UCA Management Policy and Guidelines

Size: px
Start display at page:

Download "UCA Management Policy and Guidelines"

Transcription

1 UCA Management Policy and Guidelines Policy This policy applies to use of any system installed on a University computer. The policy applies primarily to the use of the University s ucreative domain, but covers the use of other tools that may be accessed using University computers. 1. Ucreative 1.1 The ucreative domain is the only domain that will be used for formal communications; the University does not allow the use of alternative addresses for the purpose of official business. 2. Acceptable use and management of 2.1 Electronic mail ( ) is an integral part of the University's internal and external communication strategy and all staff have a responsibility to conform to its acceptable use. Staff also have a responsibility to be aware of the requirements of the Data Protection Act (DPA) and the Freedom of Information Act (FoIA) in relation to the use of ; guidance is also available in the University s Information Security Policy and Information Handling Policy. Adherence to these policies and guidelines will ensure both effective communication and legal compliance. 2.2 All staff should manage electronic messages effectively to expedite business communications, reduce paperwork and automate routine office tasks. It is the responsibility of staff to manage the creation, retention, and disposition of sent and received s properly, including: Passing on messages for action and information to other staff as appropriate Acting on as appropriate Deleting and attachments as soon as they are no longer needed for reference in the system 2.3 The system should not be used for record keeping. All extant s are discoverable under FoI. For long term accessibility, s and their attachments should be stored on an appropriate network drive or other more lasting medium. 2.4 Sensitive personal data must not be communicated by unless express permission of the subject has been obtained or adequate encryption facilities are employed. The inclusion of personal data (including name and contact details) in an is deemed to be processing personal data within the terms of the DPA and the provisions of the Act apply. It is the responsibility of staff to ensure that they are familiar with the University's Data Protection Policy which can be found on the staff portal document store in the Data Protection folder. 2.5 PCs must not be left in an insecure state that would allow a third party to inspect or data and gain access to personal information. 2.6 Personal comments about identifiable people should not be made in s. The laws applying to defamation apply to s, which are considered a form of publication. It is the effect of the communication rather than the intention of the sender that applies in cases of harassment. Title: UCA Policy Page 1 of 6

2 2.7 The University system must not be used to create or distribute unsolicited, offensive or unwanted s, including disseminating chain letters messages that reflect badly on the University or could expose it to legal liability must not be sent. s sent by a member of staff are equivalent to sending a letter on University headed notepaper and an equivalent level of care should be exercised. 2.9 Extreme care should be taken when downloading material from the internet or opening external s if there is any suspicion that it might include a virus. If there is any doubt, the attachment should not be opened and the IT Helpdesk should be contacted immediately Personal should be kept to a minimum and not stored in the folders. The University computers must not be used for storing large personal media files. 3. Monitoring of 3.1 Monitoring of staff would constitute invasion of privacy unless it can be justified within a defined legitimate business purpose. The IT Services Department keeps records to monitor traffic flow and system usage but does not inspect the individual user data or content of e- mails unless the conditions of the Regulation of Investigatory Powers Act 2000 are met. Examples of when s could be inspected include: 4. Sanctions To ensure the system s security and effective operation: eg a virus or large scale blanket threatens the functioning of the entire system or is likely to delete or corrupt user data To establish the existence of facts relevant to the University: eg where there is a prima facie suspicion that the University s telecommunications facilities have been misused or that the regulations governing the use of have been contravened. To prevent or detect crime, including fraud or the infringement of IT related legislation such as the Computer Misuse Act 1990 By using the University s IT facilities, staff accept the University regulations and policies pertaining to their use. The University has a legal responsibility to ensure that its employees act within the law by enforcing these regulations. Breach of the regulations constitutes a serious disciplinary offence. Title: UCA Policy Page 2 of 6

