NEW SMYRNA BEACH POLICE DEPARTMENT NEW SMYRNA BEACH, FLORIDA POLICY AND PROCEDURE DIRECTIVE

Size: px
Start display at page:

Download "NEW SMYRNA BEACH POLICE DEPARTMENT NEW SMYRNA BEACH, FLORIDA POLICY AND PROCEDURE DIRECTIVE"

Transcription

1 TITLE: NUMBER: EFFECTIVE: July 25, 2012 NEW SMYRNA BEACH POLICE DEPARTMENT NEW SMYRNA BEACH, FLORIDA POLICY AND PROCEDURE DIRECTIVE Electronic Communications Protocols CFA STANDARD: CFA Chapter AMENDS: DATE FOR REVIEW: As Required REVIEW BY: Staff DATE REVISED: June 1, 2012 PURPOSE... 1 DISCUSSION... 1 POLICY... 2 DEFINITIONS... 2 INFORMATION TECHNOLOGY MANAGER... 3 COMPUTER UTILIZATION... 3 SOFTWARE POLICY... 4 REQUESTS FOR HARDWARE/SOFTWARE... 5 SECURITY... 5 MOBILE COMPUTER TERMINALS... 5 FCIC/NCIC USE... 6 ELECTRONIC BLOGS*, WEB POSTING, CHAT ROOMS... 7 RETENTION OF INTERNET/INTRANET USE... 8 POWER DATA MANAGEMENT SYSTEMS (DMS)... 8 VOICE MAIL... 8 COMPLIANCE PROCEDURES... 9 VIOLATION PENALTIES... 9 LEGAL DISCLAIMER INTRANET PURPOSE The purpose of this Directive is to establish guidelines and regulations governing security and utilization of computer hardware and software used on New Smyrna Beach Police Department owned, purchased or leased computer equipment. It is also to establish guidelines in the creation, maintenance, use, and disposition of information contained in various electronic communication systems within the New Smyrna Beach Police Department. Various communications systems may be utilized by, or provided to Police Department members. They include both contemporaneous and pre-record communications. Some of these are: Telephones and tele-facsimile (Fax) devices Electronic mail ( ) systems Internet/Intranet Systems Radio and Paging Systems Electronic and paper documents Power DMS DISCUSSION As a law enforcement agency, it is imperative that the New Smyrna Beach Police Department diligently strives to maintain lawful adherence to all state and federal laws. Compliance with copyright and software licensing laws can be difficult due to the ease with which these products can be copied. Often the individual involved is not aware of the prohibitions involved or the possible consequences of their actions. This Directive, in part, is designed to Electronic Communications Protocol Page 1 of 10

2 familiarize all members of the Department with the general content of these laws and the procedures necessary to ensure compliance. POLICY It is the policy of the New Smyrna Beach Police Department to provide electronic communications as a method of expediting business communication, eliminating paperwork, and automating routine office tasks in a cost-effective manner. In utilizing this expeditious and efficient forum of communication, members of the New Smyrna Beach Police Department must be cognizant of the fact that their work is subject to public and media scrutiny. Within this context, the use of electronic communications by Police Department members is encouraged as a method of conducting official business. This policy is applicable to all computer software and hardware currently installed and all future installations. Members of the New Smyrna Beach Police Department shall abide by all software copyright and licensing agreements. It is the Police Department s policy that the provided resources are not to be used for private or nonofficial use. Computer hardware and software owned or operated by the City shall be used for official business purposes only. Ordinarily, members should not access communications intended solely for another member or person unless requested to do so by the intended recipient, or directed to do so by a management representative. Unless the other party does not speak or read the language, all communications shall be in English, and no encryption program(s) shall be used without approval of the Chief of Police or designee. Members are advised that they do NOT have a reasonable expectation of privacy when members use a computer or any type of communications system that is authorized or provided by the NSB Police Department. All Internet/Intranet access, mail messages, programs, or documents sent to or by members, including the deciphering of encrypted text will be monitored. Additionally, management has the right to inspect or remove any document or program housed on a department-approved system. The New Smyrna Beach Police Department has taken the necessary steps to provide Internet access to members of the Department. This document outlines the policies on access to and acceptable use of the Internet by Police Department members. These policies may also be extended to outsourced vendors/contractors. Any member eligible for and desiring access to the Internet will be provided access under the terms and conditions of this policy. Violation of this policy may be grounds for having access to Internet services restricted or revoked and may be grounds for other appropriate actions. DEFINITIONS AUTHORIZED SOFTWARE: Is computer software that has been authorized by the Chief of Police with the recommendation of the Information Technology Manager. BLOG: A blog (short for web-log) is a personal online journal that is frequently updated and intended for general public consumption. Blogs are defined by their format: a series of entries posted to a single page in reversechronological order. COPYRIGHT: The right granted by law to an author, publisher, or distributor, for exclusive production, sale, or distribution of specific computer software or a computer software package. COPY OF RECORD: The printed copy of electronic mail messages or a copy kept in electronic form, which must be retained as per established retention requirements. Both the sender and the recipient's copy of will be designated as the agency's Copy of Record, and it will be the sender's responsibility to meet established retention requirements. ELECTRONIC MAIL ( ): Electronic Mail is the electronic transfer of information typically in the form of electronic messages, memoranda, and attached documents from a sending party to one or more receiving parties by means of an intermediate telecommunications system. that is created or received by an agency in connection with official business is a record that is subject to Access and Records Management laws and regulations. Electronic Communications Protocol Page 2 of 10

