ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

Similar documents
REPORTING INFORMATION SECURITY INCIDENTS

ACCEPTABLE USE POLICY

Acceptable Use Policy

E RADAR. All Rights Reserved. Acceptable Use Policy

Computer Use and File Sharing Policy

This Policy applies to all staff and other authorised users in St Therese School.

Communication and Usage of Internet and Policy

UCL Policy on Electronic Mail ( )

Acceptable Use and Publishing Policy

PTLGateway Acceptable Use Policy

Acceptable Use Policy

Acceptable Use Policy

Acceptable Use Policy

PUPIL ICT ACCEPTABLE USE POLICY

II.C.4. Policy: Southeastern Technical College Computer Use

Internet, , and Computer Usage Policy

Acceptable Use Policy

Electronic Network Acceptable Use Policy

Acceptable Use Policy

PS 176 Removable Media Policy

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

TELEPHONE AND MOBILE USE POLICY

Acceptable Usage Policy (Student)

Acceptable Use Policy

Synchrotron Light Source Australia Pty Ltd

Acceptable Use Policy

Acceptable Use Policy

Student Network, Computing & Software Usage Regulations Version th July 2006

STUDENT ICT ACCEPTABLE USE POLICY

Acceptable Use Policy (AUP)

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

ICT Acceptable Use Policy (AUP)

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

Guest Wireless Policy

Acceptable Use Policy

Data Protection Policy

Acceptable Use Policy. Effective January 2017

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Enviro Technology Services Ltd Data Protection Policy

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

ELECTRONIC MAIL POLICY

CODE OF CONDUCT FOR INFORMATION TECHNOLOGY, COMPUTER, TELEPHONE AND EQUIPMENT USE

region16.net Acceptable Use Policy ( AUP )

NHS Ayrshire & Arran Organisation & Human Resource Development Policy. Appropriate Use of IT Facilities Policy

Motorola Mobility Binding Corporate Rules (BCRs)

EA-ISP-009 Use of Computers Policy

Staff Information System Acceptable Use Policy

Acceptable Use Policy

Data protection. 3 April 2018

PCA Staff guide: Information Security Code of Practice (ISCoP)

ICT Acceptable Use Policy for Students

NATIONAL UNIVERSITY OF SINGAPORE COMPUTER CENTRE ACCEPTABLE USE POLICY FOR IT RESOURCES. VERSION 4.1 Oct 2013

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Data protection policy

Midstate Telephone & Midstate Communications. Acceptable Use Policy

Commonwealth of Pennsylvania Governor's Office

The Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY

Information Security Incident Reporting Policy

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Name of Policy: Computer Use Policy

ICT User Policy. for use in Essa Academy Essa Primary Academy Essa Nursery and Support Services

Institute of Technology, Sligo. Information Security Policy. Version 0.2

Community Use Agreement

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

Auckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual ELECTRONIC MAIL

ACCEPTABLE USE POLICY

Responsible Officer Approved by

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

FERPA & Student Data Communication Systems

RMU-IT-SEC-01 Acceptable Use Policy

USE POLICY. iprimus.com.au

13. Acceptable Use Policy

IT Appropriate Use - Best Practice for Guidelines. Section 1 - Purpose / Objectives. Section 2 - Scope / Application. Section 3 - Definitions

Writer Corporation. Data Protection Policy

ACCEPTABLE USE OF HCHD INTERNET AND SYSTEM

GENERAL ORDER PORT WASHINGTON POLICE DEPARTMENT

UWTSD Group Data Protection Policy

19 Dec The forwarding and returning obligation does not concern messages containing malware or spam.

Acceptable Use Policy Document ID: SER-POL-001

Acceptable Use Policy ("AUP")

Cleveland State University General Policy for University Information and Technology Resources

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

Masada College Student Bring Your Own Device (BYOD) Policy Guidelines Years 7-12

Use of and Instant Messaging (IM) Policy

Bring Your Own Device (BYOD) Policy

Acceptable Use Policy Updated 1/16/2018

ISC10D026. Report Control Information

Terms Of Use AGREEMENT BETWEEN USER AND DRAKE MODIFICATION OF THESE TERMS OF USE LINKS TO THIRD PARTY WEB SITES USE OF COOKIES

Grand Avenue Primary and Nursery School ICT Data management. Contents

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Acceptable use policy for SLT idc services(ver 1.2)

UKIP needs to gather and use certain information about individuals.

INFORMATION SECURITY POLICY

BHIG - Mobile Devices Policy Version 1.0

INFORMATION ASSET MANAGEMENT POLICY

GDPR Draft: Data Access Control and Password Policy

Subject: Kier Group plc Data Protection Policy

ISSP Network Security Plan

Transcription:

INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig Ruskwig provides you with the right to copy and amend this document for your own use You may not resell, ask for donations for, or otherwise transfer for value the document.

Document Control Document Storage Document Title Document Location Email Acceptable Use C:\www\Ruskwig\docs\iso-27002\Email AUP - RW.doc History No Date Author 1.0 10/01/2010 Chris Stone Draft Summary of Changes Approvals Name Title Date of Approval Chris Stone Head of ICT 10/01/2010 1.0 No Distribution Name Title Date of Issue Everyone Internet 10/01/2010 1.0 No Page 2 of 7

Contents DOCUMENT CONTROL 2 Document Storage 2 History 2 Approvals 2 Distribution 2 CONTENTS 3 1. PURPOSE 4 2. SCOPE 4 3. RISKS 4 4. POLICY 4 4.1 Corporate policy on use of email 4 4.2 Monitoring of Email use 5 4.3 Personal use of email 6 4.4 Phishing 6 4.5 Purchasing of goods or services 6 4.6 Instant Messaging 6 4.7 Computer viruses and malicious programs 7 4.8 Masquerading 7 4.9 Legal Compliance 7 5. ENFORCEMENT 7 Page 3 of 7