3 Guidelines 5. Confidentiality, Data Protection Act (DPA) and Freedom of Information Act (FoIA) 5.1 is not a confidential medium and messages can be easily read by those for whom they were not intended. They can be intercepted, legally or otherwise; wrongly addressed; forwarded accidentally or to third parties without your knowledge; viewed accidentally on the recipient s screen. Think carefully what you write and whether is an appropriate medium for your message. 5.2 All UCA staff should be aware of the requirements of the Data Protection Act. The UCA Policy and Guidance can be found in the Data Protection folder of the document store on the staff portal. The DPA applies to and it is an area where special care should be exercised because allows communication with large numbers of people almost instantaneously. However, it is not necessarily a temporary media and can be traced if UCA is legally required to do so. Therefore be aware that when contains personal data, as a general rule you should not store it or forward it without the data subject s knowledge and consent. Use student identifier numbers rather than names whenever possible. 5.3 Items within the deleted items box would have to be surrendered in a data access request. Empty the deleted items box regularly (In Outlook, this can be set up so that it empties each time you close down go to Tools, Options, Others, General and tick the relevant box) 5.4 The University s DPA registration recognises and permits the core business uses of data staff administration, marketing, public relations, advertising. Further information on allowable data processing within UCA can be found in the DPA registration section of the Information Commissioner s website ( quoting the UCA reference number Z This gives the details of the University s DPA notification. If you are intending to include data within an for any other purpose, you must first consult the University s Data Protection Officer (Marion Wilks, University Secretary). 5.5 Guidelines on the University s Freedom of Information Policy can be found in the FoI section of the document store on the staff portal. s can be required in response to an FOI request. Title: UCA Policy Page 3 of 6

4 6. Managing 6.1 Familiarise yourself with the options available under tools to help you manage and organise your use of . This is where you can switch message alerts on or off, set the spell check, set up automatic archiving, and set whether or not you want replies to include the incoming message. Decide whether you want to keep open at all times or whether to check it regularly you do not have to go along with the assumption that you are constantly on line and will respond instantly. should be seen as transient and not the only means of communications can a situation be dealt with via a simple telephone call? 6.2 Mailbox Size Restrictions It is not good practice to keep a large number of s in your Mailbox folders. Move or delete s from the inbox as soon as they have been actioned. Remember that s in your inbox and folders can be subject to disclosure under Freedom of Information. Sort e- mail by date, sender or subject depending on your business need folders s which need to be kept for longer after they have been actioned, while they are active and still likely to be needed regularly when you use , may be transferred to folders set up to reflect activities or projects according to your business needs. Remember whilst e- mails remain in the system, which is password protected, they cannot be accessed by anyone else and cannot be part of the official records of the University BUT are still discoverable under Freedom of Information and Data Protection activities. 6.3 Personal folders (pst extension) Personal folders are stored on the computer where they were created and so are not accessible remotely but can each accommodate up to 2GB. Good practice is to set one up each year. To set one up, go to My Computer and double click onto the C drive. Then go to File, New, Folder. Name the new folder personal folders. Then from Outlook, go to File, New, Outlook Data File. In the resulting window, select Outlook Personal Folders File (pst) and click OK. Browse to the folder you created on the C drive and change the file name to your user name and the academic or calendar year, whichever suits your needs. (eg fbloggs0607 or fbloggs2006). Click OK and customise the.pst file as you wish it to appear in your folder list (eg 0607 or ). 6.4 Archiving Archiving can automate the transfer of messages to personal folders, removing them from your inbox storage limit. Archive folders mirror the structure of the inbox and transfers from individual folders or the whole mailbox can be manual or set up to occur automatically at a chosen frequency. 6.5 Use the Outlook on-line helpsheets: two useful links are Origin=RC and RC These can also be accessed directly from the staff portal document store/learning and development folder/it training notes/ user guides 7.0 Out of Office Title: UCA Policy Page 4 of 6

