IT ACCEPTABLE USE POLICY

Size: px
Start display at page:

Download "IT ACCEPTABLE USE POLICY"

Transcription

1 CIO Signature Approval & Date: IT ACCEPTABLE USE POLICY 1.0 PURPOSE The purpose of this policy is to define the acceptable and appropriate use of ModusLink s computing resources. This policy exists to protect the information assets and systems of ModusLink from potential harm arising from risks such as virus attacks or a compromise of its network systems and services. ModusLink s intentions for implementing such a policy are not to impose restrictions that are contrary to: Statutory laws Ability to conduct business Established culture of openness, trust and integrity ModusLink is committed to protecting its employees, customers and itself from the illegal or damaging activities carried out by individuals either knowingly or unknowingly. 2.0 SCOPE This policy applies to all full-time, part-time, temporary employees, contractors and other agents that work at ModusLink. This policy also applies to all computing resources, including: Computer equipment, peripheral devices and software that is owned, leased or licensed by ModusLink Computer equipment that is owned by a third party when it is connected to the company s systems Logical access accounts Company provided access to the Internet Company telecommunication systems and devices Originator: Art Sebastiano Page 1 of 8

2 In addition, ModusLink has implemented related HR policies as follows: Code of conduct Company facilities Policy inspections and searches Security in the workplace Employee use of , Internet and voic usage Please refer to the ModusLink Employee Handbook for additional information about these policies. 3.0 RESPONSIBILITIES The Vice-President of Global IT Infrastructure is responsible to address inquiries, revise and ensure compliance with this policy. It is the responsibility of all employees (full-time, part-time temporary, contractors and other agents of ModusLink) to understand and abide by this policy. It is the responsibility of all employees (full-time, part-time temporary, contractors and other agents of ModusLink) to report any suspected violation of this policy to their manager. Management is responsible to escalate any reported violations of this policy to appropriate Senior IT Management as well as HR, Legal and/or law enforcement officials based on the nature and severity of the violation. Senior IT Management is responsible to assist in the communication and implementation of this policy. Senior IT Management, HR and Legal are responsible for escalating and/or investigating and resolving any violations of this policy that have been reported to them. 4.0 DEFINITIONS Acceptable Use: Any company sanctioned use of or access to the computing resources of ModusLink including computer equipment, peripheral devices, software, network devices, applications and data. Originator: Art Sebastiano Page 2 of 8

3 5.0 POLICY Use of Computer Equipment, Peripheral Devices and Software Company provided computer equipment; peripheral devices and software shall be used for the express purpose of conducting business on behalf of ModusLink and its subsidiaries. Limited personal use of such computer equipment, peripheral devices and software is permitted provided that such use: Is reasonable; Is not done in the conduct of non-company business or other commercial enterprise; Does not negatively impact the functionality and availability of the company s computer systems, enterprise and application systems and network services; Does not hinder other employees or third party workers from performing their job functions. Employees and third parties who work for ModusLink must: Ensure that company provided computer equipment is used properly and maintained; Be accountable for all use and the security of the electronic resources provided to them by the company, including but not limited to computer accounts, passwords, personal computers, electronic data and network access; Make appropriate use of the software, system and network provided protection features and take precautions against others obtaining access to their computer resources; Not use company provided software and electronic materials in accordance with copyright and licensing restrictions and applicable company policies; Not use company networks, equipment and software to violate copyrights or the terms of any license agreements; May not inspect, modify, distribute, or copy proprietary data, directories, programs, files, disks or software owned or licensed to the company without proper authorization; Originator: Art Sebastiano Page 3 of 8

