General Use and Ownership. 1. Authorized users should be aware that the data they create on systems remains the property of the Diocesan entity. Because of the need to protect the network, management cannot guarantee the confidentiality of information stored on any network device belonging to a Diocesan entity.
2. Authorized users are responsible for exercising good judgment regarding the reasonableness of personal use. Authorized users should be guided by diocesan policies on personal use, and if there is any uncertainty, authorized users should consult their supervisor or manager.
3. The Diocese of Orlando recommends that any information that users consider sensitive or vulnerable be encrypted, especially when stored on external media.
4. Authorized personnel may monitor equipment, systems and network traffic at any time. The Diocese of Orlando maintains the right to monitor all network/computer activity derived from or utilized through its resources, whether it is on-line, down-loaded or through printed material.
5. The Diocese of Orlando, through its entities, reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.
6. Authorized users are advised that a determined individual may be able to gain access to services on the Network/Internet and other technologies which the Diocese of Orlando has not authorized for professional purposes. By participating in the use of the Network/Internet or other technologies, authorized users may gain access to information and communications which the authorized user may find inappropriate, offensive or controversial. Authorized users assume this risk by consenting to the use of the Network/Internet with the Diocese of Orlando.
7. Anyone who removes diocesan equipment from the business location is required to sign the Receipt of Computer Equipment form. This would include employees who require equipment while working away from the office. If equipment is removed for repair the Receipt of Computer Equipment form or appropriate receipt from vendor can be used.
General Use and Ownership. A. Department, Agency, and NJOIT:
1. Departments, agencies, and/or NJOIT have the right to install monitoring and remote wiping software on devices connected to the State’s Garden State Network or information systems. This software can be used at any time to monitor, manage and control State-owned applications.
2. Departments, agencies, and/or NJOIT retain the right to randomly audit devices connected to the State’s Garden State Network or information systems to ensure State data or information security and to ensure that security software is up to date.
3. Departments, agencies, and/or NJOIT require that all portable computing devices used to connect to the State’s Garden State Network or information systems:
a. Enable password protection.
b. Enable screen locking and screen timeout functions.
c. Enable encryption for onboard storage or removable storage.
d. Enable the control to wipe remotely and disabled the device if the device is stolen or lost.
e. Enable management control or limit what applications are able to be downloaded and installed.
f. Install and enable anti-virus/anti-malware software.
B. It is the duty of the (Department/Agency Employee) to:
1. Accept responsibility for protecting, to the best of her/his ability, any and all State data or information stored on the portable device.
2. Not to store any personal identifiable or confidential information on the device.
3. Process and remove immediately any stored picture deemed personal identifiable or confidential from the device.
4. Not to store any IRS or Social Security Administration (SSA) provided data on any device.
5. Immediately report the loss or theft of a portable device covered under this agreement.
6. Protect the device from any deliberate attempt to circumvent the security measures put in place by the State.
7. Ensure that the device is password-protected.
8. Ensure the device has encryption capability to protect stored data, is protected with strong passwords, is enabled for inactivity timeouts, and locks out all possible users after several failed attempts to log in.
General Use and Ownership. IT resources are the property of MAC Inc. Authorized Users may use IT resources for incidental personal use and in support of the business and academic mission of MAC Inc. It is the responsibility of each Authorized User to know and comply with this agreement and security standards published by IT. This responsibility includes protecting the privacy and security of passwords, and using IT resources solely for their intended purposes. Authorized Users are solely responsible for their use of IT resources, and may not represent or imply that their associated use constitutes the views or policies of MAC Inc. Communications originating from the Authorized User are identified as such and the Authorized User assumes responsibility for all communication originating from equipment or accounts assigned to that User. In the event of a security breach related to User accounts or equipment, the User shall immediately report and correct the situation. Authorized MAC Inc. IT officials may monitor and access systems, network traffic and Electronic Equipment for maintenance, operation, security, quality of service, business related purposes (such as audits), to investigate an alleged violation of this agreement, and for agreement or legal compliance. An Authorized User’s privacy will be preserved to the extent possible, subject to MAC Inc.’s administrative, business and legal obligations. There should be no expectation of privacy in the material sent or received when using IT resources or third-party vendor applications provided by MAC Inc.
General Use and Ownership. Mecklenburg County Public Schools proprietary information stored on electronic and computing devices whether owned or leased by Mecklenburg County Public Schools, the employee or a third party, remains the sole property of Mecklenburg County Public Schools. • You have a responsibility to promptly report the theft, loss or unauthorized disclosure of Mecklenburg County Public Schools proprietary information. • You may access, use or share Mecklenburg County Public Schools proprietary information only to the extent it is authorized and necessary to fulfill your assigned job duties. • Employees are responsible for exercising good judgment regarding the reasonableness of personal use. • For security and network maintenance purposes, authorized individuals within Mecklenburg County Public Schools may monitor equipment, systems and network traffic at any time. • Mecklenburg County Public Schools reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.
General Use and Ownership. 1. Authorized users should be aware that the data they create on systems remains the property of the Diocesan entity. Because of the need to protect the network, management cannot guarantee the confidentiality of information stored on any network device belonging to a Diocesan entity.
2. Authorized users are responsible for exercising good judgment regarding the reasonableness of personal use. Authorized users should be guided by diocesan policies on personal use, and if there is any uncertainty, authorized users should consult their supervisor or manager.