5 All staff must set an Out of Office message that gives alternative contact details. This is important under Freedom of Information so that any requests for information will be responded to within the 20 working day time limitations of the Act. If you are going to be out of contact for more than three weeks, if possible set delegate Read rights for a colleague to check your as well. Be aware that the Out of Office message is not sent to external mailboxes as this could pose a threat to individual security by communicating when individuals are on leave (and likely to be away from their home also). 8. Sending 8.1 Think before using whether a phone call, calendar software or face-to-face meeting might be more appropriate and efficient. 8.2 Also s should be sent in plain text format *not* html format. 8.3 Use Linotype Univers 330 Light 12 fonts in black for text and font size 11 in black for signatures or Ariel 10 in black. Don t use CAPITALS which have the same effect as shouting. Do not use stationery backgrounds on s. 8.4 Generally speaking internal should be short messages requesting action or comment, or passing on information via shortcuts; attachments; or links to websites or to the document store on the staff portal. Significant documents such as policies, procedures, minutes etc should be Word documents. This type of record will be saved in the appropriate shared drive while in draft by the person responsible for drafting or be in the document store. 8.5 There is a 10Megabyte limit on the size of attachments that can be sent attachments are a corporate resource and as such should not be stored in individuals where they are inaccessible, take up extra space and raise the possibility of different drafts being used rather than the latest draft. Send a link to the current document in the document store, where appropriate, rather than sending the document as an attachment, (see digital records management guidance in the DPA section of the document store on the staff portal regarding retaining copies of documents that are in the document store). 8.7 To ensure your is dealt with appropriately, promptly and effectively by recipients: Make sure the title tells the recipient about the subject of the and try not to have more than one topic in an Use markers and other tools to show the importance of the (high, normal, low priority) Use indicators and dates maybe in the subject line or at the beginning of the to show whether the is for information or action by a specific date Make clear whether action is expected by recipients and CC recipients. Where there are several addressees, make certain it is clear who is required to do what. Never send an e- mail that requires one action to be taken to a group of people without explaining who you expect to act on it Keep attachments to a minimum, especially when sending to a group of people use links wherever possible If you send an attachment, indicate to the recipient whether you will be keeping the attachment as the master record Limit recipients to those who need to know use reply to sender rather than the reply all function unless absolutely necessary 8.8 Long cc lists can unwittingly transfer personal data under the terms of the DPA so should be avoided whenever possible, especially on external s. Use the bcc function instead: you cannot assume that all your copyists want to share their addresses. Title: UCA Policy Page 5 of 6

6 8.9 Thank you s fill your sent items box and the recipient s in-box so should not be sent routinely. You can set up a message delivery acknowledgement if you need to know the message has been received or read Do not use the all staff function without prior approval from your Head of Department or College. There are smaller, more focused, distribution lists in the global address book. Users should build their own distribution lists in outlook or compatible application Add the standard signature and disclaimer to all outgoing s as below 9. Receiving Your name Your job title University for the Creative Arts Your campus address Tel: +44(0) your switchboard s number Direct: +44(0)your number yourusername@ucreative.ac.uk Web: One of Europe s leading arts and design institutions, the University for the Creative Arts builds on a proud tradition of creative arts education spanning 150 years. Our campuses at Canterbury, Epsom, Farnham, Maidstone and Rochester are home to more than 6,000 students from 76 countries studying on courses in fashion, graphics, design, media, fine art and architecture. Help save paper - do you need to print this ? The views expressed in this are those of the author and not necessarily those of the University. This message may contain confidential information and will be protected by copyright. If you receive it in error please notify us, delete it and do not make use of it, or copy it. Any reply may be read by the recipient to whom you send it and others within the University. Although we aim to use efficient virus checking procedures, the University accepts no liability for viruses and recipients should use their own virus checking procedures. 9.1 If you find yourself on an circulation list that is not useful for you, politely request to be removed 9.2 Do not keep listserve messages: all listserves maintain an archive which you can consult if necessary. 9.3 If you receive jokes, chain s, or other circulars by , delete them and do not forward them either internally or externally. 9.4 Do not open any attachments unless you are sure of its content 10. Accessing remotely 10.1 The easiest way to access your from any computer is via the ucreative website ( and follow the links to the staff or student portal. This will give you the web-based version of Outlook which has most, but not all, of the functionality of the networked version. Title: UCA Policy Page 6 of 6

UCL Policy on Electronic Mail ( )

UCL Policy on Electronic Mail ( ) LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD

More information

Acceptable Use Policy

Acceptable Use Policy IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations

More information

Auckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual ELECTRONIC MAIL

Auckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual ELECTRONIC MAIL Auckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual Overview Purpose Electronic mail (email) is a business communication tool within ADHB and this policy outlines use of email

More information

IT Appropriate Use - Best Practice for Guidelines. Section 1 - Purpose / Objectives. Section 2 - Scope / Application. Section 3 - Definitions

IT Appropriate Use - Best Practice for  Guidelines. Section 1 - Purpose / Objectives. Section 2 - Scope / Application. Section 3 - Definitions IT Appropriate Use - Best Practice for Email Guidelines Section 1 - Purpose / Objectives (1) Email is used at Victoria University as a business communication tool and users are obliged to use this tool

