Acceptable Use Policy

Similar documents
ACCEPTABLE USE OF INFORMATION SYSTEMS

Acceptable Use Policy (AUP) For ALL Technology Items, , and Wireless Devices within Hubbard ISD

Acceptable Use Policy (AUP)

Community Use Agreement

University Policies and Procedures ELECTRONIC MAIL POLICY

This Policy applies to all staff and other authorised users in St Therese School.

ACCEPTABLE USE POLICY

Acceptable Use and Publishing Policy

ELECTRONIC MAIL POLICY

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

: Acceptable Use Policy

region16.net Acceptable Use Policy ( AUP )

Acceptable Use Policy

Acceptable Use Policy

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

Breckenridge Financial Supplies Website Use Policy

Acceptable Use Policy

Computer Use and File Sharing Policy

Acceptable Use Policy

Cleveland State University General Policy for University Information and Technology Resources

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

RMU-IT-SEC-01 Acceptable Use Policy

NebraskaLink Acceptable Use Policy

E RADAR. All Rights Reserved. Acceptable Use Policy

BUCKEYE INTERNET SERVICE ACCEPTABLE USE POLICY

Security and Privacy Breach Notification

OHSU s Alumni Relations Program (housed at the OHSU Foundation): 1121 SW Salmon Street, Suite #100 Portland, OR

Communication and Usage of Internet and Policy

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ).

POLICY BURLINGTON TOWNSHIP BOARD OF EDUCATION. PROGRAM 2361/page 1 of 8 Acceptable Use of Computer Network/Computers and Resources M

Acceptable Use Policy

PTLGateway Acceptable Use Policy

WARNER PACIFIC COLLEGE

NOOTRY TERMS OF SERVICE

Draft. Policies of Colorado State University University Policy. Category: Information Technology

MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS

Electronic Network Acceptable Use Policy

FERPA & Student Data Communication Systems

Acceptable Use Policy

Acceptable Use Policy

s, Texts and Social Media: What Physicians Need to Know

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Terms Of Use AGREEMENT BETWEEN USER AND DRAKE MODIFICATION OF THESE TERMS OF USE LINKS TO THIRD PARTY WEB SITES USE OF COOKIES

Data Processing Agreement

Acceptable Use Policy. Effective January 2017

Acceptable Use Policy

Staff Information System Acceptable Use Policy

ICORS Terms of Service

Table of Contents. PCI Information Security Policy

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

PURPOSE: To establish policies and procedures for the use of University-owned and -operated information technology resources.

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY

Student Network, Computing & Software Usage Regulations Version th July 2006

II.C.4. Policy: Southeastern Technical College Computer Use

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

ICT Acceptable Use Policy for Students

Brazosport Independent School District Employee/Agent Acceptable Use Agreement For Internet/Network Access and Use

Magna5 reserves the right to make modifications to this policy at any time.

GENERAL ORDER PORT WASHINGTON POLICE DEPARTMENT

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)

19 Dec The forwarding and returning obligation does not concern messages containing malware or spam.

IMPORTANT INSTRUCTIONS:

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Acceptable Use Policy ("AUP")

CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

GhostFiber Acceptable Use Policy

PCA Staff guide: Information Security Code of Practice (ISCoP)

Healthfirst Website Privacy Policy

INTERNET ACCESS SERVICE AGREEMENT PLEASE READ CAREFULLY

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

EMPLOYEE USE OF TECHNOLOGY AGREEMENT

Kings Heath Academy Acceptable Use (Staff and Students) Policy and Procedures September 2018

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

TELEPHONE AND MOBILE USE POLICY

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

Acceptable Use Policy

ORGANIZEFOR PETITION PLATFORM ColorOfChange MOVEMENT-BUILDING PARTNERSHIP PROGRAM TERMS OF SERVICE

Policies & Regulations

POLICY 8200 NETWORK SECURITY

Acceptable Use Policy Updated 1/16/2018

You may contact The Translation Network by at You may also call The Translation Network at

Virginia Commonwealth University School of Medicine Information Security Standard

Page 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax

ECLIPSE FOUNDATION, INC. INDIVIDUAL COMMITTER AGREEMENT

Terms and Conditions of Website Use

Internet Service Provider Agreement

Eco Web Hosting Security and Data Processing Agreement

Access Control Policy

Subject: University Information Technology Resource Security Policy: OUTDATED

DATA PROTECTION LAWS OF THE WORLD. Bahrain

Guest Wireless Policy

Internet, , and Computer Usage Policy

FreedomNet Solutions Acceptable Use Policy ( )

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

Terms of Use. Changes. General Use.