3. The Diocese of Orlando recommends that any information that users consider sensitive or vulnerable be encrypted, especially when stored on external media.
4. Authorized personnel may monitor equipment, systems and network traffic at any time. The Diocese of Orlando maintains the right to monitor all network/computer activity
5. The Diocese of Orlando, through its entities, reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.
6. Authorized users are advised that a determined individual may be able to gain access to services on the Network/Internet and other technologies which the Diocese of Orlando has not authorized for professional purposes. By participating in the use of the Network/Internet or other technologies, authorized users may gain access to information and communications which the authorized user may find inappropriate, offensive or controversial. Authorized users assume this risk by consenting to the use
7. Anyone who removes diocesan equipment from the business location is required to sign the Receipt of Computer Equipment form. This would include employees who require equipment while working away from the office. If equipment is removed for repair the Receipt of Computer Equipment form or appropriate receipt from vendor can be used.
General Use and Ownership. 4.1.1 Labster proprietary information stored on electronic and computing devices whether owned or leased by Labster, the employee or a third party, remains the sole property of Labster. You must ensure through legal or technical means that proprietary information is protected in accordance with the Password Protection Policy.
4.1.2 You have a responsibility to promptly report the theft, loss or unauthorized disclosure of Labster proprietary information.
4.1.3 You may access, use or share Labster proprietary information only to the extent it is authorized and necessary to fulfill your assigned job duties.
4.1.4 Employees are responsible for exercising good judgment regarding the reasonableness of personal use. Any Limitations and Restrictions in acceptable use of Internet/Intranet/Extranet systems described in policies of your circle(s) that are conflicting with points of this policy needs to be clarified with your supervisor or manager to approve your planned actions.
4.1.5 For security and network maintenance purposes, authorized individuals within Labster may monitor equipment, systems and network traffic at any time.
4.1.6 Labster reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.
4.1.7 If you discover any unauthorized external access of Labster infrastructure or any scenario described inside Disaster Recovery Plan (lead links only) you must report to IT Disaster Reaction Planner and follow the steps in its respective scenario reaction plan immediately.
General Use and Ownership. 4.1.1. Users will have no expectation of privacy with any GRMC computing resource.
4.1.2. Users will use extreme caution and are responsible for verifying the authenticity for opening e-mail attachments received from unknown senders. Screening and or verification services are available from the helpdesk or on call system 24x7x365
4.1.3. All users are responsible to immediately report the theft, loss, security problem, or unauthorized disclosure of GRMC proprietary information accessing GRMC computing resources immediately to the Information Systems Helpdesk by calling 000-000-0000 and asking for extension 4111 (IS Helpdesk) or ask for the on-call services to be activated.
4.1.4. All users are responsible to protect, and for exercising good judgment regarding appropriate use of information, electronic devices, and computing resources in accordance with GRMC policies and standards, and regulations.
4.1.5. Users must authenticate themselves before gaining access or attempting to establish any connection with any GRMC computing resource from any device. Unauthenticated connections to any GRMC computing resource are prohibited
4.1.6. Users will not leave devices unattended when logged into GRMC computing resources, you must lock the screen or log off when the device is unattended.
General Use and Ownership. 1. While University of Louisiana at Lafayette's Information Technology Divisions desire to provide a reasonable level of privacy, users should be aware that the data they create on the university systems remains the property of University of Louisiana at Lafayette. Because of the need to protect University of Louisiana at Lafayette's network, management cannot guarantee the confidentiality of information stored on any device that is owned or leased or under direct control of the University of Louisiana at Lafayette.
2. Employees and students are responsible for exercising good judgment regarding the reasonableness of personal use. If there is any uncertainty, employees and students should consult the Office of Information Systems.
3. Information Technology Security recommends that any information that users consider sensitive or vulnerable be encrypted. For guidelines on information classification, see Information Technology Security's Information Sensitivity Policy. For guidelines on encrypting email and documents, go to Information Technology Security's Awareness Initiative.
4. For security and network maintenance purposes, authorized individuals within University of Louisiana at Lafayette may monitor equipment, systems and network traffic at any time, per Information Technology Security's Audit Policy.
5. University of Louisiana at Lafayette reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.
General Use and Ownership. 1. While Allscripts network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on the corporate systems remains the property of Allscripts. Because of the need to protect Allscripts’ network, management cannot guarantee the confidentiality of information stored on any network device belonging to Allscripts.
2. End Users are responsible for exercising good judgment regarding the reasonableness of personal use. Individual departments are responsible for creating guidelines concerning personal use of Internet/Intranet/Extranet systems. In the absence of such policies, End Users should be guided by departmental policies on personal use, and if there is any uncertainty, End Users should consult their supervisor or manager.
3. Information Security (“InfoSec”) recommends that any information that End Users consider sensitive or vulnerable be encrypted. For guidelines on information classification, see Allscripts Information Sensitivity Policy. For guidelines on encrypting email and documents, go to Allscripts Awareness Initiative.
4. For security and network maintenance purposes, authorized individuals within Allscripts may monitor equipment, systems and network traffic at any time, per Allscripts Audit Policy.
5. Allscripts reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.
General Use and Ownership. While City of Durango’s network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on city systems remains the property of the City of Durango. The City of Durango reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.