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

Policy General Policy GP20

Policy General Policy GP20 Email Policy General Policy GP20 Applies to All employees Committee for Approval Quality and Governance Committee Date of Approval September 2012 Review Date June 2014 Name of Lead Manager Head of Technology

More information

Communication and Usage of Internet and Policy

Communication and Usage of Internet and  Policy Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority

More information

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010 INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig

More information

Guide to your Northumbria Student

Guide to your Northumbria Student Guide to your Northumbria Student Email The Student Email System at Northumbria provides 25GB of space for all students. How to access On Campus: Access email from the Start menu on the Student Desktop

More information

Freedom of Information and Protection of Privacy (FOIPOP)

Freedom of Information and Protection of Privacy (FOIPOP) Freedom of Information and Protection of Privacy (FOIPOP) No.: 6700 PR1 Policy Reference: 6700 Category: FOIPOP Department Responsible: Records Management and Privacy Current Approved Date: 2008 Sep 30

More information

HGC SUPERHUB HOSTED EXCHANGE

HGC SUPERHUB HOSTED EXCHANGE HGC SUPERHUB HOSTED EXCHANGE EMAIL OUTLOOK WEB APP (OWA) 2010 USER GUIDE V2013.6 HGC Superhub Hosted Email OWA User Guide @ 2014 HGC. All right reserved. Table of Contents 1. Get Started... 4 1.1 Log into

More information

19 Dec The forwarding and returning obligation does not concern messages containing malware or spam.

19 Dec The forwarding and returning obligation does not concern messages containing malware or spam. E-mail rules 1/5 E-mail rules These e-mail rules concern all users of the university's e-mail systems. The parts aimed at university staff members concern all of the University's units, their employees

More information

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2 NWQ Capital Management Pty Ltd Privacy Policy March 2017 Page 1 of 8 Privacy and Spam Policy NWQ Capital Management Pty Ltd s Commitment NWQ Capital Management Pty Ltd (NWQ) is committed to providing you

More information

LifeWays Operating Procedures

LifeWays Operating Procedures 07-02.08 EMAIL GUIDELINES AND REQUIREMENTS I. PURPOSE To define the security, privacy and professional standards and considerations regarding electronic mail communication. II. SCOPE This procedure covers

More information

SECTION 5 USING STUDENT

SECTION 5 USING STUDENT SECTION 5 USING STUDENT EMAIL 5. USING STUDENT EMAIL On enrolling at the University all students automatically have an email account created. Account creation depends on a student successfully enrolling

More information

CliniSys Website Privacy Policy

CliniSys Website Privacy Policy CliniSys Website Privacy Policy Version 1.0 Document Information Prepared for: Users of the CliniSys Website Prepared by: CliniSys Solutions Limited Date: 13 February 2018 Contact Details: Matthew Fouracre,

More information

Use of and Instant Messaging (IM) Policy

Use of  and Instant Messaging (IM) Policy Use of Email and Instant Messaging (IM) Policy Name of Author and Job Title: Mike Cavaye, IT & Digital Consultant Name of Review/Development Body: IT Services Ratification Body: Quality and Safety Group

More information

Management: A Guide For Harvard Administrators

Management: A Guide For Harvard Administrators E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered

More information

Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd

Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd Our Commitment Ten Tigers Grain Marketing Pty Ltd and Ten Tigers Pty Ltd are committed to providing you with the highest levels of client service.

More information

DECISION. 25 June The attached Procedures for managing s are hereby adopted. The Procedures enter into force immediately.

DECISION. 25 June The attached Procedures for managing  s are hereby adopted. The Procedures enter into force immediately. UPPSALA UNIVERSITY Box 256 SE-751 05 Uppsala DECISION 25 June 2018 UFV 2018/1239 1 (1) Handling matter: Per Abrahamsson Telephone: 018-471 17 10 Procedures for managing emails The attached Procedures for

More information

POLICY AND GUIDELINES ON THE USE OF ELECTRONIC MAIL ( )

POLICY AND GUIDELINES ON THE USE OF ELECTRONIC MAIL ( ) POLICY AND GUIDELINES ON THE USE OF ELECTRONIC MAIL (EMAIL) Lead Directorate and Service: Effective Date: November 2016 Contact Officer/Number: Corporate Resources / Human Resources HR Advice Centre/391221

More information

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,

More information

Acceptable Usage Policy (Student)

Acceptable Usage Policy (Student) Acceptable Usage Policy (Student) Author Arthur Bogacki Date 18/10/2017 Version 1.1 (content sourced and consolidated from existing Email and Electronic Communication, and User Code of Practice policies.)

