E RADAR. All Rights Reserved. Acceptable Use Policy
|
|
- Jerome Conley
- 6 years ago
- Views:
Transcription
1 Acceptable Use Policy
2 For further help, please contact Item Number LD 0002 Author E RADAR LIMITED Disclaimer This template is provided with the understanding that the publisher is not in the business of rendering legal or professional advice. Always consult with an appropriate professional before using the documents on this website. The publisher does not verify the accuracy or copyright ownership of documents that have been uploaded by third party contributors. Licence Attribution E RADAR licenses you to use this legal template for business and private purposes. This license lets you distribute, remix, tweak, and build upon our work, even commercially, as long as you credit us for the original creation. More about copyright licences Further information A selection of legal templates are available from E RADAR and our business partners. Visit the E RADAR website at for further information.
3 Overview A written Use Policy and the procedures behind it are designed to protect both employers and workers from any legal liabilities arising from the use of at work. These might include employees opening attachments from an un recognised which might contain a virus, or making racist and sexist comments via . As an employer, you will also need to set out the boundaries between using for work and private purposes. Another issue to consider is to ensure that employees who are not authorised to do so are making agreements via . You ll also need to make sure that employees don t breach intellectual property laws or data protection by sending protected copyright images or personal data. The Use Policy must make it clear that disciplinary action can be taken if workers fail to comply with its requirements. You should also ensure that any agreements with third party contractors and consultants carry the same message. Please cut and paste the highlighted text below into your own document and insert the relevant information where indicated.
4 Acceptable Use Policy Use of by employees of [Insert Business Name] is permitted and encouraged where such use supports the goals and objectives of the business. However, [Insert Business Name] has a policy for the use of whereby the employee must ensure that they: comply with current legislation use in an acceptable way do not create unnecessary business risk to the company by their misuse of the Internet Unacceptable behaviour use of company communications systems to set up personal businesses or send chain letters forwarding of company confidential messages to external locations distributing, disseminating or storing images, text or materials that might be considered indecent, pornographic, obscene or illegal distributing, disseminating or storing images, text or materials that might be considered discriminatory, offensive or abusive, in that the context is a personal attack, sexist or racist, or might be considered as harassment accessing copyrighted information in a way that violates the copyright breaking into the company s or another organisation s system or unauthorised use of a password/mailbox broadcasting unsolicited personal views on social, political, religious or other non business related matters transmitting unsolicited commercial or advertising material undertaking deliberate activities that waste staff effort or networked resources introducing any form of computer virus or malware into the corporate network Monitoring [Insert Business Name] accepts that the use of is a valuable business tool. However, misuse of this facility can have a negative impact upon employee productivity and the reputation of the business. In addition, all of the company s resources are provided for business purposes. Therefore, the company maintains the right to examine any systems and inspect any data recorded in those systems. In order to ensure compliance with this policy, the company also reserves the right to use monitoring software in order to check upon the use and content of s. Such monitoring is for legitimate purposes only and will be undertaken
5 in accordance with a procedure agreed with employees. Sanctions Where it is believed that an employee has failed to comply with this policy, they will face the company's disciplinary procedure. If the employee is found to have breached the policy, they will face a disciplinary penalty ranging from a verbal warning to dismissal. The actual penalty applied will depend on factors such as the seriousness of the breach and the employee's disciplinary record. Note: [These procedures will be specific to your business. They should reflect your normal operational and disciplinary processes. You should establish them from the outset and include them in your acceptable use policy.] Agreement All company employees, contractors or temporary staff who have been granted the right to use the company s system are required to sign this agreement confirming their understanding and acceptance of this policy. Updated April 2014 Price 10
The John Fisher School ICT Policy
The John Fisher School ICT Policy Responsible: Governors Resources Committee Review Date: May 2018 The need for a policy All The John Fisher School s information communication technology (ICT) facilities
More informationCommunication and Usage of Internet and Policy
Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority
More informationACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010
INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig
More informationAcceptable Use Policy
IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations
More informationInternet, , and Computer Usage Policy
Important disclaimer: The policy available on this page is only an example and is furnished merely as an illustration of its category. It is not meant to be taken and used without consultation with a licensed
More informationThis Policy applies to all staff and other authorised users in St Therese School.
