HUMAN RESOURCES POLICIES & PROCEDURES



Similar documents
ICT Student Usage Policy

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE Social Media Policy

Online Communication Services - TAFE NSW Code of Expected User Behaviour

ICT Safe and Acceptable Use Policy for Students

Internet, Social Media and Policy

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Internet, Social Networking and Telephone Policy

How To Behave At A School

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013

ACCEPTABLE USE POLICY

Acceptable Use of ICT Policy For Staff

Bring Your Own Device Program: User Charter

How To Deal With Social Media At Larks Hill J & I School

Sydney Technical High School

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

SOCIAL MEDIA POLICY. Introduction

Acceptable Use of Information Systems Standard. Guidance for all staff

E-SAFETY POLICY 2014/15 Including:

Bring Your Own Device Program: 2015 User Agreement

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information and Communication Systems Policy

INTERNET, AND PHONE SYSTEMS

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Strathfield Girls High School Bring your Own Device User Charter

TECHNOLOGY USAGE POLICY

Electronic Communications Guidance for School Staff 2013/2014

EMPLOYEE COMPUTER USE POLICY

Digital Device LOAN CHARTER

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

With the increasing popularity of social media you need a Social Media Policy to protect your company.

How To Use Social Media At St James Anglican School

Social Media Policy. Policies and Procedures. Social Media Policy

COMPUTER, INTERNET, & USE POLICY

Human Resources Policies and Procedures

Policy No: 2-B8. Originally Released: Date for Review: 2016

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Information Systems Acceptable Use Policy for Learners

INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)

CARRAMAR PUBLIC SCHOOL

Sibford School Student Computer Acceptable Use Policy

Internet Use Policy and Code of Conduct

Rules for the use of the IT facilities. Effective August 2015 Present

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

St. Peter s C.E. Primary School Farnworth , Internet Security and Facsimile Policy

BRIGHAM AND WOMEN S HOSPITAL

INTERNET ACCEPTABLE USE POLICY

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

Huddersfield New College Further Education Corporation

(g) Non-secure Website Areas means all areas of the ArteeGroup Websites other than the Secure Website Areas;

Social Media in the Workplace

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

Acceptable Use and Publishing Policy

ICT POLICY AND PROCEDURE

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

E Safety Policy. 6 th March Annually. 26 th February 2014

YU General Guidelines for Use of Social Media

INTERNET, AND COMPUTER USE POLICY.

Using Public Computer Services in Somerset Libraries

The Bishop s Stortford High School Internet Use and Data Security Policy

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

THE PERSONAL USE OF INTERNET, AND TELEPHONES

Please also read the Internet Acceptable Use Policy Available at U:\Network Services\policies\ SDC Internet acceptable use policy.

Policies Concerning the use of Computers

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Acceptable Use of ICT Policy. Staff Policy

INFORMATION TECHNOLOGY APPROPRIATE USE

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

ICT Acceptable use Policy. Coláiste Mhuirlinne/ Merlin College Doughiska, Galway City.

Use of the Internet and Policy

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & POLICY AND CODE

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

& Internet Policy

Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy

ITU Computer Network, Internet Access & policy ( Network Access Policy )

OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy

Information Management and Security Policy

Delaware State University Policy

1. Computer and Technology Use, Cell Phones Information Technology Policy

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Internet, and Computer Use Policy

POLICY ON USE OF INTERNET AND

INTERNET AND POLICY

Covered California. Terms and Conditions of Use

Northeast Health System (NHS) Information Privacy and Security

Acceptable Use Policy Internet and - Students

DIGITAL TECHNOLOGY POLICY St Example s School

TITLE C169 COMPUTER USE, INTERNET & POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY

How to Monitor Employee Web Browsing and Legally

section 15 Computers, , Internet, and Communications

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Student Laptop User Charter

Acceptable Use Policy

Acceptable Use Policy

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:

Kenmore State High School Student Laptop Charter

Transcription:

HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to use College IT facilities 3 Inappropriate uses of College IT facilities 3 Connection of computers to the College networks 4 Copyright and downloading 4 Data protection 4 E-mail and internet usage 5 Social networking websites, personal web pages and web blogs 5 Exceptional access requirements 6 August 2012 The current version can be found on StaffNet Page 1 of 6

