take into account the fact that an e-mail has been marked Non Work in the monitoring or investigation it undertakes and, where it is possible and appropriate, examination of this material will be avoided. The activities on the system which will be audited for the purposes of compliance with this policy include: All Internet use will be logged to display date, time, username and target URL (the website visited); All attempts to access blocked sites Top 40 users by browse time All e-mail use will be logged to display date, time, username; and the address to which the message is being sent All remote access to the ICO network will be logged to display the date, time and user name of all users accessing the service. If misuse is suspected, an investigation will take place and this may result in disciplinary action. All audits and logs will be retained for a year. Additional audits or monitoring reports can be requested by line managers and may be activated in the system with the agreement of the Director of Organisational Development and the Head of Internal Compliance. Access for Information Request compliance If you intend to keep copies of non work related e-mails or other documents on your computer, you should give thought to the possibility that they may need to be made available if the office receives a subject access request or a request under the Freedom of Information Act. When you are asked to search your system in response to such a request, you should include non work related documents and emails in your search. This may mean that you choose not to keep records of these documents on the system. You should be aware that even when documents are deleted they can still be held as part of our back up procedure for up to 16 days. If you have any doubts whether or not this information should be included you should seek advice from your manager or the person to whom the request has been allocated.

Members of staff are given the opportunity to have Private Working Folders on their system. For the avoidance of doubt, you should be aware that these folders may need to be accessed either for work purposes or to fulfil statutory requests for information such as a subject access request. This would only be done if the member of staff concerned were absent from the office at the relevant time and could not therefore access the information themselves. Again e- mails that are marked non work will not be opened unless it is unavoidable.