St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way
More informationAcceptable Use Policy (AUP)
Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet
More informationREGULATION BOARD OF EDUCATION FRANKLIN BOROUGH
R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources
More informationREPORTING INFORMATION SECURITY INCIDENTS
INFORMATION SECURITY POLICY REPORTING INFORMATION SECURITY INCIDENTS ISO 27002 13.1.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-13.1.1 Version No: 1.0 Date: 1 st
More informationEffective security is a team effort involving the participation and support of everyone who handles Company information and information systems.
BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.
More informationICT User Policy. for use in Essa Academy Essa Primary Academy Essa Nursery and Support Services
ICT User Policy for use in Essa Academy Essa Primary Academy Essa Nursery and Support Services For approval and adoption by the Board of Directors- 7 July 2017 For adoption by Essa Academy LGB- 19 September
More informationAcceptable Use Policy
Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech
More informationLEGAL ASPECTS OF SOCIAL MEDIA
LEGAL ASPECTS OF SOCIAL MEDIA Notes prepared for a talk to the Internet Specialist Group and the Law Specialist Group of the BCS on Monday 15 December 2014 by Jeremy Holt of Clark Holt, Commercial Solicitors
More informationAcceptable Use Policy
Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.
More informationICT Acceptable Use Policy (AUP)
ICT Acceptable Use Policy (AUP) ICT AUP v 5.1 DRAFT Page 1 of 14 Version Control Version Revision Date Author (s) Distributed Notes 1.2 Issued 02/02/2000 1.3 Issued 05/02/2010 Judy Wyld/Jon Shepherd/Vicki
More informationIT Acceptable Use Policy - Users
South Gloucestershire and Stroud Academy Trust (SGSAT) IT Acceptable Use Policy - Users If you would like this document in an alternate format Please contact the SGS-GS Human Resources Department Prepared
More informationAcceptable Use Policy
Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable
More informationComputer Use and File Sharing Policy
Computer Use and File Sharing Policy Williamson College recognizes the value of computer and other electronic resources to improve student learning and enhance the administration and operation of its school.
More informationAcceptable Use Policy
Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established
More informationCommunity Use Agreement
Community Use Agreement (revised 30 August 2017) This FileMaker Community Agreement ("Agreement") provides important information about your use of the FileMaker Community site (the Site ). IMPORTANT: IF
More informationAcceptable Usage Policy (Student)
Acceptable Usage Policy (Student) Author Arthur Bogacki Date 18/10/2017 Version 1.1 (content sourced and consolidated from existing Email and Electronic Communication, and User Code of Practice policies.)
More informationPCA Staff guide: Information Security Code of Practice (ISCoP)
PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Information Risk and Privacy Version 2015.1.0 December 2014 PCA Information Risk and Privacy Page 1 Introduction Prudential Corporation
More informationGuest Wireless Policy
Effective: April 1, 2016 Last Revised: November 27, 2017 Responsible University Office: Information Technology Services Responsible University Administrator: Chief Information Officer Policy Contact: Deb
More informationViolations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.
Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist
More informationAcceptable Use Policy
Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information
More informationThe Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY
Policy for the acceptable use of mobile phones and cameras by the staff of the Lee Wiggins Childcare Centre (LWCC) Mobile Phones In order to provide a safe environment for children, parents and staff we
More informationElectronic Network Acceptable Use Policy
Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s
More informationUCL Policy on Electronic Mail ( )
LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD
More informationStudent Network, Computing & Software Usage Regulations Version th July 2006
Student Network, Computing & Software Usage Regulations Version 1.0 6 th July 2006 Copyright 2006 Institute of Technology, Sligo, Ireland. 1 1.1 General Computing Facilities Computing facilities provided
More informationPolicy Use of Information and Communications Technology (ICT) Resources
Policy Use of Information and Communications Technology (ICT) Resources Background This policy is necessary in order to: Provide all Hereworth members (Board, staff, boys and volunteers) with clear parameters
More informationGeneral Terms and Conditions (GTCs)
General Terms and Conditions (GTCs) I. Object... 1 II. Use and services... 2 III. Data protection... 2 IV. Guarantee... 2 V. Liability... 3 VI. Prizes / Draws / Competitions... 3 VII. Protection of member
More informationPUPIL ICT ACCEPTABLE USE POLICY
PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status
More information13. Acceptable Use Policy
13. Acceptable Use Policy Purpose Indian River State College s intention for publishing an Acceptable Use Policy is to outline the acceptable use of computer equipment and services at Indian River State
More informationNATIONAL UNIVERSITY OF SINGAPORE COMPUTER CENTRE ACCEPTABLE USE POLICY FOR IT RESOURCES. VERSION 4.1 Oct 2013
NATIONAL UNIVERSITY OF SINGAPORE COMPUTER CENTRE ACCEPTABLE USE POLICY FOR IT RESOURCES VERSION 4.1 Oct 2013 1. Purpose The National University of Singapore ( the University ) has invested extensively
More informationGrand Avenue Primary and Nursery School ICT Data management. Contents
Grand Avenue Primary and Nursery School ICT Data management Contents 1. Acceptable Use Statement 2. Transfer and Offsite Use of Sensitive Data 3. E-safety 4. Declaration Introduction These three policy
More informationTERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE
TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE 1. General The term PPS refers to: Professional Provident Society Holdings Trust, (The Holding Trust); Professional
More informationComputer Use Policy for Students and Alumni
Produced by CCSS September 2016 Computer Use Policy for Students and Alumni Application of the Computer Use Policy for Students and Alumni This Policy explains: how you as a student of the University (
More informationUSAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;
USAGE POLICIES Any terms in capitals not defined in these Usage Policies will have the same meaning as in your Contract. These Usage Policies apply to you and anybody you allow to use NOW Broadband and
More informationTELEPHONE AND MOBILE USE POLICY
TELEPHONE AND MOBILE USE POLICY Date first approved: 9 December 2016 Date of effect: 9 December Date last amended: (refer Version Control Table) Date of Next Review: December 2021 First Approved by: University
More informationUWC International Data Protection Policy
UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of
More informationDONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY
DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an
More informationMARSTON S PLC EMPLOYEE POLICIES & PROCEDURES GROUP I.T. TELEPHONE AND SOCIAL MEDIA POLICY
LAST REVISION: November 2016 MARSTON S PLC EMPLOYEE POLICIES & PROCEDURES GROUP I.T. TELEPHONE AND SOCIAL MEDIA POLICY Policy Statement The computer systems, network, internet, intranet, communications
More informationTerms and Conditions 01 January 2016
Terms and Conditions 01 January 2016 thehealthsource: Terms and Conditions Page 1 of 7 This Agreement (the Agreement ) is entered into by and between thehealthsource (Pty) Ltd and the entity agreeing to
More informationJacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope
Jacksonville State University Acceptable Use Policy 1. Overview Information Technology s (IT) intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Jacksonville
More informationResponsible Officer Approved by
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
More informationII.C.4. Policy: Southeastern Technical College Computer Use
II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer
More informationCognizant Careers Portal Terms of Use and Privacy Policy ( Policy )
Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy ) Introduction This Policy applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers ("Site"), which
More informationAcceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
More informationCODE OF CONDUCT FOR INFORMATION TECHNOLOGY, COMPUTER, TELEPHONE AND EQUIPMENT USE
CODE OF CONDUCT FOR INFORMATION TECHNOLOGY, COMPUTER, TELEPHONE AND EQUIPMENT USE INTENDED USE This Code is intended for the school s staff to provide directions in their work as to the standards for use
More informationEA-ISP-009 Use of Computers Policy
Technology & Information Services EA-ISP-009 Use of Computers Policy Owner: Nick Sharratt Author: Paul Ferrier Date: 28/03/2018 Document Security Level: PUBLIC Document Version: 1.05 Document Ref: EA-ISP-009
More informationPTLGateway Acceptable Use Policy
1 PTLGateway Acceptable Use Policy Last Updated Date: 02 March 2018 Acceptable Use Policy Your use of our Services must fall within our Acceptable Usage Policy. Contents Key details... 1 COVERAGE OF THIS
More informationCleveland State University General Policy for University Information and Technology Resources
Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information
More informationSCOTTISH ENVIRONMENT PROTECTION AGENCY. Information Technology Acceptable Use Procedure. Final Version 5.10 Page 1 of 7
SCOTTISH ENVIRONMENT PROTECTION AGENCY Information Technology Acceptable Use Procedure Final Version 5.10 Page 1 of 7 SCOTTISH ENVIRONMENT PROTECTION AGENCY Information Technology Acceptable Use Procedure
More informationXpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;
65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment
More informationLEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive.