1. Introduction 1.1. The ability of people to use computers, e-mail and access the Internet provides new opportunities for the College as it facilitates the gathering of information and communication between employees, students, customers and others. However, the use of computers, the Internet and e-mail exposes the College to new risks and liabilities. It is therefore essential that everyone reads this policy and becomes aware of the potential risks involved in using computers, e-mail and the Internet. 1.2. Any further clarifications for this policy can be provided by the Information Security and Compliance Team which is part of the New Technologies Department. 2. Scope This policy applies to anyone using computers connected to the College network. 3. General points 3.1. Use of computers, telephones, e-mail and the Internet are primarily for workrelated or study purposes. Limited personal use is allowed, but should be restricted to breaks and before and after normal working hours. 3.2. The College has the right to monitor, and will monitor, all aspects of its telephone and computer systems that are made available to you and intercept or record any communications, including telephone, e-mail or Internet communications. Remote viewing software to monitor desktop screens can also be used by New Technologies. This is done to: ensure that College facilities are being properly used for the conduct of its business including teaching and learning ascertain compliance with legal requirements and provisions of this policy investigate or detect unauthorised or inappropriate use of telecommunications or IT. The College reserves the right to use the content of any e-mail, websites visited or files held on the College network in any disciplinary process. 3.3. College email accounts are the property of the College. 3.4. It is inappropriate to use e-mail and the Internet to access or attempt to access, download or transmit any material which might reasonably be considered to be obscene, abusive, defamatory, or discriminatory (as defined in the Equality Act 2010) in any way. You should be aware that such material may be contained in jokes, spam, on line banter on Twitter, text messages or social networking sites like Facebook, etc. August 2012 The current version can be found on StaffNet Page 2 of 6

3.5. Cyber bullying or harassment through any means is a disciplinary offence and in such instances the College s Disciplinary policy will be invoked. 3.6. Any breach or suspected breach of this policy should be reported to the Data Protection Officers of the College (Director of Human Resources in the case of employees/visiting teachers/casuals/visitors or Head of Student Administration in the case of students.) The Data Protection Officer concerned will review the case and decide if the matter is to be investigated. 4. Authorisation to use College IT facilities Your login will be for your use only. Your password(s) must be kept secure and should not be disclosed to or used by anyone else. For reasons of security, your password should not be printed or stored online. You are not allowed to log in other users using your account login. 5. Inappropriate uses of College IT facilities 5.1. You are not permitted to use the College computing, email or Internet facilities for any of the following: Participation in distributed file-sharing. Making voice calls over the Internet for personal use. Using Internet chat or messenger software for personal use. Providing commercial services through web pages supported on the College network, or the provision of 'home-page' facilities for any commercial organisation. Any unlawful activity including copying and removing confidential data files or copyright restricted programs from the College computers or networks on any removable storage media. Creating or transmitting defamatory material about any individual or organisation. Sending any communication that does not correctly identify the sender or attempts to disguise the identity of the computer from which it was sent. Creating, transmitting or accessing material in such a way as to infringe a copyright, moral right, trade mark, or other intellectual property right. Using College Internet and email facilities for private profit. Gaining or attempting to gain unauthorised access to any facility or service within or outside the College, or making any attempt to disrupt or impair such a service. Activities not directly connected with employment, study, or research in the College (excluding reasonable and limited use for social and recreational purposes where not in breach of these regulations or otherwise forbidden) without proper authorisation. Plagiarism - passing off someone else s work, whether intentionally or unintentionally, as one s own. August 2012 The current version can be found on StaffNet Page 3 of 6