3. As far as the hosting services of WWW INFOTECH are through leased severs of our data centre partners in US and UK through contracts.

Money back guarantee and refund policy

Usage Policy Document Number: OIL-IS-POL-EU

Transcription:

IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations 06/25/2013 05/23/2014 06/21/2016 IS Manager Topic: Email Acceptable Use Section 1

Purpose E-mail is a critical mechanism for business communications. However, use of electronic mail systems and services are a privilege, not a right, and therefore must be used with respect and in accordance with the goals of Ameris Bank. The objectives of this policy are to outline appropriate and inappropriate use of Ameris Bank s e-mail systems and services in order to minimize disruptions to services and activities, as well as comply with applicable policies and laws. Scope This policy applies to all e-mail systems and services owned by Ameris Bank, all e-mail account users/holders (both temporary and permanent), and all company e-mail records. Account Activation/Termination E-mail access at is controlled through individual accounts and passwords. Each user of the e-mail system is required to read and sign a copy of this E-Mail Acceptable Use Policy prior to receiving an e-mail access account and password. It is the responsibility of the employee to protect the confidentiality of their account and password information. All permanent employees of will receive an e-mail account. E-mail accounts will be granted to third-party nonemployees or temporary employees on a case-by-case basis as approved of the Chief Information Officer or his designee. Applications for temporary accounts must be submitted to the Ameris Bank Security Department. All terms, conditions, and restrictions governing e-mail use are applicable to these temporary users of the email systems and must be documented by a signed agreement. E-mail access will be terminated when the employee or third party terminates their association with Ameris Bank. Ameris Bank is under no obligation to store or forward the contents of an individual s e-mail account after the term of their employment has ceased. General Expectations of End Users Ameris Bank delivers official communications via e-mail. As a result, employees with e-mail accounts are expected to check their e-mail in a consistent and timely manner so that they are aware of important company announcements and updates, as well as for fulfilling business and role-oriented tasks. Users are responsible for mailbox management, including organization and purging of old data records. Users are expected to remember that e-mail sent from the company s e-mail accounts reflects on the company. Please comply with normal standards of professional and personal courtesy and conduct. Users should also understand that email constitutes a legal position on any matter discussed or reviewed in the communication and the information is discoverable in a court of law. 2

Appropriate Use Individuals are encouraged to use e-mail to further the goals and objectives of Ameris Bank. The types of activities that are encouraged include: Communicating with fellow employees, business partners, and clients within the context of an individual s assigned responsibilities. Acquiring or sharing information necessary or related to the performance of an individual s assigned responsibilities. Participating in educational or professional development activities. Inappropriate Use Ameris Bank s e-mail systems and services are not to be used for purposes that could be reasonably expected to strain storage or bandwidth. An individual s e-mail use should not interfere with the normal operations of Ameris Bank s e-mail system and services. E-mail use will comply with all applicable laws, all Ameris Bank policies, and all Ameris Bank contracts. The following activities are deemed inappropriate uses of Ameris Bank s systems and services and are prohibited: Use of e-mail for illegal or unlawful purposes, including copyright infringement, obscenity, libel, slander, fraud, defamation, plagiarism, harassment, intimidation, forgery, impersonation, soliciting for illegal pyramid schemes, and computer tampering (e.g. spreading of computer viruses). Solicit non-company business for personal profit or gain. Represent personal opinions as those of the banks when not authorized to do so. Send customer information, such as account numbers, passwords, etc., by unencrypted email. These items should be communicated using secure email, regular mail or in person. Use of e-mail in any way that violates Ameris Bank s policies, rules, or administrative orders, including, but not limited to items not specifically listed. Viewing, copying, altering, or deletion of e-mail accounts or files belonging to Ameris Bank or another individual without authorized permission. Sending of unreasonably large e-mail attachments. The total size of an individual e-mail message sent (including attachment) should be 25MB or less. Opening e-mail attachments from unknown or unsigned sources. Attachments are the primary source of computer viruses and should be treated with utmost caution. Sharing e-mail account passwords with another person, or attempting to obtain another person s e-mail account password. E-mail accounts are only to be used by the registered user. Use of third party email systems for Ameris Bank business is prohibited. Accessing third party email systems from Ameris Bank systems or devices is prohibited. Sending communications to third party email systems with the intent of circumnavigating Ameris Bank Acceptable Email Policy, Acceptable Use policy, Information Security Policy or security procedures is prohibited. Excessive personal use of Ameris Bank e-mail resources. Ameris Bank allows limited personal use for communication with family and friends, independent learning, and public service so long as it does not interfere with staff productivity, pre-empt any business activity, or consume resource levels deemed 3