3 EXTERNAL ELECTRONIC MAIL: Electronic mail received from an outside agency or the public. INFORMATION TECHNOLOGY MANAGER: Is a departmental member who has been assigned the responsibility and authority to oversee the computer hardware, software, and communications system within the agency by the Chief of Police. NON-PUBLIC RECORDS: messages are not subject to the provisions of the "Public Records Act", Chapter 119, FSS when they consist of non-circulated materials and are not intended to serve as final evidence of the knowledge to be recorded. This includes internal and external personal communications or announcements of a non-business nature and personal notes intended for one s personal use. As an example: A draft of a written directive can be ed to all Division personnel for preview and editing. The draft is not subject to the "Public Records Act. Once the draft has been staffed and approved by the Chief of Police, it is an official policy and becomes public record, and the transitory messages may be deleted. PUBLIC RECORDS: Electronic mail messages are public records when they are created or received in the transaction of official business and retained as evidence of official policies, actions, decisions, or transactions. E- Mail messages that are kept because they contain valuable information are also public records. messages, which constitute public records, must be identified, accessible, and retained just like records in other formats. POWER DMS (Document Management Software): DMS is a paperless distribution, organization, and maintenance of written directives, and Policies and Procedures. TRANSITORY MESSAGES: Do not set policy, establish guidelines or procedures; certify a transaction, or become a receipt. Transitory messages are those records created for the informal communication of information and might be compared to a telephone conversation, written telephone messages, post-it notes, or verbal communications in an office hallway. They are not designed for the perpetuation or formalization of knowledge. These records are subject to public inspection. NON-TRANSITORY MESSAGES: Are those records, which document or set official policies, actions, decisions, or transactions and are for the perpetuation or formalization of knowledge. These records are subject to public inspection. VOICE MAIL: An interactive computerized system for answering and routing telephone calls, for recording, saving, and relaying messages. INFORMATION TECHNOLOGY MANAGER (ITM) The Information Technology Manager is a departmental member who has been assigned the responsibility and authority to oversee the computer hardware, software, and communications system within the agency by the Chief of Police. The ITM is responsible to ensure that the system(s) utilized by the agency continues to operate in the most efficient and effective manner utilizing current and appropriate soft/hardware Duties include, but are not limited to: acting as the liaison with the City of New Smyrna Beach Network Administrator; Volusia County Operations; software/hardware vendors; or any other entity, person, or organization regarding the utilization of hardware, software, and electronic communications utilized by the agency and members. COMPUTER UTILIZATION Hardware and software owned or operated by the New Smyrna Beach Police Department shall be used for official business purposes only. No City member or any other individual or organization is authorized to utilize any city computer hardware, software, or related facilities and supplies for other than official city business without the expressed written approval of the Chief of Police Authorized software must meet following criteria: Approved by New Smyrna Beach Police Department Information Systems as a department standard after being screened and approved by Information Technology Manager for authorized use, Purchased utilizing the purchasing process after approval by the Chief of Police, Developed by New Smyrna Beach Police Department staff or authorized agents for business. Electronic Communications Protocol Page 3 of 10

4 Resources covered by this directive include but are not limited to: Minicomputers and their peripherals Personal computers and their peripherals Printers Plotters and similar devices Computer workstations Data capture devices such as scanners, card readers, barcode readers, and similar devices Communication services such as leased, dial up or private line circuits used for data transmission Modems, multiplexers, channel/data service units, or their equivalent Software programs covered by this directive include but are not limited to: Utility programs Operating systems Application programs from any source such as Power DMS or OSSI Control procedures and/or command procedures Documentation related to any of the above Computer paper and forms Magnetic or optical storage media such as magnetic tapes, tape cartridges, optical disks, or magnetic disk packs and diskettes Police department members and/or independent contractors may utilize any of the approved resources after being authorized by the Information Technology Manager Formal demonstrations of software or hardware, programming activities, and dissemination of data and/or documentation to any individual or organization within or outside of the City control is prohibited without prior approval from the Chief of Police, the Information Technology Manager or designee. Division Commanding Officers, however, may authorize demonstrations of their user applications for visitors or for training purposes when such exercises are carried out with reasonable precautions against release of sensitive or proprietary information Computer generated data files or reports must be approved by the Chief of Police, or designee, prior to being distributed to persons or organizations external to City of New Smyrna Beach government No devices of any kind may be attached to any City computer equipment without the authorization of the Chief of Police or the Information Technology Manager No member shall install any software on a City owned or operated computer system unless it is authorized and approved by the Information Technology Manager. The use of proprietary software without an approved license agreement is strictly prohibited. CFA (D) No member shall bypass or modify any installed security systems or menu interfaces without the expressed permission of the Chief of Police or designee. COMPUTER SOFTWARE POLICY The New Smyrna Beach Police Department recognizes and supports the legitimate interests of copyright holders, and prohibits its members and contractors from violating the rights of copyright holders Members are prohibited from using software on any machine other than the one for which a license was obtained, unless the license clearly provides the right to copy the software or to use it on another machine. Questions regarding license agreements shall be directed to the New Smyrna Beach Police Department Information Technology Manager Only authorized computer software may be used on any computer owned, purchased, or leased by the New Smyrna Beach Police Department To prevent the introduction of unlicensed software and computer viruses, all personal computers are configured with security software. These measures ensure that the Information Technology Manager or designee is authorized to perform software installations. CFA (E) Electronic Communications Protocol Page 4 of 10