LEARNER I.T. ACCEPTABLE USE POLICY Learner I.T. Acceptable Use Policy 2012-13 [Type text] Updated November 2011. Authorised by ILT Board/Executive. Learner I.T. Acceptable Use Policy Table of Contents
More informationThis policy should be read in conjunction with LEAP s Conflict of Interest Policy.
Policy Number 4.1 Policy Name Release No. 2 Release Date August 2017 Date For Next Review August 2018 Policy LEAP Social Services/Different Abilities Services (LEAP) is committed to the effective, timely
More informationSeelogicMail Terms and Conditions
SeelogicMail Terms and Conditions Seelogic Mail (the "Services"), is a web based software application that offers businesses and web site operators a software application for HTML design, email list management
More informationService Specific Terms & Conditions
These Service Specific Terms and Conditions together with the General Terms and Conditions apply when We provide Service to You. You are deemed to have accepted these Service Specific Terms and Conditions
More informationSynchrotron Light Source Australia Pty Ltd
Document no: 22670 Revision no: 2.0 Date: 11 August 2014 Synchrotron Light Source Australia Pty Ltd ABN 18 159 468 256 ACN 159 468 256 www.synchrotron.org.au 800 Blackburn Road, CLAYTON, VIC, 3168 p +613
More information2.1 Website means operated and owned by UCS Technology Services, including any page, part of element thereof;
WEBSITE USAGE TERMS AND CONDITIONS Acceptable Usage Terms 1. Introduction 1.1 By accessing the UCS Technology Services website, web pages or any part thereof for any reason whatsoever, the User agrees
More informationThe Safe and Sound Services are available for individuals aged 18 years or older.
Safe and Sound Terms of Use Altech Netstar (Pty) Ltd and its affiliates ("ALTECH NETSTAR," "we" or "us") provide amongst other services telematics and ancillary products and services, including, but not
More informationAcceptable Use Policy
Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications
More informationSTUDENT ICT ACCEPTABLE USE POLICY
The Olive School, Blackburn This policy is in line with the Mission Statement of the School To promote a culture of educational excellence, from within a caring and secure Islamic environment enriched
More informationReading School: ICT User Agreement Return Form (AUP)
Reading School: ICT User Agreement Return Form (AUP) For clarity, please use block capitals Student First Name Student Last Name Year started at Reading School?.. Tutor + Group Current Year Group House
More informationTERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.
