How To Monitor The Internet In Idaho



Similar documents
Sample Employee Network and Internet Usage and Monitoring Policy

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND USAGE POLICY

BOARD OF EDUCATION POLICY

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

13. Acceptable Use Policy

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

City of Grand Rapids ADMINISTRATIVE POLICY

Information Security and Electronic Communications Acceptable Use Policy (AUP)

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

DIOCESE OF DALLAS. Computer Internet Policy

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks

Westwood Baptist Church Computer use Policy

City of Venice Information Technology Usage Policy

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

BOARD OF EDUCATION REGULATION EMPLOYEE COMPUTER, NETWORK, INTERNET, AND USE RULES

Pulaski Technical College

Computer, Network, and Internet Use Student Policy (As of 8/1/09)

ICT Student Usage Policy

3. Electronic Mail ( )

Revised: 6-04, 8-09, 1-12 REGULATION #5420

The College ofBergen Online - Acceptable Use and Disposal

TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & POLICY AND CODE

EMPLOYEE COMPUTER USE POLICY

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

All Users of DCRI Computing Equipment and Network Resources

INTERNET ACCEPTABLE USE POLICY

4118.5(a) Personnel Certified/Non-Certified. Rights, Responsibilities, and Duties. Acceptable Computer Network Use

RSU 21 Employee Acceptable Use Agreement for Computers/Internet/Telecommunications

File: EDE COMPUTER/ONLINE SERVICES

4118.5(a) Certified-Non-Certified. Personnel - Rights, Responsibilities and Duties. Acceptable Computer Network Use

ContentPros LLC Web Site and Hosting Service Agreement

NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY

ANTRIM COUNTY COMPUTER, NETWORK SYSTEM AND INTERNET USE POLICY

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, ,

Bluewater District School Board ADMINISTRATIVE PROCEDURE AP 2312-D Administration Page 1. Network Resources - Limited Personal Use

REGION 19 HEAD START. Acceptable Use Policy

Acceptable Use Policy

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests

COMPUTER USE IN INSTRUCTION

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No

Internet Acceptable Use Policy

1. Computer and Technology Use, Cell Phones Information Technology Policy

COMPUTER NETWORK FOR EDUCATION

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

POLICIES AND REGULATIONS Policy #78

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

EMPLOYEE COMPUTER AND INTERNET USE

How To Use A College Computer System Safely

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

IT1. Acceptable Use of Information Technology Resources. Policies and Procedures

Acceptable Use (Anti-Abuse) Policy

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

Hyde School Student Computer Systems Acceptable Use Policy

North Lakes Academy. A. The following uses of NLA computer systems and Internet resources or accounts are considered unacceptable:

Park Avenue motor cars

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

Human Resources Policy and Procedure Manual

Acceptable Use Policy

NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS

DEPARTMENT OF COMMUNITY AND GOVERNMENT SERVICES (CGS) ACCEPTABLE & INTERNET USAGE POLICY POLICY STATEMENT

COMPUTER, NETWORK AND INTERNET USE POLICY

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE

Acceptable Use Policy

Information Technology User Policy 10/31/13

Acceptable Use of Electronic Networked Resources & Internet Safety

How To Use Your Cell Phone At Renaissance Academy Charter School

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

Virginia Commonwealth University Police Department

Pierce County Policy on Computer Use and Information Systems

COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)

Information Technology Acceptable Use Policy

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

1.4 To overcome this biasness, this Policy is in place to ensure all Maxis customers have a good experience.

Acceptable Use Policy

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

Internet and Computers. Acceptable Use and Internet Safety

COMPUTER NETWORK AGREEMENT FORM

I.T. Facilities Acceptable Use Policy

IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT

JHSPH Acceptable Use Policy

Public Schools of CLK Acceptable Use Policy for Electronic Resources iclk Learning Initiative

TELECOMMUNICATIONS/COMPUTER NETWORK POLICY. 1.0 Purpose. 2.0 Definitions

ACCEPTABLE USE POLICY

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Transcription:

Idaho Technology Authority (ITA) ENTERPRISE POLICY P1000 GENERAL POLICIES Category: P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING CONTENTS: I. Authority II. Abstract III. Definitions IV. Policy V. Exemption Process VI. Procedure Reference VII. Contact Information VIII. Responsibilities Revision History I. AUTHORITY Authority: Idaho Code 67-5745C(3) Executive Order 2005-22 Idaho statute states in part the Idaho Technology Authority shall: Within the context of its strategic plans, establish statewide information technology and telecommunications policies, standards, guidelines, conventions and comprehensive risk assessment criteria that will assure uniformity and compatibility of such systems within state agencies; II. ABSTRACT This Employee Internet Use Monitoring and Filtering policy is designed to help employees understand management s expectations for granting employees access to the Internet and to help employees to use State resources wisely. While a direct connection to the Internet offers a variety of benefits to the State of Idaho, it can also expose the State to significant risks of its data and systems if appropriate security measures are not employed. Excessive, unnecessary Internet usage causes network and server congestion and reduces employee productivity. Unlawful Internet usage may also expose the State of Idaho and/or the individual user to legal liability. III. DEFINITIONS 1. Internet The Internet is a network of connected sites accessible through a web browser and is a resource for research, information gathering, extending and obtaining services, and education. P1050 Employee Internet Use, Monitoring and Filtering Page 1 of 5

