Preview

Ict Acceptable Use Policy

Powerful Essays
Open Document
Open Document
5292 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ict Acceptable Use Policy
ICT Acceptable Use Policy

Staffordshire County Council ICT Acceptable Use Policy Classification: Internal Use Only

Document Management Document Disclaimer This document is issued only for the purpose for which it is supplied. Document Owner This document is produced and owned by Staffordshire County Council (SCC). It is the responsibility of the Information Security Team to review and update the document annually and whenever necessary. Document Control This document is controlled and maintained according to the documentation standards and procedures of Staffordshire County Council. All requests for changes to this document should be sent to the author(s). Any new issues of this document will be located on the corporate intranet and will be sent to the recipients as defined within the distribution list maintained by the author(s). Distribution List Copy 1 Name SICT Senior Management Team and Directorate ICT Managers

Change History Version Author(s)
0.1 0.2 0.3 0.4 0.5 David Sharkey and Manjot Dhami DJS, MSD Pat Yates Pat Yates DJS, MSD

Reason for Change
Initial draft version for distribution and review comments Second draft incorporating comments Incorporating Mailbox and Internet usage limits Security Forum amendments Security Awareness Training amendments

Date
04/05/2005 25/08/2005 01/03/2006 03/08/2006 27/11/2006

Change Approval The ICT Acceptable Use Policy is reviewed regularly and amended as necessary. The Information Security Forum will agree significant changes to the policy.

Page 2 of 18
Paper copies are not controlled and are valid only for 24 hours from the time of printing

Staffordshire County Council ICT Acceptable Use Policy Classification: Internal Use Only

CONTENTS 1. INTRODUCTION ............................................................................................... 5 2. PURPOSE ......................................................................................................... 5 3.

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    • Compile and submit all previous weeks’ sections with this week’s Network Security Policy and Executive Summary sections as a final Information Security Policy (Appendix B).…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 1 Individual Introduction to the Information Security Policy Appendix C comprises:…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 4222-307 Answers

    • 767 Words
    • 4 Pages

    The Internet and Email Acceptable Use Policy provides all staff with access to email and internet a framework and set of rules and regulations to follow, to ensure that they know what they can and cannot enter or send…

    • 767 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Tm 9-1240-413

    • 3184 Words
    • 13 Pages

    required for administration and operational purposes, as determined 26 October 2005. Other requests for this document will be…

    • 3184 Words
    • 13 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify the legislation and codes of practice within your care of environment that relate to handling information.…

    • 619 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab1 questions

    • 491 Words
    • 2 Pages

    3. Can internet use and email use policies be covered in an Acceptable Use Policy?…

    • 491 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    mrs a

    • 676 Words
    • 6 Pages

    CU2470 Handle information in Health and Social care settings 1.1 The legislation that relates to recording storage and sharing of information known as care plans is the Data Protection Act 1998. There are 8 principles to be followed when gathering data 1) processed fairly and lawfully 2) processed only for 1 or more lawful purpose 3) adequate and relevant 4) accurate and up to date 5) kept for no longer than necessary 6) processed in line with the right of the individual 7) secured against loss or damage 8) not transferred to countries out of EEA. 1.2 It is important to have secure systems for recording and storing information to prevent personal information from being misused. Any information that has been gathered is confidential but written evidence may be required by other professionals on occasions. Also if new staff members arrive they can read the care plans to gain all the information needed. 2.1 I would follow my company’s policies and procedures for guidance and advice about handling information but would also speak to my directors or Human resources office. Information can also be gained from government websites for advice or other professionals. 2.2 If there are concerns over the recording storing or sharing of information i would document and report my concerns and secure all the information immediately. 3.1 Agreed ways of working relates to the company’s and government policies in relation to Care Plans. All documents should be evaluated and reviewed regularly, updated as required, completed and legible so others are able to decipher them. 3.2 Agreed ways of working when…

    • 676 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Skill and Social Care

    • 649 Words
    • 3 Pages

    This unit is aimed at those working in a wide range of settings. It covers the knowledge and skills needed to implement and promote good practice in recording, sharing, storing and accessing information. Learning Outcomes The learner will: 1 Understand requirements for handling information in health and social care settings Assessment Criteria The learner can: 1.1 Identify legislation and codes of practice that relate to handling information in health and social care 1.2 Summarise the main points of legal requirements and codes of practice for handling information in health and social care 2.1 Describe features of manual and electronic information storage systems that help ensure security 2.2 Demonstrate practices that ensure security when storing and accessing information 2.3 Maintain records that are up to date, complete, accurate and legible 3.1 Support others to understand the need for secure handling of information 3.2 Support others to understand and contribute to records Others may include:  Colleagues  Individuals accessing care or support Exemplification…

    • 649 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    “This legislation grew out of the fact that by 1998 roughly ten million American children had access to the Internet, and at the same time, studies indicated that children were unable to understand the potential effect of revealing their personal information online and parent failed to monitor their children’s use of the Internet.” (Koby)…

    • 800 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Communication Plan

    • 799 Words
    • 4 Pages

    References: 6 ways to keep kids safe online by: Ki Mae Heussner 10/14/2010 retrieved on 11/30/12 from…

    • 799 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    In task one I’m going to identify the current legislation, guidelines, policies and procedures for safe guarding the welfare of children and young people including e- safety.…

    • 6181 Words
    • 25 Pages
    Good Essays
  • Satisfactory Essays

    Every day, businesses, schools, and individuals depend on computers to perform a variety of significant tasks. Such as tracking sales, recording student grades, creating reports, Web, and sending e-mail. People increasingly rely on computers to create, store, and manage critical information, so it is important to ensure that computers and software are protected from loss, damage, and misuse. School districts, for example, must take precautions to guarantee that student information, such as grades, attendance rates, personal and family data, and learning problems, is protected from loss and kept confidential Gary B. Shelly (2010). In 2000, congress passed the children’s internet protection act (CIPA) in order to protect children from obscene and graphic materials with in most school districts. The universal natural of the internet it is of the up most important to protect our students online with the ever changing technology and lack of decorum, the internet can be rude and take advantage of others. In order to protect my students from internet predators and any inappropriate material I need to add internet safety to the classroom curriculum so that the student can have a constant prompt on how to use the internet safely. Talking to parents about internet policy, also have parents and students sign a technology agreement that has all the rules and consequence for parent and students to read before student is able to use school technology. Closely monitor student on computer, with today’s technology teacher can see on their monitor what students are doing on each computer. Teach student how to recognize unsafe sites and have filter to block or filter out pornographic material and gang-sites, hate groups.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Management have the final responsibility in ensuring information held on residents is wherever possible non-identifiable, used only when necessary and by the people who need to know and is stored securely. Most importantly that the company’s policies are adhered to and are working in relation to the handling and collecting and using and storing of information.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Are Biofuels Sustainable

    • 15573 Words
    • 63 Pages

    Published on 21 January 2008 by authority of the House of Commons London: The Stationery Office Limited £11.00…

    • 15573 Words
    • 63 Pages
    Powerful Essays

Related Topics