More information

Organising your inbox

Organising your inbox Outlook 2010 Tips Table of Contents Organising your inbox... 1 Categories... 1 Applying a Category to an E-mail... 1 Customising Categories... 1 Quick Steps... 2 Default Quick Steps... 2 To configure or

More information

Cognizant Careers Portal Privacy Policy ( Policy )

Cognizant Careers Portal Privacy Policy ( Policy ) Cognizant Careers Portal Privacy Policy ( Policy ) Date: 22 March 2017 Introduction This Careers Portal Privacy Policy ("Policy") applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE 1. General The term PPS refers to: Professional Provident Society Holdings Trust, (The Holding Trust); Professional

More information

Table of Contents. 3. Changing your Lotus Notes Password, page Choosing your Letterhead and Signature, page 6

Table of Contents. 3. Changing your Lotus Notes Password, page Choosing your Letterhead and Signature, page 6 Table of Contents 1. Logging onto Lotus Notes, page 3 2. Logging out of Lotus Notes, page 3 3. Changing your Lotus Notes Password, page 4 4. Navigating in Lotus Notes, page 5 5. Choosing your Letterhead

More information

EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE

EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE Exchange 2003 Version Revised September 2005 TABLE OF CONTENTS WHAT S NEW IN OWA 2003?...2 General...2 Inbox and Message Composition...2 Tasks...2 INTRODUCTION

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Usage Policy Document Number: OIL-IS-POL-EU

Usage Policy Document Number: OIL-IS-POL-EU Email Usage Policy Document Number: OIL-IS-POL-EU Document Details Title Email Usage Policy Description Acceptable usage of emails by users Version 1.0 Author Information Security Manager Classification

More information

Privacy Policy Inhouse Manager Ltd

Privacy Policy Inhouse Manager Ltd Privacy Policy Inhouse Manager Ltd April 2018 This privacy statement is designed to tell you about our practices regarding the collection, use and disclosure of information held by Inhouse Manager Ltd.

More information

Policies & Regulations

Policies & Regulations Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

Grand Avenue Primary and Nursery School ICT Data management. Contents

Grand Avenue Primary and Nursery School ICT Data management. Contents Grand Avenue Primary and Nursery School ICT Data management Contents 1. Acceptable Use Statement 2. Transfer and Offsite Use of Sensitive Data 3. E-safety 4. Declaration Introduction These three policy

More information

Data Protection. Policy

Data Protection. Policy Data Protection Policy Policy adopted: April 2016 Policy review date: April 2018 OAT Model Policy 1 Contents 1. Policy statement and principles... 3 1.1 Policy aims and principles... 3 1.2 Data protection

More information

PTLGateway Acceptable Use Policy

PTLGateway Acceptable Use Policy 1 PTLGateway Acceptable Use Policy Last Updated Date: 02 March 2018 Acceptable Use Policy Your use of our Services must fall within our Acceptable Usage Policy. Contents Key details... 1 COVERAGE OF THIS

More information

Privacy Policy. MIPS Website Privacy Policy. Document Information. Contact Details. Version 1.0 Version date March 2018.

Privacy Policy. MIPS Website Privacy Policy. Document Information. Contact Details. Version 1.0 Version date March 2018. Privacy Policy MIPS Website Privacy Policy Version 1.0 Version date March 2018 Document Information Prepared for Users of MIPS websites Prepared by MIPS NV Date 27/02/2018 Contact Details Joffrey WILLEM

More information

Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy )

Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy ) Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy ) Introduction This Policy applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers ("Site"), which

More information

WEBSITE PRIVACY POLICY

WEBSITE PRIVACY POLICY WEBSITE PRIVACY POLICY INTRODUCTION Welcome to the Octopus Group s privacy policy ( Privacy Policy ) Octopus Group respects your privacy and is committed doing the right thing when it comes to protecting

More information

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected. I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

BISHOP GROSSETESTE UNIVERSITY. Document Administration. This policy applies to staff, students, and relevant data subjects