5 Mobile Data Computer users may only use disks obtained from Police Department personnel that have been scanned for viruses. CFA (E) REQUESTS FOR COMPUTER HARDWARE OR SOFTWARE All requests for purchase of computer hardware or software shall be forwarded to the Information Technology Manager through the normal chain of command using the standard property request/approval form The ITM shall review the request to ensure that it complies with established department hardware and software standards. If a discrepancy is encountered, the ITM shall contact the Chief of Police and discuss the request with him/her No computer software or hardware shall be ordered or purchased independent of the New Smyrna Beach Police Department Information Technology Manager If the Chief of Police approves the request, the request shall be forwarded to purchasing for action and ordering. SECURITY Only those persons authorized by the Chief of Police or his/her designee and issued a password shall be authorized to utilize the departmentally approved software and hardware. CFA (G) Members shall not disclose codes, passwords, or any other information obtained through the software programs that are only available to department members through the performance of their assigned duties Members, who disclose any information or violate the confidentiality of information known only to them by the virtue of their position, shall be subject to disciplinary action up to termination of employment Employees are prohibited from using unauthorized codes, passwords or other means to gain access to addressed to others, personal or business related. CFA (F) Members are prohibited from using unauthorized means to gain access to addressed to others. Members shall not disclose passwords to others. All electronic mail is subject to review by the Chief of Police or designee. MOBILE COMPUTER TERMINALS CFA (C) Mobile Computers Terminal (MCT) shall be used only for official department business MOUNTING OF THE MCT: The MCT has been mounted with an airbag cut off switch. When the airbag is off, the switch light is on. Passengers must be informed that the airbag has been deactivated. It is critical that the mount not be adjusted without the approval of the fleet manager USE WHILE VEHICLE IN MOTION: Due to safety considerations, it is recommended that the MCT be used only while the vehicle is stopped RADIO TRAFFIC: All call-related information from both Communications and officers will be made by voice transmission over the radio system. When dispatching a call for service, Communications will first dispatch it by voice radio and then forward the call information to the MCT of the affected field unit for reference. Officers will use the voice radio to acknowledge the call as well as for other call related information such as requests for clarification. This will ensure that all units are aware of the activity of other units TERMINAL MESSAGES: The use of terminal messages must be restricted. Terminal messages are designed for car-to-car transitory information and shall not be directed to Telecommunicators. On the rare occasion when a terminal message must be sent to Communications, it will be addressed to the appropriate terminal ID, not to an individual Telecommunicator. Electronic Communications Protocol Page 5 of 10

6 Do not use a terminal message to make any type of official request for which action will need to be taken. Often, the message is not read immediately, the screen has been cleared, or a personnel change has taken place. All requests will be made by voice radio transmission so that they are time stamped for logging purposes. Requests for Medical Examiner, wreckers, and other services must be done by voice radio transmission or telephone. Terminal messages are not private. They are public records Use of terminal messages will be closely monitored by supervisors who will take appropriate action to curtail excessive transmissions FCIC/NCIC UTILIZATION All procedures, confidentiality, requirements, and certifications shall be in compliance with the Florida Crime Information Center policies and procedures All members utilizing the criminal justice information system terminals shall be required to successfully complete the Florida Department of Law Enforcement s initial FCIC/NCIC training and recertify every two (2) years All communications sent or received via FCIC/NCIC shall be considered confidential and for law enforcement utilization or purposes only FCIC/NCIC checks for vehicle registrations, driver s licenses and warrants may be performed via MCT Anytime a hit is received, the officer must immediately notify Communications by voice radio transmission. Communications must then perform the FCIC/NCIC check again for confirmation purposes Officers shall make FCIC/NCIC check requests by voice radio transmission anytime officer safety is an issue. ELECTRONIC MAIL ( ) CFA (A) messages should be considered transitory messages and shall be considered as a means of informal communications, information that is short lived, or has no administrative value The electronic mail ( ) system and all messages created therein are property of the New Smyrna Beach Police Department Only members authorized by the Chief of Police shall use MANDATORY CHECKS: All department employees must check and read and their attachments sent through the department s internal system. This shall be done at the beginning and end of each shift/work day AUTHORIZED USE: is authorized for business communications. It is intended to replace communications that previously may have been handled by phone calls. This includes scheduling requests for information and responses to requests for information Reasonable personal use of by members is permitted, but such use should not interfere or conflict with business use. Members should exercise good judgment regarding the reasonableness of personal use UNAUTHORIZED USE: is not to be used for certain personal and business matters PROHIBITED PERSONAL USE: includes, but is not limited to: Solicitation Charitable requests Membership drives Political & Religious causes Pornography Electronic Communications Protocol Page 6 of 10

