INTERNET and CODE OF CONDUCT

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Northside I.S.D. Acceptable Use Policy
Manager ethics Sample of Code of Ethical Business Conduct Slovak University of Technology Faculty of Material Science and Technology in Trnava.
Hart District Acceptable Use Policy Acceptable Use Policy.
Woodland Hills School District Computer Network Acceptable Use Policy.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Riverside Community School District
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
VISD Acceptable Use Policy
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Aaron Cauchi Nurse Informatics
CPS Acceptable Use Policy Day 2 – Technology Session.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
An Educational Computer Based Training Program CBTCBT.
Computer Programming I
Electronic Use Policies.   Social Media  Internet.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Onslow County Schools Division of Media and Instructional Technology This presentation was prepared under fair use exemption of the U.S. Copyright Law.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
1 Use of Telecommunications & Network 2 SCHOOL DISTRICT OF CLAY COUNTY TELECOMMUNICATIONS NETWORK OVERVIEW 1.SDCC provides opportunity for students to.
Clark County School District (CCSD)
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
ELearning Backpack Initiative Exciting Opportunity for Freshman Raiders.
BYOD: Bring Your Own Device
©2012, Mika Meyers Beckett & Jones PLC All Rights Reserved Michigan Association of Educational Data Systems Presented by: Jennifer A. Puplava Mika Meyers.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
December 25, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Appropriate Internet Use Note to Trainer.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
EPals ePals is your school account Communicate with group members/teachers stu.gbaps.org.
Woodland Hills School District Computer Network Acceptable Use Policy.
School Accounts Presented by: Mrs. Mazzola.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
YOU’RE IN BUSINESS YOUR PEOPLE ETHICS IN BUSINESS.
ELearning Backpack Initiative Exciting Opportunity for Freshman.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Connectivity to bank and sample account structure
Clark County School District
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Acceptable Use Policy Grace Lowe.
Computer Programming I
Student User Agreement and Policy 2022
Woodland Hills School District
Presentation transcript:

INTERNET and EMAIL CODE OF CONDUCT Access to the Internet has been provided to employees for the benefit of the organization and its customers. It allows employees to connect to information resources around the world. Every employee has a responsibility to maintain and enhance the company’s public image, and to use the Internet in a productive manner. To ensure that all employees are responsible, productive Internet users and are protecting the company’s public image, the following guidelines have been established for using the Internet. The company intends to honor the policies set forth below, but must reserve the right to change them at any time as may be required under the circumstances.

INTERNET and EMAIL CODE OF CONDUCT Employees accessing the Internet are representing the company. All communications should be for professional reasons. Employees are responsible for seeing that the Internet is used in an effective, ethical and lawful manner. Internet Relay Chat channels may be used to conduct official company business, or to gain technical or analytical advice. Databases may be accessed for information as needed. E-mail may be used for business contacts

INTERNET and EMAIL CODE OF CONDUCT The Internet should not be used for personal gain or advancement of individual views. Solicitation of non-company business, or any use of the Internet for personal gain is strictly prohibited. Use of the Internet must not disrupt the operation of the company network or the networks of other users. It must not interfere with your productivity. Each employee is responsible for the content of all text, audio or images that they place or send over the Internet. Fraudulent, harassing or obscene messages are prohibited.

INTERNET and EMAIL CODE OF CONDUCT All messages communicated on the Internet should have your name attached. No messages will be transmitted under an assumed name. Users may not attempt to obscure the origin of any message. Information published on the Internet should not violate or infringe upon the rights of others. No abusive, profane or offensive language is transmitted through the system. Employees who wish to express personal opinions on the Internet are encouraged to obtain their own usernames on other Internet systems. To prevent computer viruses from being transmitted through the system, there will be no unauthorized downloading of any software. All software downloads will be done through the MIS Department.

INTERNET and EMAIL CODE OF CONDUCT Copyrighted materials belonging to entities other than this company may not be transmitted by employees on the Internet. One copy of copyrighted material may be downloaded for your own personal use in research. Users are not permitted to copy, transfer, rename, add or delete information or programs belonging to other users unless given express permission to do so by the owner. Failure to observe copyright or license agreements may result in disciplinary action from the company or legal action by the copyright owner.

INTERNET and EMAIL CODE OF CONDUCT All messages created, sent or retrieved over the Internet are the property of the company, and should be considered public information. The company reserves the right to access and monitor all messages and files on the computer system as deemed necessary and appropriate. Internet messages are public communication and are not private. All communications including text and images can be disclosed to law enforcement or other third parties without prior consent of the sender or the receiver. Harassment of any kind is prohibited. No messages with derogatory or inflammatory remarks about an individual or group’s race, religion, national origin

INTERNET and EMAIL CODE OF CONDUCT Violations of any guidelines listed above may result in disciplinary action up to and including termination. If necessary the company will advise appropriate legal officials of any illegal violations. The company maintains an electronic mail system. This system is provided by the company to assist in the conduct of business within the company. The electronic mail system hardware is company property. Additionally, all messages composed, sent, or received on the electronic mail system are and remain the property of the company. They are not the private property of any employee.  The use of the electronic mail system is reserved solely for the conduct of business at the company. It may not be used for personal business.

INTERNET and EMAIL CODE OF CONDUCT The electronic mail system may not be used to solicit or proselytize for commercial ventures, religious or political causes, outside organizations, or other non-job related solicitations.  The electronic mail system is not to be used to create any offensive or disruptive messages. Among those which are considered offensive, are any messages which contain sexual implications, racial slurs, gender-specific comments, or any other comment that offensively addresses someone’s age, sexual orientation, religious or political beliefs, national origin, or disability.  The electronic mail system shall not be used to send (upload) or receive (download) copyrighted materials, trade secrets, proprietary financial information, or similar materials without prior authorization.

INTERNET and EMAIL CODE OF CONDUCT The company reserves and intends to exercise the right to review, audit, intercept, access and disclose all messages created, received or sent over the electronic mail system for any purpose. The contents of electronic mail properly obtained for legitimate business purposes, may be disclosed within the company without the permission of the employee. The confidentiality of any message should not be assumed. Even when a message is erased, it is still possible to retrieve and read that message. Further, the use of passwords for security does not guarantee confidentiality. All passwords must be disclosed to the company or they are invalid and cannot be used. Notwithstanding the company’s right to retrieve and read any electronic mail messages, such messages should be treated as confidential by other employees and accessed only by the intended recipient. Employees are not authorized to retrieve or read any e-mail messages that are not sent to them. Any exception to this policy must receive prior approval by the employer.

INTERNET and EMAIL CODE OF CONDUCT Employees shall not use a code, access a file, or retrieve any stored information, unless authorized to do so. Employees should not attempt to gain access to another employee’s messages without the latter’s permission. All computer pass codes must be provided to supervisors. No pass code may be used that is unknown to the company.  Any employees who discover a violation of this policy shall notify their immediate supervisor as soon as possible. Any employee who violates this policy or uses the electronic mail or internet system for improper purposes shall be subject to discipline, up to and including discharge.