TERMS OF USE A. PLEASE READ THESE TERMS CAREFULLY. YOUR ACCESS TO AND USE OF THE SERVICES ARE SUBJECT TO THESE TERMS. IF YOU DISAGREE OR CANNOT FULLY COMPLY WITH THESE TERMS, DO NOT ATTEMPT TO ACCESS AND/OR
More informationWARNER PACIFIC COLLEGE
WARNER PACIFIC COLLEGE Network Access and Acceptable Use Policy 1. Statement of Purpose Warner Pacific College's computer resources and information network are vital for the fulfillment of the academic,
More informationAcceptable Use Policy
Acceptable Use Policy Preamble This document may be augmented or replaced by relevant sections of other parts of our Agreement, and should be read in conjunction with other supporting documents, so please
More informationIT Appropriate Use - Best Practice for Guidelines. Section 1 - Purpose / Objectives. Section 2 - Scope / Application. Section 3 - Definitions
IT Appropriate Use - Best Practice for Email Guidelines Section 1 - Purpose / Objectives (1) Email is used at Victoria University as a business communication tool and users are obliged to use this tool
More informationA practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
More informationPeaceful Pill Forum Rules
Peaceful Pill Forum Rules The Exit Peaceful Pill Forums are a private Forum for the purpose of discussing the content of and asking questions in regard to The Peaceful Pill ehandbook. While we encourage
More informationPS 176 Removable Media Policy
PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data
More informationICT Acceptable Use Policy
ICT Acceptable Use Policy Version 3.2 Important: This document can only be considered valid when viewed on the VLE. If this document has been printed or saved to another location, you must check that the
More informationUSE POLICY. iprimus.com.au
ACCEPTABLE USE POLICY iprimus.com.au iprimus ACCEPTABLE USE POLICY 1. ABOUT THIS POLICY This document is the iprimus Acceptable Use Policy (Policy). In this Policy you and your mean the Customer; and iprimus,
More informationBISHOP GROSSETESTE UNIVERSITY. Document Administration. This policy applies to staff, students, and relevant data subjects
BISHOP GROSSETESTE UNIVERSITY Document Administration Document Title: Document Category: Privacy Policy Policy Version Number: 1.0 Status: Reason for development: Scope: Author / developer: Owner Approved
More informationTERMS AND CONDITIONS
TERMS AND CONDITIONS BACKGROUND: This agreement applies as between you, the User of this Website and NWM, the owner(s) of this Website. Your agreement to comply with and be bound by these terms and conditions
More informationComputer Use Regulations
Computer Use Regulations Purpose of this Document This document provides guidelines, which must be followed to ensure that use of University Computer Systems does not interfere with the activities of others
More informationINFORMATION ASSET MANAGEMENT POLICY
INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives
More informationICT Acceptable Use Policy for Students
ICT Acceptable Use Policy for Students a 52 Eurobin Avenue, Manly NSW 2095 t +61 2 9977 5144 f +61 2 9976 2753 cricos 03290E e administration@stellamaris.nsw.edu.au w www.stellamaris.nsw.edu.au abn 88
More informationLeiden University Regulations on ICT and Internet Use. Version
1 Leiden University Regulations on ICT and Internet Use Version 1.0 4-11-2014 These Regulations state the rules regarding the use of ICT and internet facilities offered by Leiden University to its students,
More informationPolicy General Policy GP20
Email Policy General Policy GP20 Applies to All employees Committee for Approval Quality and Governance Committee Date of Approval September 2012 Review Date June 2014 Name of Lead Manager Head of Technology
More informationSchools Acceptable Use Policy
Created from ICT Long Document Template v4.0 Reference IS2014.09.13-001 Schools Acceptable Use Policy ICT Facilities & Information Security Reference: IS2015.06.01-001 Version: 2.1 Protective Marking:
More informationWorld Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018
World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 We understand that you are aware of and care about your own personal privacy interests and we take that seriously. This Privacy
More informationDirective. on the Use of IT Resources at the University of Bern. For internal use. Classification. Released. Document status
on the Use of IT Resources at the University of Bern Classification Document status For internal use Released Index The Governing Board of the University,... 3 1. General Provisions... 3 1.1 Aim... 3 1.2
More informationAcceptable Use Policy
1 INTRODUCTION and its subsidiaries ( us, we or our ) have produced this acceptable use policy in order to: Give you a better understanding of what is and is not acceptable when using the internet Encourage
More informationThe purpose of this guidance is: To provide a comprehensive understanding to complying with the universities Acceptable Use Policy.