7 Anything in violation of State Statute(s) Any other causes or matters unrelated as directed by the Chief of Police or his/her designee PROHIBITED BUSINESS USE: includes, but is not limited to: Sharing of sensitive or confidential information (i.e., evaluations, counseling statements, and personnel information); Communications that establish Policy and Procedures or guidelines; Communications intended to formalize or perpetuate knowledge; Communication certifying a transaction or intended to serve as a receipt; No shall contain any language that is obscene, suggestive messages; offensive, graphical images, (except where authorized) or contains racial, religious, ethnic, or sexual slurs; Illegal activities; Threats, harassment, intimidation, slander, or defamation; Political endorsements; Commercial activities or solicitations; Chain letters; Misrepresenting one s identity while using except in bona fide undercover investigations Intercepting, disrupting, or altering electronic communications; The use of electronic mail system to compromise the integrity of the Police Department by spreading rumors or gossip; The use of the electronic mail system for moonlighting, job searches, or the advertisement of personal business outside the realm of approved Department Bulletin Board Systems; and Sensitive or confidential information. USE OF BLOGS*, WEB POSTINGS, CHAT ROOMS A blog (short for web-log) is a personal online journal that is frequently updated and intended for general public consumption. Blogs are defined by their format: a series of entries posted to a single page in reverse-chronological order. Blogs generally represent the personality of the author or reflect the purpose of the Website that hosts the blog. Topics sometimes include brief philosophical musings, commentary on Internet and other social issues, and links to other sites the author favors, especially those that support a point being made on a post As an employee of the New Smyrna Beach Police Department, the use and application of good judgment, decency and common sense is expected both on and off duty This expectation also applies while engaged in various computer activities both on and off duty Participation in World Wide Web/internet services such as Web postings, blogs, chat rooms, dating services, etc., should be carefully considered for proper personal conduct Employees are not to use, or cause/authorize to use, any official information, photographs, speech, or writings that identify them as a member of the New Smyrna Beach Police Department. Employees shall guard themselves accordingly and shall not participate in any conduct that is likely to have an adverse effect on the reputation of the New Smyrna Beach Police Department. RETENTION OF messages of a transitory nature as authorized by this Policy and Procedure, must be retained by any means that assures safe maintenance and public accessibility throughout the appropriate retention period in accordance with Florida State Statute TRANSITORY MESSAGES: Electronic and printed hard copy will be retained by the sender until obsolete, superseded, or administrative value is lost and may be deleted on a daily basis NON-TRANSITORY MESSAGES: The Copy of Record will be retained as per established Department of State retention guidelines either by printing and filing, maintaining an electronic copy or by storing on a disk medium until scheduled for disposal. Electronic Communications Protocol Page 7 of 10

8 Both the sender and receiver of will be responsible for meeting established retention requirements. INTERNET/INTRANET USE SPECIFIC PROVISIONS CFA (B) Internet access can provide significant business benefit for the New Smyrna Beach Police Department members. However, there is also significant legal, security, and productivity issues related to how the Internet is used. Because of the security, legal, and productivity issues, each Internet user within the Police Department network has the following responsibilities: Examples of such issues are viruses, spending significant work time on non-productive activities, breaches of data security, confidentiality, and intellectual property rights To be aware of the purpose and nature of any information contained in data files or correspondence and to not exchange information deemed personal or outside the scope of City business Under no circumstances should data ever be transported, which if intercepted, would place the city in violation of any law The content of anything exchanged via Internet access (regardless of its state of encryption) must be appropriate and consistent with Police Department policy, subject to the same restrictions as any other correspondence Any member receiving disk images or programs via the Internet must conduct a virus check on them before executing or distributing them Members granted access to any Internet connected resource shall use that access in a way, which is consistent with their job function, regardless of whether the access is off-hours, or on the member's time. It is the Police Department s policy that the provided resources are not to be used for private or nonofficial use The Internet shall not be used to send (upload) or receive (download) copyrighted materials, trade secrets, proprietary financial information, or similar materials without prior authorization from the Chief of Police or designee For investigative and intelligence purposes, specific authorized members may access Internet sites containing pornography Use of Internet resources provided by or through the Police Department may be subject to monitoring for security and/or network management reasons. Users of these services are therefore advised of this potential monitoring. POWER DATA MANAGEMENT SYSTEMS (DMS) POWER DMS: The New Smyrna Beach Police Department s document management software will be used to meet proof of distribution requirements (sign off sheets). The items distributed will be directives, policies and procedures, revisions, updates and reviews, training, and other information of importance. An event log is recorded from this system on individual employees MANDATORY DMS CHECK IN: All Department members must check, read and sign any documents sent through Power DMS. This shall be done at the beginning of each shift or workday. VOICE MAIL DESIGNATED WORK AREA TELEPHONES: Members of the Police Department have a 7-digit phone extension number that is assigned. This specific phone number is designated through the Department s voice mail system as an individual voice mail. Each member must check his/her individual voice mail and/or employee number at a minimum of once per shift/work day. Electronic Communications Protocol Page 8 of 10