4 Install upon any company owned computer equipment any copyrighted software for which the company or the user does not have an active user license; Use a company owned computing asset to actively engage in procuring or transmitting material that is in violation of the company sexual harassment or hostile workplace policies as well as laws in the user s local jurisdiction. Furthermore, employees shall not: Violate the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including but not limited to, the installation or distribution of pirated or other software products that are not appropriately licensed for the use by ModusLink or its subsidiaries; Digitize, distribute or otherwise copy material, including photographs, books and music, that is protected by copyright without proper authorization; Export software, technical information, encryption software or technology in violation of international or regional export control laws. 5.1 Use of Logical Access Accounts Employees and third parties who work for the company must: Use only the computer accounts that have been assigned to them and shall not attempt to impersonate the identities of others; Safeguard the security of the accounts and passwords assigned to them; Never allow another individual to use their account and password to access company systems; Never share account passwords; Not supply false or misleading data nor improperly obtain another person s password in order to gain access to computers or network systems, data or information; The unintentional negligence of another person in revealing an account name or password is not considered authorization of use. Use company accounts to make fraudulent offers of products, items or services; Attempt to subvert the restrictions associated with their computer accounts or network access. Originator: Art Sebastiano Page 4 of 8

5 5.2 Accessing Company Network Devices and Applications Employees and third parties who work for the company shall access the company s systems using only company approved methods. Employees and third parties who work for the company must not: Make unauthorized attempts to modify company systems, network devices, applications and data; Effect security breaches which includes but is not limited to: Accessing data of which the employee or third party is not an intended recipient; Log onto a server or account the employee or third party worker is not authorized to access; Attempt to temporarily or permanently disrupt routine operation of systems, or modify or extend network resources. This includes, but is not limited to: Tampering with any hardware, networks, applications, system files or other user s files without authorization or permission; Circumventing or altering protections, user authentications or other restrictions placed on computers, networks, software, applications, accounts or files (other than their own files); Implementing network sniffing, pinged floods, packet spoofing, denial of service and forged routing information; Makes resources available to circumvent or alter software protections or other restrictions placed on computers, networks, applications or files (other than their own); Encroach on another s use of computer resources; including but not limited to: Using any program/script/command or sending messages of any kind for the purpose of interfering with or disabling a user s terminal session; Tying up computer and network resources for downloading or piracy or music, movies, non-business related software or other files, or other trivial and non-company related applications; Sending harassing messages; Originator: Art Sebastiano Page 5 of 8

6 Sending frivolous or excessive messages, including chain letters, junk mail, spam, and other types of broadcast messages, either locally or over the Internet; Using excessive amounts of storage; Launching attacks or probes, or otherwise attempting to subvert the security of any company system, network or application; Intentionally or irresponsibly introducing any computer viruses, worms, Trojan Horses, spy ware, or other rogue programs to company hardware, applications, software, systems or networks; Physically damage computer devices with malicious intent; Execute any form of network monitoring that intercepts data not intended for their host, unless this activity is part of their normal job function. 5.3 Privacy and Ownership While respecting a reasonable level of confidentiality and privacy, all data created and stored within the company s systems remains the property of ModusLink. Because of the need to protect the company s networks and systems, ModusLink does not guarantee the confidentiality of information stored on any of its network devices other than the data that falls within the scope of numerous privacy laws such as Safe Harbor and HIPPA. ModusLink reserves the right to monitor and audit all company owned and operated computer systems and electronic/digital resources at will to ensure compliance with this policy. Additionally, ModusLink guarantees that its wide and local area networks are configured to protect corporate data and its flow from the malicious intent of individuals or entities attempting to disrupt the business operations of the company and/or corrupt its data. ModusLink takes the following steps to enforce its policies: Relating to harassment and the safety of individuals; Preventing unauthorized reproduction of distribution of proprietary technology assets; Safeguarding the integrity of its computers, networks and data; Protecting the company against potentially damaging consequences (upon termination of a user s relationship with ModusLink, the company may find it necessary to examine such resources). ModusLink may restrict the use of its computers and network systems for electronic communications when faced with evidence of a violation of its policies, or federal and/or local laws. ModusLink must comply with, and respond to all Originator: Art Sebastiano Page 6 of 8

7 validly issued legal process, including subpoenas. ModusLink also reserves the right to limit access to its networks through company owned or other computers, and to remove or limit access to material posted or distributed on company owned computers. Originator: Art Sebastiano Page 7 of 8