3. Worm A malicious computer program that replicates itself over a computer network and usually performs unwanted actions, such as monopolizing the computer or network s resources and shutting systems down. 4. Virus A program or piece of code that is loaded onto a computer without the user s knowledge and runs against the user s wishes. It may contain a self-replicating component to spread the infection and almost always corrupt or modify files on a targeted computer. 5. Trojan Horse A destructive program that masquerades as a benign application. Unlike viruses, Trojan Horses do not replicate themselves but they can be as destructive. They are typically used by cybercriminals for online fraud and theft. IV. POLICY A. Internet Monitoring Each agency shall ensure that Internet use from all computers and devices connected to the state network are monitored. Records of the monitored traffic should be retained based on agency requirements. B. Internet Filtering Each agency shall ensure that access to websites and protocols that are deemed inappropriate (e.g. the criteria in Section C, sub-section 6, A thru M) is blocked. C. Internet Use 1. Access to the Internet is a tool for meeting the business needs of the agency. Internet access is considered State property and the agency has the right to monitor the use of such property at any time. Therefore, users should not have any expectation of privacy as to their Internet usage via State computers and networks 2. The primary purpose of Internet use is to conduct official business. Employees may occasionally use the Internet for individual, nonpolitical purposes on their personal time, if such use does not violate the terms and conditions of this policy or interfere with State business. 3. Users may not download, store, transmit, or display any kind of image or document on any department system that violates federal, state, or local laws and regulations, Executive Orders, or that violate any ITA or department adopted policies, procedures, standards, or guidelines. 4. Users may not attempt to access prohibited content or to circumvent software put in place by the agency to prevent such access. P1050 Employee Internet Use, Monitoring and Filtering Page 2 of 5

5. If a user accidentally connects to a site that contains sexually explicit or otherwise offensive material, he/she must disconnect from that site immediately and report the incident to their supervisor. 6. Use of the Internet as described below is strictly prohibited: A. Viewing or distributing obscene, pornographic, profane, or sexually oriented material; B. Violating laws, rules and regulations prohibiting sexual harassment; C. Encouraging the use of controlled substances for criminal or illegal purposes; D. Engaging in any activities for personal gain; E. Obtaining or distributing copyrighted information without permission; F. Obtaining and distributing advertisements for commercial enterprises, including but not limited to, goods, services, or property; G. Violating or infringing upon the rights of others; H. Conducting business unauthorized by the department; I. Obtaining or distributing incendiary statements, which might incite violence or describe or promote the use of weapons; J. Obtaining or exchanging proprietary information, trade secrets, or any other privileged, confidential, or sensitive information that is not authorized; K. Engaging in any political activity prohibited by law; L. Using the system for any illegal purpose; and M. Accessing sites that are known to distribute malware software that is intended to damage disrupt or gain access to state resources. 7. Users may access any State owned web site for the purpose of conducting State authorized business, such as the online payroll system, providing they have proper password or other security authorization. 8. Users may not knowingly or willfully create or propagate any virus, worm, Trojan Horse, or other destructive program code. P1050 Employee Internet Use, Monitoring and Filtering Page 3 of 5

9. Users may not download or distribute pirated software or data from any source nor any inappropriate images. 10. Users may only download software with direct business use and must take all necessary actions to have such software properly licensed and registered as required. Downloaded software must be used only under the terms of its license. 11. The State has the right to inspect any and all files stored in secured areas of State networks, on computing devices owned or leased by the State, or on any other storage medium provided by the State for State business (i.e. floppy disks, tapes, and RW CDs) in order to monitor compliance with this policy. 12. Authorized individuals, as part of their job responsibilities, may investigate and monitor Internet links appearing on State owned web sites to insure linkage to inappropriate or unauthorized web sites does not exist. Discovery of any such violation will result in the immediate deletion of the link and a report to the ITA staff for further action. 13. An Internet user can be held accountable for any breaches of policy, security, or confidentiality resulting from their use of the Internet. Such violations of this policy may result in disciplinary action. V. EXEMPTION PROCESS Refer to Policy 1010 Information Technology Policies, Standards, and Guidelines Framework. VI. PROCEDURE REFERENCE There are no procedure references to this policy. VII. CONTACT INFORMATION For more information, contact the ITA Staff at (208) 332-1876. VIII. RESPONSIBILITIES Users should schedule, wherever possible, communications-intensive operations such as large file transfers, video downloads, and the like for off-peak usage times. REVISION HISTORY 09/03/14 Revised to include the monitoring and filtering sections 07/16/14 Updated Section I. Authority to be consistent with Idaho statute. P1050 Employee Internet Use, Monitoring and Filtering Page 4 of 5

07/01/13 Changed ITRMC to ITA. 6/16/09 Added Exemption Process and Procedure Reference to this policy; changed the layout and deleted Timeline. 11/15/06 Updated Authority section to reference Executive Order 2005-22. Added new item to Section IV: Users may not attempt to access prohibited content or to circumvent software put in place by the agency to prevent such access. Date Established: October 17, 2001 P1050 Employee Internet Use, Monitoring and Filtering Page 5 of 5