9 CELL PHONES: Members authorized to have issued departmental cell phones shall be required to return all phone messages 30 minutes within receipt, unless otherwise authorized by the Divisional Commanding Officer EXIGENT CIRCUMSTANCES: All Departmental members must have access to a telephone, cell phone, or other facsimile and shall be required to call in, respond to, or return all phone calls received from the Department during a time that the member knows of, or should have known, that a threat of a natural and/or man-made disaster (or other unusual event) that can or will impact the safety or welfare of the citizens of the City of New Smyrna Beach. COMPLIANCE PROCEDURES All users of computers, telephones, or other like equipment owned, leased, purchased outright or through a grant process, by the New Smyrna Beach Police Department are to adhere to this policy and any related security safeguards The Information Technology Manager or designee shall conduct periodic inspections of the Department equipment to ensure compliance with this policy. VIOLATION PENALTIES Any violation of this directive, including but not limited to; failure to abide to check in procedures, misuse of , misuse intra/internet privileges, MCTs, or software/hardware requirements may result in disciplinary action Copyright laws do not preclude the imposition of liability for copyright infringements on governmental agencies and/or their staff. According to Title 17, United States Code, Section 101 et seq., the federal copyright act protects the interests of persons who have developed original works of authorship, including computer software. Illegal reproduction of software can be subject to civil damages and criminal penalties, including fines and imprisonment. LEGAL DISCLAIMER INTRANET The New Smyrna Beach Police Department disclaims all responsibility and accepts no liability (including negligence) for the consequences of any person acting, or refraining from acting, on any information prior to the receipt by those of subsequent written confirmation The following are samples of legal disclaimers, one of which shall be attached to all that is sent from or about the Police Department that is business in nature: ~~Mail is intended for work preparation purposes only. No legal definite promise. This document should only be read by those persons to whom it is addressed and it is not intended to be relied upon by any person without subsequent written confirmation of its contents. ~~Florida has a very broad public records law. Most written communications to or from government employees regarding government business are public records available to the public and media upon request. Your communications may, therefore, be subject to public disclosure. ~~This communication and any attachments may contain privileged information for the sole use of the designated recipients named above. Any unauthorized review; use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply and destroy all copies of the original message. ~~If you have received this message in error, please notify us immediately by telephone. Please also destroy and delete the message from your computer. New Smyrna Beach Police Department, 246 Industrial Park Avenue, New Smyrna Beach, Florida Any form of reproduction, dissemination, copying, disclosure, modification, distribution and/or publication of this e- mail is strictly prohibited. Electronic Communications Protocol Page 9 of 10

10 MB 9/00; LBA; 09/04Lba; 10/16/07lba ;05/23/2008lba/; 6/1/12wad APPROVED: Chief Ronald P. Pagano DATE: 06 / 26 /_12 Written Directive Electronic Communications Protocol Electronic Communications Protocol Page 10 of 10

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment. Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist

More information

Electronic Network Acceptable Use Policy

Electronic Network Acceptable Use Policy Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

Internet, , and Computer Usage Policy

Internet,  , and Computer Usage Policy Important disclaimer: The policy available on this page is only an example and is furnished merely as an illustration of its category. It is not meant to be taken and used without consultation with a licensed

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

POLICY BURLINGTON TOWNSHIP BOARD OF EDUCATION. PROGRAM 2361/page 1 of 8 Acceptable Use of Computer Network/Computers and Resources M

POLICY BURLINGTON TOWNSHIP BOARD OF EDUCATION. PROGRAM 2361/page 1 of 8 Acceptable Use of Computer Network/Computers and Resources M 2361/page 1 of 8 M 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The Board shall develop a technology plan that effectively uses electronic communication to advance and promote learning

More information

EMPLOYEE USE OF TECHNOLOGY AGREEMENT

EMPLOYEE USE OF TECHNOLOGY AGREEMENT 2000--ADMINISTRATION 2600--OFFICE TECHNOLOGY EMPLOYEE USE OF TECHNOLOGY AR 2620 Page 1 of 10 EMPLOYEE USE OF TECHNOLOGY AGREEMENT Revised: 4/01/02, 5/24/04, 2/10/10 Superintendent of Schools Page 2 of

More information

ELECTRONIC MAIL POLICY

ELECTRONIC MAIL POLICY m acta I. PURPOSE The Information Systems (IS) Department is responsible for development and maintenance of this policy. The Finance and Administration Division is responsible for publishing and distributing

More information

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,

More information

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources

More information

GENERAL ORDER PORT WASHINGTON POLICE DEPARTMENT

GENERAL ORDER PORT WASHINGTON POLICE DEPARTMENT GENERAL ORDER PORT WASHINGTON POLICE DEPARTMENT SUBJECT: DEPARTMENT INTERNET & EMAIL NUMBER: 1.10.1 ACCESS AND USE ISSUED: 3/31/09 SCOPE: All Police Personnel EFFECTIVE: 3/31/09 DISTRIBUTION: General Orders