8 DOCUMENT HISTORY ORIGINATED BY: PRINTED NAME TITLE SIGNATURE/DATE Art Sebastiano VP Global IT Infrastructure PROCESS OWNER: PRINTED NAME TITLE SIGNATURE/DATE Art Sebastiano VP Global IT Infrastructure REVISION HISTORY: Revision Section Changed Summary of Change Effective Date A New Document Originator: Art Sebastiano Page 8 of 8

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope Jacksonville State University Acceptable Use Policy 1. Overview Information Technology s (IT) intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Jacksonville

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

Guest Wireless Policy

Guest Wireless Policy Effective: April 1, 2016 Last Revised: November 27, 2017 Responsible University Office: Information Technology Services Responsible University Administrator: Chief Information Officer Policy Contact: Deb

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech

More information

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial Corporate Policy Information Systems Acceptable Use Document No: ISY-090-10 Effective Date: 2014-06-10 Page 1 of 5 Rev. No: 0 Issuing Policy: Information Systems Department Policy Originator: Erick Edstrom

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Effective: September 2, 2016 Purpose Montreat College is committed to protecting its employees, partners, and itself from illegal or damaging actions by individuals, either knowingly

More information

State of New Mexico Public School Facilities Authority Information Technology (IT) Acceptable Use Policy

State of New Mexico Public School Facilities Authority Information Technology (IT) Acceptable Use Policy State of New Mexico Public School Facilities Authority Information Technology (IT) Acceptable Use Policy Public School Facilities Authority, IT Acceptable Use Policy 1 State of NM Public School Facilities

More information

Horry County IT /GIS Policy Acce table Use Com uter S stems

Horry County IT /GIS Policy Acce table Use Com uter S stems HORRY COUNTY IT/GIS DEPARTMENT 1301 Second Avenue Conway, South Carolina 29526 www.horrycounty.org Post Office Box 296 Conway, South Carolina 29528-0296 Phone: (843) 915-5240 Fax: (843) 915-6240 Horry

More information

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems. BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.

More information

Smeal College of Business - Central Firewall Rules and Policies

Smeal College of Business - Central Firewall Rules and Policies Smeal College of Business - Central Firewall Rules and Policies 1.0 Purpose The purpose of this policy is to outline the College s use and management of centralized firewall services. This policy will

More information

Security Awareness Company Policies and Processes. For Biscuitville, Inc. with operations in North Carolina and Virginia

Security Awareness Company Policies and Processes. For Biscuitville, Inc. with operations in North Carolina and Virginia Security Awareness Company Policies and Processes For Biscuitville, Inc. with operations in North Carolina and Virginia Issued on 11/22/2013 Updated on 06/17/2015 Table of Contents 1 COMPANY POLICIES AND

More information

APPLICATION TO OPEN PORTS THROUGH THE FIREWALL

APPLICATION TO OPEN PORTS THROUGH THE FIREWALL P: +61 2 9231 3644 E: admin@ccl.com.au W: www.ccl.com.au A.B.N. 72 000 111 Level 1 Selborne Chambers 174 Phillip Street Sydney NSW 2000 APPLICATION TO OPEN PORTS THROUGH THE FIREWALL Only outbound data

More information

13. Acceptable Use Policy

13. Acceptable Use Policy 13. Acceptable Use Policy Purpose Indian River State College s intention for publishing an Acceptable Use Policy is to outline the acceptable use of computer equipment and services at Indian River State

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Department of Technology Policy Title: Information Technology Acceptable Use Policy Authority: Chief Information Officer Effective Date: January 1, 2017 Purpose: This policy outlines the acceptable use

More information

Information Security Management System ISO/IEC 27001:2013

Information Security Management System ISO/IEC 27001:2013 Information Security Management System ISO/IEC 27001:2013 OF ICT FACILITIES PENGGUNAAN KEMUDAHAN ICT For PTM Use Only Date: 7 th June Written By: Junnaini Ismun Pengerusi Jawatankuasa ISMS Verified By:

More information

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) All customers should read this document. You are responsible for the policy written here, and your account WILL BE DISABLED WITHOUT WARNING

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

Synchrotron Light Source Australia Pty Ltd

Synchrotron Light Source Australia Pty Ltd Document no: 22670 Revision no: 2.0 Date: 11 August 2014 Synchrotron Light Source Australia Pty Ltd ABN 18 159 468 256 ACN 159 468 256 www.synchrotron.org.au 800 Blackburn Road, CLAYTON, VIC, 3168 p +613

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Why is Cleveland Broadband providing this Policy to me? Cleveland Broadband s goal is to provide its customers with the best Internet service possible. In order to help accomplish

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

NebraskaLink Acceptable Use Policy

NebraskaLink Acceptable Use Policy NebraskaLink Acceptable Use Policy Introduction This acceptable use policy (the "Policy") defines acceptable practices relating to the use of NebraskaLink's services (the "Service") by customers of NebraskaLink

More information

PTLGateway Acceptable Use Policy

PTLGateway Acceptable Use Policy 1 PTLGateway Acceptable Use Policy Last Updated Date: 02 March 2018 Acceptable Use Policy Your use of our Services must fall within our Acceptable Usage Policy. Contents Key details... 1 COVERAGE OF THIS

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Jackson Energy Authority 731.422.7500 INTRODUCTION Jackson Energy Authority ( JEA ) has formulated this Acceptable Use Policy ( AUP ), in order to set forth terms regarding the responsible

More information

AIS Acceptable Use and Information Security Procedures

AIS Acceptable Use and Information Security Procedures AIS Acceptable Use and Information Security Procedures Administrative Information Services a unit of Information Technology Services April 2016 Mark Zimmerman AIS Information Security Officer The Pennsylvania

More information

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services. TERMS OF USE A. PLEASE READ THESE TERMS CAREFULLY. YOUR ACCESS TO AND USE OF THE SERVICES ARE SUBJECT TO THESE TERMS. IF YOU DISAGREE OR CANNOT FULLY COMPLY WITH THESE TERMS, DO NOT ATTEMPT TO ACCESS AND/OR

More information

: Acceptable Use Policy

: Acceptable Use Policy : Acceptable Use Policy This Acceptable Use Policy ("Policy") describes the proper and prohibited use of 's Hosting services ("Services") as subscribed to per the Master Service Agreement. This Policy

More information

Page 1 of 5. Policy Number Policy Title

Page 1 of 5. Policy Number Policy Title Policy Number 701.000 Policy Title IT ACCEPTABLE USE POLICY Responsible Officers IT Director Responsible Offices Corporate Information Technology Services Summary CIU s intentions for publishing an Acceptable

More information

Draft. Policies of Colorado State University University Policy. Category: Information Technology

Draft. Policies of Colorado State University University Policy. Category: Information Technology Policies of Colorado State University University Policy Policy Title: Acceptable Use for Computing and Networking Resources Category: Information Technology Owner: Vice President for Information Technology

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY RESOURCES POLICY

APPROPRIATE USE OF INFORMATION TECHNOLOGY RESOURCES POLICY APPROPRIATE USE OF INFORMATION TECHNOLOGY RESOURCES POLICY Effective Date: 08/01/2014 1. Policy North American University's (NAU) Appropriate Use of Information Technology Resources policy provides for

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

300 Lena Drive Aurora, Ohio P: F: Page 1 of 5

300 Lena Drive Aurora, Ohio P: F: Page 1 of 5 Privacy MindStreams LLC respects the privacy of users who visit each of the sites within the MindStreams network. No effort is made to identify individuals without their knowledge. The following policies

More information

Legal notice and Privacy policy

Legal notice and Privacy policy Legal notice and Privacy policy We appreciate your interest in us. Below you will find information of legal relevance when visiting this website. In addition, you will find our Privacy Policy, which explains

More information

Midstate Telephone & Midstate Communications. Acceptable Use Policy

Midstate Telephone & Midstate Communications. Acceptable Use Policy Midstate Telephone & Midstate Communications Acceptable Use Policy Introduction Midstate is at all times committed to complying with the laws and regulations governing use of the Internet, e-mail transmission

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY Introduction Failure to comply with this Acceptable Use Policy will result in the immediate suspension or termination of the Service, in accordance with the respective supply conditions.