1. Purpose 1.1 Email is provided to staff to assist them in carrying out their duties efficiently and effectively. Email enables effective and efficient communication with other members of staff, other companies and partner organisations 1.2 This policy is in place to ensure effective use of time, to prevent illegal and inappropriate use of email. 2. Scope 2.1 This policy applies to all staff and employees of the organisation. 2.2 All users of the organisation s IT facilities must understand and use this policy. Users are responsible for ensuring the safety and security of the organisation s systems and the information that they use or manipulate. 2.3 All users have a role to play and a contribution to make to the safe and secure use of email. 3. Risks 3.1 Emails may contain inappropriate content that should not be viewed by users. 3.2 Emails may contain malicious code which has the potential to access or damage data or forward data to a third party 3.3 There is also a potential for the loss of productivity if staff spend unacceptably large amounts of time sending emails. 4. Policy 4.1 Corporate policy on use of email 4.1.1 The organisation's email facilities are primarily for business use. 4.1.2 Occasional and reasonable personal use of email is permitted in your own time subject to the conditions set out in the organisation s security policies. 4.1.3 When using the organisation s electronic mail facilities you should comply with the following guidelines Page 4 of 7

DO Do check your electronic mail daily to see if you have any messages. Do include a meaningful subject line in your message. Do check the address line before sending a message and check you are sending it to the right person. Do delete electronic mail messages when they are no longer required. Do respect the legal protections to data and software provided by copyright and licenses. Do take care not to express views, which could be regarded as defamatory or libellous. DO NOT Do not print electronic mail messages unless absolutely necessary. Do not expect an immediate reply, the recipient might not be at their computer or could be too busy to reply straight away. Do not forward electronic mail messages sent to you personally to others, particularly newsgroups or mailing lists, without the permission of the originator. Do not send excessively large electronic mail messages or attachments. Do not send unnecessary messages such as festive greetings or other nonwork items by electronic mail, particularly to several people. Do not participate in chain or pyramid messages or similar schemes. Do not represent yourself as another person. Do not use electronic mail to send or forward material that could be construed as confidential, political, obscene, threatening, offensive or libellous. 4.1.4 A corporate email filter is utilised to prevent emails being delivered which may contain inappropriate or malicious content. 4.1.5 Emails which need to be accessed to conduct the organisation s business but are blocked can be made available by contacting the IT Service Desk. Authorisation will be required before access is granted. 4.1.6 Accidental viewing of materials which infringes this policy should be reported according to the Information security incident reporting procedure. 4.2 Monitoring of Email use 4.2.1 All electronic mail coming into or leaving the organisation is scanned for viruses and offensive material. 4.2.2 The use of email is recorded and may be monitored. It is possible to identify the senders, recipients and content of email. 4.2.3 The organisation reserves the right to inspect any files at any time during investigations where there is suspected misuse and to withdraw access to email. Page 5 of 7

4.3 Personal use of email 4.3.1 Personal use is defined as any activity that is not work-related or necessary in the performance of duties connected to your employment. 4.3.2 Staff may use on an occasional basis the organisation s computers for personal use to send and receive email. 4.3.3 Staff who utilise one of the organisation s computers for personal use to send and receive email access must accept, as a condition of doing so, that their activity may be monitored. 4.3.4 Staff using the organisation s computers waive any rights to privacy regarding personal information on the organisation s computers. 4.3.5 The personal use of email any purpose must not be excessive. It should not count as working time and must not interfere or detract from the organisation s business or work. It should not distract any other individual from their work. 4.3.6 Users should seek to keep any costs incurred as a result of personal use of email to a minimum. 4.3.7 No liability can be accepted by the organisation for any loss that an individual may suffer as a result of personal use of the organisation s computers. 4.3.8 Support must not be requested from other employees for personal use of email. 4.3.9 Subscription to e-mail mailing lists or list servers for personal purposes is not allowed. 4.3.9 Using email for personal purposes must comply with the principles set out in this security policy. Failure to comply with the policy may lead to disciplinary action. 4.4 Phishing 4.4.1 Take care when viewing emails not to be deceived by phishing. Reputable organisations will not ask you to run software or click on a link to verify your password. 4.5 Purchasing of goods or services 4.5.1 The purchasing of goods or services via email is subject to the organisation s financial regulations. These must be consulted to determine which goods and services it is permissible to purchase. 4.6 Instant Messaging 4.6.1 The use of Internet Instant Messaging tools is forbidden from the organisation s PCs and Networks. The lack of formal controls concerning data transfer and logging of messages prohibit their use. Page 6 of 7

4.7 Computer viruses and malicious programs 4.7.1 Computers can be infected by viruses and malicious programs by opening an attachment to an email or just visiting a link to a webpage contained within the email. 4.7.2 If you think you have a computer virus report it to the IT Service Desk immediately. 4.8 Masquerading 4.8.1 It is an offence to masquerade as another person via email and to send emails in another person s name. 4.9 Legal Compliance 4.9.1 The use of email must for lawful purposes only, and must comply with relevant legislation. 4.9.2 You be placing yourself at risk of prosecution if unlawful action is involved. 4.9.3 Electronic communications and files are admissible in court as evidence. Do not write anything about anybody that you cannot prove and evidence. 5. Enforcement 5.1 If any member of IT staff is found to have breached this policy, they may be subject to disciplinary action. 5.2 If any user is found to have breached this security policy, they may be subject to disciplinary action. 5.3 Any violation of the policy by a temporary worker, contractor or supplier may result in the termination of their contract or assignment. Page 7 of 7