More information

ACCEPTABLE USE OF HCHD INTERNET AND SYSTEM

ACCEPTABLE USE OF HCHD INTERNET AND  SYSTEM Page Number: 1 of 6 TITLE: PURPOSE: ACCEPTABLE USE OF HCHD INTERNET AND EMAIL SYSTEM To establish the guidelines for the use of the Harris County Hospital District s Internet and email system. POLICY STATEMENT:

More information

Acceptable Use Policy

Acceptable Use Policy IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations

More information

Springfield, Illinois Police Department

Springfield, Illinois Police Department Directive Number: ADM-46 01-084 Issue Date: 05/28/01 Distribution: C,E* Revision Dates: 06/01/01 Effective Date: 06/01/01 Related CALEA Standards: 82.1.7 References: CALEA Standards Manual Rescinds: ADM-46/01-015

More information

Communication and Usage of Internet and Policy

Communication and Usage of Internet and  Policy Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority

More information

Policies & Regulations

Policies & Regulations Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

Wireless Communication Device Policy Policy No September 2, Standard. Practice

Wireless Communication Device Policy Policy No September 2, Standard. Practice Standard This establishes the business need and use of cellular phones (hereinafter referred to as wireless communication devices ) as an effective means of conducting City of Richland business, and to

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program

More information

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems. BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.

More information

TITLE SOCIAL MEDIA AND COLLABORATION POLICY

TITLE SOCIAL MEDIA AND COLLABORATION POLICY DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the

More information

13. Acceptable Use Policy

13. Acceptable Use Policy 13. Acceptable Use Policy Purpose Indian River State College s intention for publishing an Acceptable Use Policy is to outline the acceptable use of computer equipment and services at Indian River State

More information

FERPA & Student Data Communication Systems

FERPA & Student Data Communication Systems FERPA & Student Data Ellevation is subject to the Family Educational Rights and Privacy Act (FERPA) as operating under the "school official" exception, wherein student directory and PII (Personal Identifying

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

300 Lena Drive Aurora, Ohio P: F: Page 1 of 5

300 Lena Drive Aurora, Ohio P: F: Page 1 of 5 Privacy MindStreams LLC respects the privacy of users who visit each of the sites within the MindStreams network. No effort is made to identify individuals without their knowledge. The following policies

More information

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance.

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance. Cell Phone Policy 1. Purpose: Establish a policy for cell phone use and compensation allowance. 2. Authority: The Clinton County Board of Commissioners. 3. Application: This Cell Phone Policy (the Policy)

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.

More information

LifeWays Operating Procedures

LifeWays Operating Procedures 07-02.08 EMAIL GUIDELINES AND REQUIREMENTS I. PURPOSE To define the security, privacy and professional standards and considerations regarding electronic mail communication. II. SCOPE This procedure covers

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

Healthfirst Website Privacy Policy

Healthfirst Website Privacy Policy Healthfirst Website Privacy Policy We value your relationship with us and have detailed our privacy objectives for our website below. Please be sure to read this notice as it covers the terms and conditions

More information

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier

More information

UCL Policy on Electronic Mail ( )

UCL Policy on Electronic Mail ( ) LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY Great Lakes Energy Connections, Inc. Truestream ACCEPTABLE USE POLICY Contents OVERVIEW... 2 INTRODUCTION... 2 VIOLATION OF THIS ACCEPTABLE USE POLICY... 2 PROHIBITED USES AND ACTIVITIES... 2 CUSTOMER

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech

More information

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope Jacksonville State University Acceptable Use Policy 1. Overview Information Technology s (IT) intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Jacksonville

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance. Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV

More information

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads) ADMINISTRATIVE POLICY NO. 13-01 ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads) I. POLICY ISSUANCE This policy provides uniform guidelines and policies on the issuance and return of

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

Magna5 reserves the right to make modifications to this policy at any time.

Magna5 reserves the right to make modifications to this policy at any time. INTERNET ACCEPTABLE USE POLICY This Acceptable Use Policy specifies the actions prohibited by Magna5 to users of the Magna5 Network or the networks of third-party providers. Magna5 reserves the right to

More information

IT ACCEPTABLE USE POLICY

IT ACCEPTABLE USE POLICY CIO Signature Approval & Date: IT ACCEPTABLE USE POLICY 1.0 PURPOSE The purpose of this policy is to define the acceptable and appropriate use of ModusLink s computing resources. This policy exists to

More information

BERKELEY COLLEGE Social Media Policy

BERKELEY COLLEGE Social Media Policy BERKELEY COLLEGE Social Media Policy Scope This policy applies to all use of social media by Berkeley College students, faculty and staff to represent or discuss matters concerning the College and/or members

More information

Commonwealth of Pennsylvania Governor's Office

Commonwealth of Pennsylvania Governor's Office Commonwealth of Pennsylvania Governor's Office Subject: Commonwealth of Pennsylvania Information Technology Acceptable Use Policy Number: 205.34 Amended Date: July 20, 2010 By Direction of: Naomi Wyatt,