BISHOP GROSSETESTE UNIVERSITY. Document Administration. This policy applies to staff, students, and relevant data subjects BISHOP GROSSETESTE UNIVERSITY Document Administration Document Title: Document Category: Privacy Policy Policy Version Number: 1.0 Status: Reason for development: Scope: Author / developer: Owner Approved

More information

Records Management and Retention

Records Management and Retention Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions After having undertaken a period of research within recreational cricket, this document is aimed at addressing the frequently asked questions from cricket Clubs, Leagues, Boards

More information

ELECTRONIC MAIL POLICY

ELECTRONIC MAIL POLICY m acta I. PURPOSE The Information Systems (IS) Department is responsible for development and maintenance of this policy. The Finance and Administration Division is responsible for publishing and distributing

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Along the top of the Inbox is a toolbar with icons for commonly used functions within .

Along the top of the Inbox is a toolbar with icons for commonly used functions within  . Outlook Inbox Once you log on to Outlook on the Web, the default page is your Outlook Inbox. For detailed information about logging into your account see: Getting Started - Logging On. The Inbox Viewer

More information

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers; 65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment

More information

UCSU Student and Applicant Data Privacy Statement

UCSU Student and Applicant Data Privacy Statement UCSU Student and Applicant Data Privacy Statement Version number: 1.0 Policy Owner: Data Protection Officer Last Revised: May 2018 Review Date: July 2018 This document is to be reviewed biannually (January

More information

DISCLAIMERS The legal and practical issues White Paper

DISCLAIMERS The legal and practical issues White Paper EMAIL DISCLAIMERS The legal and practical issues White Paper INTRODUCTION Email is an essential business tool that not many companies can do without. However, after several high profile lawsuits with multi-million

More information

This factsheet intends to provide guidance on how you can manage your s. You will discover:

This factsheet intends to provide guidance on how you can manage your  s. You will discover: Summary This factsheet intends to provide guidance on how you can manage your emails. You will discover: Why it is important to manage your emails Guidance for approaching email management How to identify

More information

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database Making the UK more resilient against Cybercrime Date: August 2017 Reference: 0449-CYB This Red Alert is issued by the United Kingdom

More information

Using Outlook Live

Using Outlook Live EMAIL Using Outlook Live Contents: What is?... 3 Using... 3 Address... 3 Password... 3 The Windows Live Hotmail Welcome Screen... 5 Online Notification Status... 6 Help... 6 Inbox... 7 The Mail Inbox Toolbar...

More information

A Homeopath Registered Homeopath

A Homeopath Registered Homeopath A Homeopath Registered Homeopath DATA PROTECTION POLICY Scope of the policy This policy applies to the work of homeopath A Homeopath (hereafter referred to as AH ). The policy sets out the requirements

More information

Roche Directive on the Use of Roche Electronic Communication Tools

Roche Directive on the Use of Roche Electronic Communication Tools Group Legal Roche Directive on the Use of Roche Electronic Communication Tools Version 1.2, 21 February 2012 Name: Roche Directive on the Use of Roche Electronic Communication Tools Version No: 1.2 Date:

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

IACA Discussion List. About the IACA Discussion List. Guidelines, use and subscription management

IACA Discussion List. About the IACA Discussion List. Guidelines, use and subscription management IACA Discussion List Guidelines, use and subscription management About the IACA Discussion List The IACA discussion list (IACA List) is a free resource for all active IACA members. This resource allows

More information

ACCEPTABLE USE OF INFORMATION SYSTEMS

ACCEPTABLE USE OF INFORMATION SYSTEMS Manual/Section: Administrative Manual/Information Services Key Words: Policy No.153 1. PURPOSE: 1.1 Use of Information Systems is an essential means for doing business at the Children s Hospital of Eastern

More information

Learning Management System - Privacy Policy

Learning Management System - Privacy Policy We recognize that visitors to our Learning Management System (LMS) may be concerned about what happens to information they provide when they make use of the system. We also recognize that education and

More information

Electronic Communications with Citizens Guidance (Updated 5 January 2015)

Electronic Communications with Citizens Guidance (Updated 5 January 2015) Electronic Communications with Citizens Guidance (Updated 5 January 2015) Overview - Email Activities Outside Of The Scope Of The Policy And This Guidance Requests To Use Email/SMS Outside The Scope Of