Sending emails or registering on third party websites which could enter the College into legally binding contracts or obligations unless the user has express authority to do so or has obtained appropriate permissions. Misleading someone about your true identity or using someone else s computer accounts. Online betting, gambling or pornography. Online shopping, including buying and selling on ebay. 6. Connection of computers to the College networks 6.1. Users who bring computers or other devices which are capable of connecting to the wired or wireless College networks must ensure compliance with College standards for secured connections to the network. 6.2. No computer or other device connected to the College networks directly or indirectly may be used to give any unauthorised person or computer system access to any restricted resources within the College. 7. Copyright and downloading 7.1. Copyright applies to all text, pictures, video and audio. In general you may download and use such files but may not forward them on to others without the permission of the author of the material or an acknowledgement of the original source of the material, as appropriate. 7.2. Any files downloaded to the College network should be of a reasonable size depending on work or study requirements. 7.3. Users must not download files whose source or authenticity cannot be verified using the College s computer network. 7.4. Any suspect emails must not be opened and should be reported to NT. 8. Data protection 8.1. Users of IT systems wishing to hold or process data relating to a living individual should do so in accordance with the provisions of the College s Data Protection Policy. Advice can be sought from HR or NT. 8.2. Any data protection rules or regulations applicable to electronic media such as computer files, databases or emails are also applicable to their printed copies. 8.3. Users must ensure that information printed, downloaded, copied or transferred is handled and stored (for example on USB drives) with care and confidential printouts are destroyed when no longer needed according to the prescribed College procedures on managing confidential data. August 2012 The current version can be found on StaffNet Page 4 of 6

9. E-mail and internet usage 9.1. Reasonable private use of email or the Internet is permitted in line with College procedures for staff and students but should be kept to a minimum. Excessive personal access to the Internet during working hours may lead to disciplinary action and may in certain circumstances be treated by the College as gross misconduct. 9.2. E-mails should be drafted with care as they are legal documents and can be used in disciplinary/grievance processes or as evidence in court. 9.3. Users should not make political or derogatory remarks in e-mails or on social networking sites about the College, employees, students, competitors or any other person. Any such remark may constitute libel or breach other legislation. It could also lead to disciplinary action. 9.4. By sending e-mails on the College s system, you are consenting to the processing of any personal data contained in that e-mail and are explicitly consenting to the processing of any sensitive personal data contained in that e- mail. If you do not wish the College to process such data you should communicate it by other means. 9.5. Websites accessed by you must comply with the restrictions set out in this policy. Accessing or attempting to access inappropriate sites may lead to disciplinary action and may in certain circumstances be treated by the College as gross misconduct under the staff or student disciplinary policies. 9.6. All access or attempted access to the Internet is recorded on the College Internet filtering software. These records will be inspected if misuse is suspected. 10. Social networking websites, personal web pages and web blogs 10.1. Although the College respects its computer users right to personal and social interaction, it must also ensure that its information security and its reputation are protected. It therefore requires staff and students to: ensure that they do not conduct themselves in a way that is detrimental to the reputation of the College; ensure that no information is made available that could provide a person with unauthorised access to the College systems and/or any confidential information; refrain from recording any confidential information regarding the College on any social networking websites; take care not to allow their interactions on these websites to damage working relationships between staff, staff and students or between students. Personal blogs and web pages on social networking sites should not be used to attack or abuse anyone. Users should respect the privacy and feelings of others; August 2012 The current version can be found on StaffNet Page 5 of 6

not use personal accounts on social networking sites for College business (including interactions with students). However, accounts dedicated to teaching and learning can be established with agreement from the Head of Department or line manager. 10.2 Any blog, etc. in which the College is mentioned as your place of work or study should also contain a disclaimer that the views expressed in the blog are yours alone and do not necessarily represent the views of the College. 10.3 It should always be clear to users whether the site they are interacting with is a College page run by the College for College purposes or whether this is a personal page run by an individual for their own private purposes. 10.4 Creating or endorsing hybrid sites which contain elements of both should be avoided as this is likely to cause confusion, editorial problems and brand damage. For example, a tutor s personal profile should not have a URL which contains a College brand or programme/project name. 10.5 If you would like to start a blog where you are identifying yourself as a College employee let your manager know. Ask your manager or tutor if you have any questions about what is appropriate to include in your blog. 10.6 At no stage during the recruitment or enrolment process should recruiting managers, Human Resources or tutors conduct searches on prospective employees or students on social networking websites. 11. Exceptional access requirements Any exceptional access requirements on the computer systems or networks which are not covered by this policy but are needed for the conduct of college business must be authorised by the Head of IT Services. Publication date: August 2013 Review date: August 2014 August 2012 The current version can be found on StaffNet Page 6 of 6