More information

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

Internet,  , Social Networking, Mobile Device, and Electronic Communication Policy TABLE OF CONTENTS Internet, Email, Social Networking, Mobile Device, and... 2 Risks and Costs Associated with Email, Social Networking, Electronic Communication, and Mobile Devices... 2 Appropriate use

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington

More information

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010 INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

SUBJECT: Effective Date: Policy Number: Florida Public Records Act: Scope and

SUBJECT: Effective Date: Policy Number: Florida Public Records Act: Scope and SUBJECT: Effective Date: Policy Number: Florida Public Records Act: Scope and 2-100.4 1/14/2014 Compliance Supersedes: Page Of 2-100.3 1 6 Responsible Authority: Vice President and General Counsel DATE

More information

Information Security Incident Response and Reporting

Information Security Incident Response and Reporting Information Security Incident Response and Reporting Original Implementation: July 24, 2018 Last Revision: None This policy governs the actions required for reporting or responding to information security

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

Guest Wireless Policy

Guest Wireless Policy Effective: April 1, 2016 Last Revised: November 27, 2017 Responsible University Office: Information Technology Services Responsible University Administrator: Chief Information Officer Policy Contact: Deb

More information

RMU-IT-SEC-01 Acceptable Use Policy

RMU-IT-SEC-01 Acceptable Use Policy 1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities

More information

On-Officer Body Camera Program

On-Officer Body Camera Program 1 of 7 1. PURPOSE This order establishes the Mesa Police (MPD) operational and submission guidelines for the "On-Officer" Body Camera (OBC) Pilot, which will be implemented for one year ending October

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services. TERMS OF USE A. PLEASE READ THESE TERMS CAREFULLY. YOUR ACCESS TO AND USE OF THE SERVICES ARE SUBJECT TO THESE TERMS. IF YOU DISAGREE OR CANNOT FULLY COMPLY WITH THESE TERMS, DO NOT ATTEMPT TO ACCESS AND/OR

More information

Computer Use and File Sharing Policy

Computer Use and File Sharing Policy Computer Use and File Sharing Policy Williamson College recognizes the value of computer and other electronic resources to improve student learning and enhance the administration and operation of its school.

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Why is Cleveland Broadband providing this Policy to me? Cleveland Broadband s goal is to provide its customers with the best Internet service possible. In order to help accomplish

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY The purpose of this document is to communicate Clayton County Public Schools Board of Education policies to ensure efficient, effective, and safe use of all CCPS's digital resources.

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial Corporate Policy Information Systems Acceptable Use Document No: ISY-090-10 Effective Date: 2014-06-10 Page 1 of 5 Rev. No: 0 Issuing Policy: Information Systems Department Policy Originator: Erick Edstrom

More information

Freedom of Information and Protection of Privacy (FOIPOP)

Freedom of Information and Protection of Privacy (FOIPOP) Freedom of Information and Protection of Privacy (FOIPOP) No.: 6700 PR1 Policy Reference: 6700 Category: FOIPOP Department Responsible: Records Management and Privacy Current Approved Date: 2008 Sep 30

More information

Breckenridge Financial Supplies Website Use Policy

Breckenridge Financial Supplies Website Use Policy Breckenridge Financial Supplies Website Use Policy Revised January 2014 Thank You for visiting the Breckenridge Financial Supplies Website (the Website ) and reviewing our Online Website Use and Privacy

More information

SPRING-FORD AREA SCHOOL DISTRICT

SPRING-FORD AREA SCHOOL DISTRICT No. 801.1 SPRING-FORD AREA SCHOOL DISTRICT SECTION: TITLE: OPERATIONS ELECTRONIC RECORDS RETENTION ADOPTED: January 25, 2010 REVISED: October 24, 2011 801.1. ELECTRONIC RECORDS RETENTION 1. Purpose In

More information

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 3.63 REVISED TOTAL PAGES Dec. 30, 2007 8 Division Computer Systems Cross Reference: I. Definitions A. Executable File A program or file

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Department of Technology Policy Title: Information Technology Acceptable Use Policy Authority: Chief Information Officer Effective Date: January 1, 2017 Purpose: This policy outlines the acceptable use

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Cognizant Careers Portal Privacy Policy ( Policy )

Cognizant Careers Portal Privacy Policy ( Policy ) Cognizant Careers Portal Privacy Policy ( Policy ) Date: 22 March 2017 Introduction This Careers Portal Privacy Policy ("Policy") applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers

More information

Southington Public Schools

Southington Public Schools 3543 POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I.POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the retention, storage and destruction

More information

Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy )

Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy ) Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy ) Introduction This Policy applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers ("Site"), which

More information

You may contact The Translation Network by at You may also call The Translation Network at

You may contact The Translation Network by  at You may also call The Translation Network at The Translation Network Privacy Policy This is a privacy policy for The Translation Network Group Inc. The Translation Network has created this privacy statement in order to demonstrate its firm commitment