More information

IBM Notes Client V9.0.1 Reference Guide

IBM Notes Client V9.0.1 Reference Guide IBM Notes Client V9.0.1 Reference Guide Revised 05/20/2016 1 Accessing the IBM Notes Client IBM Notes Client V9.0.1 Reference Guide From your desktop, double-click the IBM Notes icon. Logging in to the

More information

MANAGING YOUR MAILBOX SIZE - OUTLOOK 2010

MANAGING YOUR MAILBOX SIZE - OUTLOOK 2010 MANAGING YOUR MAILBOX SIZE - OUTLOOK 2010 Each staff member within the University is allocated 1GB of storage space within their email accounts. When your mailbox gets to around 800MB you will be sent

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Getting Started The Outlook Web Access Window

Getting Started The Outlook Web Access Window QUICK Source Microsoft Outlook Web Access in Exchange Server 2003 Getting Started The Outlook Web Access Window ❶ ❷ ❸ ❹ ❺ ❻ ❼ ❽ Using the Reading Pane The Reading Pane allows you to view your e-mail messages

More information

Using web-based

Using web-based Using web-based Email 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes it to a sorting office

More information

DATA PROTECTION LAWS OF THE WORLD. Bahrain

DATA PROTECTION LAWS OF THE WORLD. Bahrain DATA PROTECTION LAWS OF THE WORLD Bahrain Downloaded: 7 April 2018 BAHRAIN Last modified 25 January 2017 LAW There is currently no standalone data protection law in Bahrain. A draft is being reviewed before

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

WIT Diverse Campus Services Ltd. Data Protection Policy

WIT Diverse Campus Services Ltd. Data Protection Policy WIT Diverse Campus Services Ltd. Data Protection Policy Introduction WIT Diverse Campus Services Limited and/or its associated companies ( us or we ) have created this privacy statement to demonstrate

More information

IACA Discussion List Guidelines, Use and Subscription Management

IACA Discussion List Guidelines, Use and Subscription Management IACA Discussion List Guidelines, Use and Subscription Management Instructions... 2 Posting Guidelines... 2 Managing your Subscription... 3 Frequently Asked Questions... 4 I sent a request to iacalist@iaca.net

More information

PRIVACY POLICY. 1. Introduction

PRIVACY POLICY. 1. Introduction PRIVACY POLICY 1. Introduction 1.1. The Pinewood Studios Group is committed to protecting and respecting your privacy. This privacy policy (together with our Website Terms of Use and Cookies Policy) (Privacy

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

MY VOIC ON-LINE

MY VOIC ON-LINE Learning and Development Department of Human Resources and Employee Relations MY VOICEMAIL ON-LINE (CALL10) Microcomputer Training Centre Microcomputer Training Centre 2007 TABLE OF CONTENTS Welcome to

More information

POLICY BURLINGTON TOWNSHIP BOARD OF EDUCATION. PROGRAM 2361/page 1 of 8 Acceptable Use of Computer Network/Computers and Resources M

POLICY BURLINGTON TOWNSHIP BOARD OF EDUCATION. PROGRAM 2361/page 1 of 8 Acceptable Use of Computer Network/Computers and Resources M 2361/page 1 of 8 M 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The Board shall develop a technology plan that effectively uses electronic communication to advance and promote learning

More information

E RADAR. All Rights Reserved. Acceptable Use Policy

E RADAR. All Rights Reserved.  Acceptable Use Policy Email Acceptable Use Policy For further help, please contact support@eradar.eu Item Number LD 0002 Author E RADAR LIMITED Disclaimer This template is provided with the understanding that the publisher

More information

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12 ELECTRONIC MAIL RAYMOND ROSE Computer Technology Department 2011/12 ELECTRONIC COMMUNICATION Systems for exchanging information and news were the first applications developed for network communication.

More information

ISC10D026. Report Control Information

ISC10D026. Report Control Information ISC10D026 Report Control Information Title: General Information Security Date: 28 January 2011 Version: v3.08 Reference: ICT/GISP/DRAFT/3.08 Authors: Steve Mosley Quality Assurance: ISSC Revision Date

More information

Office365 End User Training & Self-Service Migration Manual Simplified

Office365 End User Training & Self-Service Migration Manual Simplified Office365 End User Training & Self-Service Migration Manual Simplified Version 1.0 University Systems and Security 5/25/2016 1 P a g e Table of Contents 2 P a g e Table of Contents Introduction to Office365...