More information

ACCEPTABLE USE POLICIES FOR INFORMATION SERVICES COMPUTING RESOURCES

ACCEPTABLE USE POLICIES FOR INFORMATION SERVICES COMPUTING RESOURCES ACCEPTABLE USE POLICIES FOR INFORMATION SERVICES COMPUTING RESOURCES Information Security Team DePaul University 1 East Jackson Boulevard Chicago, Illinois 60604 US https:/infosec.depaul.edu/ 13th December

More information

Electronic Network Acceptable Use Policy

Electronic Network Acceptable Use Policy Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s

More information

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY Wyandotte Municipal Services may modify this Acceptable Use Policy at any time without notifying its users. For this reason, Wyandotte Services High Speed

More information

Information technology security and system integrity policy.

Information technology security and system integrity policy. 3359-11-10.3 Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values

More information

Service Specific Terms & Conditions

Service Specific Terms & Conditions These Service Specific Terms and Conditions together with the General Terms and Conditions apply when We provide Service to You. You are deemed to have accepted these Service Specific Terms and Conditions

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY Great Lakes Energy Connections, Inc. Truestream ACCEPTABLE USE POLICY Contents OVERVIEW... 2 INTRODUCTION... 2 VIOLATION OF THIS ACCEPTABLE USE POLICY... 2 PROHIBITED USES AND ACTIVITIES... 2 CUSTOMER

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications

More information

You may contact The Translation Network by at You may also call The Translation Network at

You may contact The Translation Network by  at You may also call The Translation Network at The Translation Network Privacy Policy This is a privacy policy for The Translation Network Group Inc. The Translation Network has created this privacy statement in order to demonstrate its firm commitment

More information

Acceptable Usage Policy

Acceptable Usage Policy High Quality Web Hosting Acceptable Usage Policy Serventus Inc. (www.serventus.com) Content Introduction... 2 Prohibited Content... 3 Users Security Obligation... 3 Network Abuse... 3 Intellectual Property

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

Acceptable Use Policy. Effective January 2017

Acceptable Use Policy. Effective January 2017 Acceptable Use Policy Effective January 2017 THIS ACCEPTABLE USE POLICY IS A MATERIAL PART OF ANY AGREEMENT WITH STRAIGHTUPNET COMMUNICATIONS FOR PROVISION OF ITS SERVICES TO BUSINESS AND CONSUMER CUSTOMERS.

More information

NUCONNECT INTERNET ACCEPTABLE USE POLICY

NUCONNECT INTERNET ACCEPTABLE USE POLICY NUCONNECT INTERNET ACCEPTABLE USE POLICY This Acceptable Use Policy ( AUP ) applies to NUconnect Internet and related services ("Services ) delivered by Newport Utilities. This policy is designed to encourage

More information

PTLGateway Data Breach Policy

PTLGateway Data Breach Policy 1 PTLGateway Data Breach Policy Last Updated Date: 02 March 2018 Data Breach Policy This page informs you of our policy which is to establish the goals and the vision for the breach response process. This

More information

Acceptable Use Policy for EWC HousingNet Internet Service Customers

Acceptable Use Policy for EWC HousingNet Internet Service Customers Acceptable Use Policy for EWC HousingNet Internet Service Customers 1. INTRODUCTION AND COVERAGE General This Acceptable Use Policy (AUP) governs the use of the EWC HousingNet resources and is in place

More information

Net Worth Strategies, Inc. Data Security and Privacy Policies Handbook

Net Worth Strategies, Inc. Data Security and Privacy Policies Handbook Net Worth Strategies, Inc. Data Security and Privacy Policies Handbook August 2, 2017 NWSI IT Security Policies and Procedures Purpose: This document outlines the policies and practices of Net Worth Strategies,