Policy Acceptable Use Guidance 1 Introduction This guidance compliments the University of East London s Acceptable Use Policy. It puts into perspective specific situations that will help you provide a
More informationPGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES
PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES Thank you for choosing a PGTelco Internet as your internet service provider. PGTelco Internet is an affiliate of The Prairie Grove Telephone
More informationCurtin IT Services ICT POLICY MANUAL. Version 4.0. Information Management
Curtin IT Services ICT POLICY MANUAL Version 4.0 Category: Information Management G50-746-94 Page 1 of 18 CONTENTS CONTENTS... 2 Information Security Policy... 3 ICT Use Policy... 4 ICT Electronic Messaging
More informationSMS SERVICE PROVISION
SMS SERVICE PROVISION Terms and Conditions and Privacy Policy Version 2.05 Jan 2017 Page 1 Contents TERMS & CONDITIONS... 3 Registration... 3 Your Personal Information... 3 Our Obligations to SMS Service
More informationName of Policy: Computer Use Policy
Page: Page 1 of 5 Director Approved By: Approval Date: Reason(s) for Change Responsible: Corporate Services Leadership April 22, Reflect current technology and practice Corporate Services Leadership Leadership
More informationIT ACCEPTABLE USE POLICY
CIO Signature Approval & Date: IT ACCEPTABLE USE POLICY 1.0 PURPOSE The purpose of this policy is to define the acceptable and appropriate use of ModusLink s computing resources. This policy exists to
More informationINFORMATION CODE OF CONDUCT
Title & Version Contact Point Information Compliance, DoI 2(3), (020) 7091 5084 (Internal Network 78-5084) Location Summary Room 1 East, Edinburgh House The Information Code of Conduct sets out the policy
More informationEMPLOYEE USE OF TECHNOLOGY AGREEMENT
2000--ADMINISTRATION 2600--OFFICE TECHNOLOGY EMPLOYEE USE OF TECHNOLOGY AR 2620 Page 1 of 10 EMPLOYEE USE OF TECHNOLOGY AGREEMENT Revised: 4/01/02, 5/24/04, 2/10/10 Superintendent of Schools Page 2 of
More informationACCEPTABLE USE POLICY
Abu Dhabi Systems Information Center ACCEPTABLE USE POLICY AUH-IDN-POL-002 - Acceptable Use Policy - 1.0 04/07/2018 عام / Public This document is provided pursuant to the disclaimer provided on the last
More informationTularosa Communications, Inc. (TCI) General Service Terms and Conditions
Tularosa Communications, Inc. (TCI) General Service Terms and Conditions Updated: June 11, 2018 Effective: June 11, 2018 APPLICABILITY These Terms and Conditions apply to all services provided by TCI unless
More informationText and messaging - Safeguarding Guidelines
Safeguarding and Protecting Children Guidance SPCG 32 Text and Email messaging - Safeguarding Guidelines Text messaging and emails can help improve the success of rowing clubs, affiliated organisations
More informationCOMPUTER USE POLICY Staff
COMPUTER USE POLICY Staff Introduction The Pontifical Council for Social Communications (2002) has acknowledged the powerful contribution that the Internet 1 can make to the development of human life and
More informationTIME OUT AND TIME OUT MARKET WEBSITE TERMS OF USE
TIME OUT AND TIME OUT MARKET WEBSITE TERMS OF USE 1 INTRODUCTION 1.1 These terms of use ( Terms ) apply to the Time Out and Time Out Market website (www.timeout.com and www.timeoutmarket.com), specifically
More informationGlenwood Telecommunications, Inc. Acceptable Use Policy (AUP)
Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) All customers should read this document. You are responsible for the policy written here, and your account WILL BE DISABLED WITHOUT WARNING
More informationIT SERVICES ICT Usage & Security Policy
IT SERVICES ICT Usage & Security Policy Section 1 : POLICY STATEMENT 1. All Information and Communications Technology (ICT) facilities and resources of the INTI International College Subang ( College )
More informationInternet, , Social Networking, Mobile Device, and Electronic Communication Policy
TABLE OF CONTENTS Internet, Email, Social Networking, Mobile Device, and... 2 Risks and Costs Associated with Email, Social Networking, Electronic Communication, and Mobile Devices... 2 Appropriate use
More information