More information

Element Finance Solutions Ltd Data Protection Policy

Element Finance Solutions Ltd Data Protection Policy Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

School Mail System. - Access through Outlook Web Access. User Guide FOR. Education Bureau (EDB)

School Mail System. - Access through Outlook Web Access. User Guide FOR. Education Bureau (EDB) School Mail System - Access through Outlook Web Access User Guide FOR Education Bureau (EDB) Version: 1.1 February 2008 The Government of the Hong Kong Special Administrative Region The contents of this

More information

Islam21c.com Data Protection and Privacy Policy

Islam21c.com Data Protection and Privacy Policy Islam21c.com Data Protection and Privacy Policy Purpose of this policy The purpose of this policy is to communicate to staff, volunteers, donors, non-donors, supporters and clients of Islam21c the approach

More information

Brazosport Independent School District Employee/Agent Acceptable Use Agreement For Internet/Network Access and Use

Brazosport Independent School District Employee/Agent Acceptable Use Agreement For Internet/Network Access and  Use Brazosport Independent School District Employee/Agent Acceptable Use Agreement For Internet/Network Access and Email Use Please read this agreement carefully. Sign and date the last page and return to

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established

More information

MS Word MS Outlook Level 1

MS Word MS Outlook Level 1 MS Word 2007 MS Outlook 2013 Level 1 Table of Contents MS Outlook 2013... 1 Outlook 2013 Interface... 1 The Ribbon in Outlook 2013... 2 Sneak a Peek... 2 Pin a Peek... 3 Managing the Size of the Outlook

More information

EA-ISP-009 Use of Computers Policy

EA-ISP-009 Use of Computers Policy Technology & Information Services EA-ISP-009 Use of Computers Policy Owner: Nick Sharratt Author: Paul Ferrier Date: 28/03/2018 Document Security Level: PUBLIC Document Version: 1.05 Document Ref: EA-ISP-009

More information

UNIVERSITY OF WOLLONGONG MICROSOFT OUTLOOK

UNIVERSITY OF WOLLONGONG MICROSOFT OUTLOOK UNIVERSITY OF WOLLONGONG MICROSOFT OUTLOOK 2007 EMAIL Table of Contents INTRODUCTION... 2 WHAT S NEW... 2 MOBILE DEVICES... 2 OVERVIEW OF OUTLOOK... 3 NAVIGATION PANE... 3 VIEWING MAIL... 4 READING PANE...

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Computer Use and File Sharing Policy

Computer Use and File Sharing Policy Computer Use and File Sharing Policy Williamson College recognizes the value of computer and other electronic resources to improve student learning and enhance the administration and operation of its school.

More information

Supersedes Policy previously approved by TBM

Supersedes  Policy previously approved by TBM Document Title: Email Policy Pages Document Type: Policy 6 No. Of Scope: Government of Newfoundland and Labrador (GNL) Trim # DOC15481/2009 Revision ( # ) 27 Treasury Board Approval ( # ) TBM2009-298 Supersedes

More information

Acceptable Use of Policy

Acceptable Use of  Policy Acceptable Use of email Policy Printed copies must not be considered the definitive version DOCUMENT CONTROL POLICY NO. 82 Policy Group: Author: Reviewer: Information Assurance and Security Andrew Turner

More information

These instructions can be found on the MCCSC web site Under Outlook Web Access on the lower right, click on Overview of OWA.

These instructions can be found on the MCCSC web site  Under Outlook Web Access on the lower right, click on Overview of OWA. E-Mail: OUTLOOK WEB ACCESS (OWA). Your email address is: username@mccsc.edu These instructions can be found on the MCCSC web site www.mccsc.edu. Under Outlook Web Access on the lower right, click on Overview

More information

Contributed by Djingov, Gouginski, Kyutchukov & Velichkov

Contributed by Djingov, Gouginski, Kyutchukov & Velichkov Contributed by Djingov, Gouginski, Kyutchukov & Velichkov General I Data Protection Laws National Legislation General data protection laws The Personal Data Protection Act implemented the Data Protection

More information

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

Student Network, Computing & Software Usage Regulations Version th July 2006

Student Network, Computing & Software Usage Regulations Version th July 2006 Student Network, Computing & Software Usage Regulations Version 1.0 6 th July 2006 Copyright 2006 Institute of Technology, Sligo, Ireland. 1 1.1 General Computing Facilities Computing facilities provided

More information