More information

The University of Tennessee. Information Technology Policy (ITP) Preamble

The University of Tennessee. Information Technology Policy (ITP) Preamble Preamble The policy for Use of Information Technology Resources at the University of Tennessee (UT) (Section 135, Part 01, of UT s Fiscal Policy Manual) regulates use of the University's information technology

More information

NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY

NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY Student Email Use page 1 NEW POLICY SUMMARY: This policy governs the use of email for students. Students do not have an expectation for privacy in their A&T emails. Appropriate and inappropriate uses are

More information

PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC

PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC APPROVAL AUTHORITY: President, CHSi GARY G. PALMER /s/ OPR: Director, Information Security NUMBER: ISSUED: VERSION: APRIL 2015 2 THOMAS P. DELAINE JR. /s/ 1.0

More information

FreedomNet Solutions Acceptable Use Policy ( )

FreedomNet Solutions Acceptable Use Policy ( ) FreedomNet Solutions Acceptable Use Policy (02.10.2017) This Acceptable Use Policy ( Acceptable Use ) is a guide to the tolerable use of Member accounts and the Services provided by FreedomNet Solutions.

More information

Acceptable Use Policy

Acceptable Use Policy 1 INTRODUCTION and its subsidiaries ( us, we or our ) have produced this acceptable use policy in order to: Give you a better understanding of what is and is not acceptable when using the internet Encourage

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Introduction and Scope General: This Acceptable Use Policy ( AUP ) sets forth acceptable practices relating to the use of the Crown Castle entities (collectively, Crown Castle ) Internet

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

GhostFiber Acceptable Use Policy

GhostFiber Acceptable Use Policy GhostFiber Acceptable Use Policy Blue Sky Satellite & Theater Services LLC, dba Blue Sky Satellite, dba GhostFiber provides a variety of Internet Services (GhostFiber ) to both residential and business

More information

PROFESSIONAL NETWORK SERVICES ACCEPTABLE USE POLICY ( AUP )

PROFESSIONAL NETWORK SERVICES ACCEPTABLE USE POLICY ( AUP ) PROFESSIONAL NETWORK SERVICES ACCEPTABLE USE POLICY ( AUP ) This Acceptable Use Policy ( AUP ) identifies restrictions on the use by Service Provider and its End- Users of the Services provided by Professional

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

Acceptable Use Policies

Acceptable Use Policies 1. Background Acceptable Use Policies From time to time Luminet may impose reasonable rules and regulations regarding the use of its services. Such rules and regulations are called Acceptable Use Policies

More information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security

More information

Acceptable Use Policy Updated 1/16/2018

Acceptable Use Policy Updated 1/16/2018 Acceptable Use Policy Updated 1/16/2018 THIS ACCEPTABLE USE POLICY ( AUP OR POLICY ) IS A MATERIAL PART OF ANY AGREEMENT WITH AIRLINK INTERNET SERVICES, LLC ( AIRLINK ) FOR ACCESS TO AND PROVISION OF BROADBAND

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

IT SERVICES ICT Usage & Security Policy

IT SERVICES ICT Usage & Security Policy IT SERVICES ICT Usage & Security Policy Section 1 : POLICY STATEMENT 1. All Information and Communications Technology (ICT) facilities and resources of the INTI International College Subang ( College )

More information

PURPOSE: To establish policies and procedures for the use of University-owned and -operated information technology resources.

PURPOSE: To establish policies and procedures for the use of University-owned and -operated information technology resources. MERCER UNIVERSITY SECTION: Policies and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY ACCESS AND USE POLICY EFFECTIVE: January 1, 2004 PURPOSE: To establish policies and procedures for the use of University-owned

More information

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment. Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist

More information

1 Privacy Statement INDEX

1 Privacy Statement INDEX INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related

More information

UCLan-Wireless for Apple iphone

UCLan-Wireless for Apple iphone Please note: You must read the Wireless Network Fair Usage and Security Policy at the end of this guide. This ensures that you are aware of all the rules regarding Wireless services and prevent your internet

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources

More information

The AUP applies to all Snowball products and services but is in particular applicable to internet services.