excessive by the Information Technology Department. Ameris Bank prohibits personal use of its e-mail systems and services for unsolicited mass mailings, non-ameris Bank commercial activity, political campaigning, dissemination of chain letters, and use by non-employees. Monitoring and Confidentiality The e-mail systems and services used at Ameris Bank are owned by the company, and are therefore its property. This gives Ameris Bank the right to monitor any and all e-mail traffic passing through its e-mail system. This monitoring may include, but is not limited to, inadvertent reading by IT staff during the normal course of managing the e-mail system, review by the legal team or any of its designees during the e-mail discovery phase of litigation, observation by management in cases of suspected abuse or to monitor employee efficiency. In addition, archival and backup copies of e-mail messages may exist, despite end-user deletion, in compliance with Ameris Bank s records retention policy. The goals of these backup and archiving procedures are to ensure system reliability, prevent business data loss, meet regulatory and litigation needs, and to provide business intelligence. Backup copies exist primarily to restore service in case of failure. Archival copies are designed for quick and accurate access by company delegates for a variety of management and legal needs. Both backups and archives are governed by the company s document retention policies. These policies indicate that e-mail must be kept for up to 10 years. If Ameris Bank discovers or has good reason to suspect activities that do not comply with applicable laws or this policy, e-mail records may be retrieved and used to document the activity in accordance with due process. All reasonable efforts will be made to notify an employee if his or her e-mail records are to be reviewed. Notification may not be possible, however, if the employee cannot be contacted, as in the case of employee absence due to vacation or if notification would be considered damaging to the investigation. Use extreme caution when communicating confidential or sensitive information via e-mail. Keep in mind that all e-mail messages sent outside of Ameris Bank become the property of the receiver. A good rule is to not communicate anything that you wouldn t feel comfortable being made public. Demonstrate particular care when using the Reply command during e-mail correspondence to ensure the resulting message is not delivered to unintended recipients. Reporting Misuse Any allegations of misuse should be promptly reported to the Information Technology Department. If you receive an offensive e-mail, do not forward, delete, or reply to the message. Instead, report it directly to the department listed above. Reporting an Information Breach In the course of preparing and sending communications via email systems, there is an inherent risk of an information breach if a communication was sent to an incorrect recipient. If a communication is sent in error that meets any of the following criteria: Contains attachment(s) which have information that can be classified as Personally Identifiable Information, i.e. tax records, client records, financial statements, SSN, credit information, etc. 4

Contains information that would be considered intellectual property of Ameris Bank. Contains information that could negatively impact Ameris Bank s results or operations if exposed to competitors or other entities. Contains language or information that could expose Ameris Bank to litigation. Contains information not specifically listed here but which poses a risk to Ameris Bank. Immediate notification of such data breach must be communicated to the Chief Information Officer and Information Security Officer or their designees within 1 hour of discovery of such breach. Disclaimer Ameris Bank assumes no liability for direct and/or indirect damages arising from the user s use of Ameris Bank s e-mail system and services. Users are solely responsible for the content they disseminate. Ameris Bank is not responsible for any third-party claim, demand, or damage arising out of use the Ameris Bank s e-mail systems or services. Failure to Comply Violations of this policy will be treated like other allegations of wrongdoing at Ameris Bank. Allegations of misconduct will be adjudicated according to established procedures. Sanctions for inappropriate use on Ameris Bank s e-mail systems and services may include, but are not limited to, one or more of the following: 1. Temporary or permanent revocation of e-mail access; 2. Disciplinary action according to applicable Ameris Bank policies; 3. Termination of employment 4. And/or legal action according to applicable laws and contractual agreements. 5

EMPLOYEE CONSENT AND ACKNOWLEDGMENT FORM I, (print name), have read the Ameris Bank. I recognize that this system is the property of the bank and that Ameris Bank reserves the right to monitor usage for any reason at any time. My signature on this document means I have consented to this monitoring. I understand that should I become aware of any misuse of Ameris Bank s systems, I am obligated to inform a member of management of such misuse immediately. I understand that the failure to abide by any of the provisions of this policy may result in disciplinary action up to and including immediate termination, without prior warning or notice. Acknowledged and agreed to by: Signature: Employee s Signature Date: 6