More information

THE CORPORATION OF THE CITY OF WINDSOR POLICY

THE CORPORATION OF THE CITY OF WINDSOR POLICY THE CORPORATION OF THE CITY OF WINDSOR POLICY Service Area: Office of the City Treasurer Policy #: Department: Information Technology Approval Date: September 18, 2017 Division: Approved By: CR 554/2017

More information

TELEPHONE AND MOBILE USE POLICY

TELEPHONE AND MOBILE USE POLICY TELEPHONE AND MOBILE USE POLICY Date first approved: 9 December 2016 Date of effect: 9 December Date last amended: (refer Version Control Table) Date of Next Review: December 2021 First Approved by: University

More information

PRIVACY 102 TRAINING FOR SUPERVISORS. PRIVACY ACT OF U.S.C.552a

PRIVACY 102 TRAINING FOR SUPERVISORS. PRIVACY ACT OF U.S.C.552a PRIVACY 102 TRAINING FOR SUPERVISORS PRIVACY ACT OF 1974 5 U.S.C.552a PRIVACY TOOL BOX WEB SITE: WWW.PRIVACY.NAVY.MIL Lists all approved Navy and Marine Corps Privacy Act systems of records DOD systems

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Effective: September 2, 2016 Purpose Montreat College is committed to protecting its employees, partners, and itself from illegal or damaging actions by individuals, either knowingly

More information

Page 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax

Page 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax 1. PURPOSE The Loss Prevention Foundation, ( the foundation, LPF, the examiner ) makes high-stakes retail loss prevention certification Exams publicly available for the purpose of earning certification

More information

Community Use Agreement

Community Use Agreement Community Use Agreement (revised 30 August 2017) This FileMaker Community Agreement ("Agreement") provides important information about your use of the FileMaker Community site (the Site ). IMPORTANT: IF

More information

Site Impact Policies for Website Use

Site Impact Policies for Website Use Site Impact Policies for Website Use Thank you for visiting the Site Impact website (the Website ). We have set up some ground rules to ensure protection of our rights and yours. Site Impact reserves the

More information

This Policy applies to all staff and other authorised users in St Therese School.

This Policy applies to all staff and other authorised users in St Therese School. St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way

More information

ORGANIZEFOR PETITION PLATFORM ColorOfChange MOVEMENT-BUILDING PARTNERSHIP PROGRAM TERMS OF SERVICE

ORGANIZEFOR PETITION PLATFORM ColorOfChange MOVEMENT-BUILDING PARTNERSHIP PROGRAM TERMS OF SERVICE ORGANIZEFOR PETITION PLATFORM ColorOfChange MOVEMENT-BUILDING PARTNERSHIP PROGRAM TERMS OF SERVICE These Terms of Service ( TOS ) apply to organizations that have applied for and been accepted to participate

More information

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018 ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:

More information

DRAFT. Amendment to Chapter 102 Taxation Article I In General, by adding a new Section titled Omitted Real Property Assessments.

DRAFT. Amendment to Chapter 102 Taxation Article I In General, by adding a new Section titled Omitted Real Property Assessments. ATTACHMENT #1 Regular LF&A Meeting of August 13, 2007 DRAFT Amendment to Chapter 102 Taxation Article I In General, by adding a new Section 102-4 titled Omitted Real Property Assessments. Sec. 102-4 Omitted

More information

Service Specific Terms & Conditions

Service Specific Terms & Conditions These Service Specific Terms and Conditions together with the General Terms and Conditions apply when We provide Service to You. You are deemed to have accepted these Service Specific Terms and Conditions

More information

PayThankYou LLC Privacy Policy

PayThankYou LLC Privacy Policy PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the

More information

Signature: Signed by GNT Date Signed: 5/26/2015

Signature: Signed by GNT Date Signed: 5/26/2015 Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date June 1, 2015 Mobile Video and Audio Recording Applicable To: All employees Approval Authority: Chief George N. Turner

More information

Computer, Communication, and Network Technology Acceptable Use

Computer, Communication, and Network Technology Acceptable Use Policy V. 2.10.2 Responsible Official: Dean of University Libraries and Chief Information Officer Effective Date: April 12, 2010 Computer, Communication, and Network Technology Acceptable Use Policy Statement

More information

Enterprise Income Verification (EIV) System User Access Authorization Form

Enterprise Income Verification (EIV) System User Access Authorization Form Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be

More information

NebraskaLink Acceptable Use Policy

NebraskaLink Acceptable Use Policy NebraskaLink Acceptable Use Policy Introduction This acceptable use policy (the "Policy") defines acceptable practices relating to the use of NebraskaLink's services (the "Service") by customers of NebraskaLink

More information

Horry County IT /GIS Policy Acce table Use Com uter S stems

Horry County IT /GIS Policy Acce table Use Com uter S stems HORRY COUNTY IT/GIS DEPARTMENT 1301 Second Avenue Conway, South Carolina 29526 www.horrycounty.org Post Office Box 296 Conway, South Carolina 29528-0296 Phone: (843) 915-5240 Fax: (843) 915-6240 Horry

More information