The AUP applies to all Snowball products and services but is in particular applicable to internet services. ACCEPTABLE USAGE POLICY Introduction Snowball is committed to complying with legislation and ensuring all its Customers have the ability to use its network and the Internet without interference or harassment

More information

Security Policies and Procedures Principles and Practices

Security Policies and Procedures Principles and Practices Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability

More information

Communication and Usage of Internet and Policy

Communication and Usage of Internet and  Policy Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority

More information

Terms and Conditions

Terms and Conditions 1. ACCEPTANCE OF TERMS Terms and Conditions ASME Human Powered Vehicle (HPVC) Challenge is open to all ME/Multidisciplinary Engineering and Technology undergraduate students, subject to the following Terms

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

Records Management and Retention

Records Management and Retention Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors

More information

Breckenridge Financial Supplies Website Use Policy

Breckenridge Financial Supplies Website Use Policy Breckenridge Financial Supplies Website Use Policy Revised January 2014 Thank You for visiting the Breckenridge Financial Supplies Website (the Website ) and reviewing our Online Website Use and Privacy

More information

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ).

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ). ACCEPTABLE USE POLICY (AUP) 1. SERVICE AGREEMENT 3W INFRA and CUSTOMER have executed a Service Agreement (the Agreement ). The Parties agree that the terms and conditions of the Agreement govern this document.

More information

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment; USAGE POLICIES Any terms in capitals not defined in these Usage Policies will have the same meaning as in your Contract. These Usage Policies apply to you and anybody you allow to use NOW Broadband and

More information

Privacy Policy. I. How your information is used. Registration and account information. March 3,

Privacy Policy. I. How your information is used. Registration and account information. March 3, Privacy Policy This Privacy Policy describes how and when we collect, use and share your information across our App. When using our App you consent to the collection, transfer, storage, disclosure, and

More information

eduroam for Android Devices

eduroam for Android Devices Please note: You must read the Wireless Network Fair Usage and Security Policy at the end of this guide. This ensures that you are aware of all the rules regarding Wireless services and prevent your internet

More information

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Seven Requirements for Successfully Implementing Information Security Policies and Standards Seven Requirements for Successfully Implementing and Standards A guide for executives Stan Stahl, Ph.D., President, Citadel Information Group Kimberly A. Pease, CISSP, Vice President, Citadel Information

More information

Magna5 reserves the right to make modifications to this policy at any time.

Magna5 reserves the right to make modifications to this policy at any time. INTERNET ACCEPTABLE USE POLICY This Acceptable Use Policy specifies the actions prohibited by Magna5 to users of the Magna5 Network or the networks of third-party providers. Magna5 reserves the right to

More information

Bloom Broadband Acceptable Use Policy

Bloom Broadband Acceptable Use Policy Acceptable Use Policy for Bloom Internet Service Bloom s goal is to provide its customers with the best residential cable Internet service possible. In order to accomplish this, Bloom has adopted this

More information

MON-CRE TELEPHONE COOPERATIVE, INC. ACCEPTABLE USE POLICY

MON-CRE TELEPHONE COOPERATIVE, INC. ACCEPTABLE USE POLICY MON-CRE TELEPHONE COOPERATIVE, INC. ACCEPTABLE USE POLICY By ordering and using Internet services (the Service ) from Mon-Cre Telephone Cooperative, Inc. ( Mon-Cre ) you agree to abide by this Acceptable

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

Acceptable use policy for SLT idc services(ver 1.2)

Acceptable use policy for SLT idc services(ver 1.2) Acceptable use policy for SLT idc services(ver 1.2) Important Note: SLT shall revise this Acceptable Use policy from time to time without notice by posting a new version of this document on the SLT idc

More information