Anchor |
---|
_Toc518556301 | _Toc518556301 | Anchor |
---|
_Toc518556493 | _Toc518556493 | Anchor |
---|
_Toc518556592 | _Toc518556592 | Anchor |
---|
_Toc518558294 | _Toc518558294 | Image Removed Image Added THE COLONIAL WILLIAMSBURG FOUNDATION INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY Version 2
...
...
Abstract
...
_Toc518556303 | Anchor |
---|
_Toc518556495 | _Toc518556495 | Anchor |
---|
_Toc518556594 | _Toc518556594 | The Colonial Williamsburg Foundation has established this policy concerning the acceptable use of critical technology resources and services by its employees
, contractors, volunteers, and interns. Anchor |
---|
_Toc518556304 | _Toc518556304 | Anchor |
---|
_Toc518556496 | _Toc518556496 | Anchor |
---|
_Toc518556595 | _Toc518556595 | Anchor |
---|
_Hlk528330283 | _Hlk528330283 | , contractors, volunteers, and interns. Robert W. (Bob) Hodges
Anchor |
---|
_Toc518556305 | _Toc518556305 | anchor_Toc518556497 | _Toc518556497 | Anchor |
---|
_Toc518556596 | _Toc518556596 | Information Security Manager/ ISO
Anchor |
---|
_Toc518556597 | _Toc518556597 | Anchor |
---|
_Toc518556498 | _Toc518556498 | Anchor |
---|
_Toc518556306 | _Toc518556306 | Table of Contents
Abstract
Overview
Purpose
Scope
Administration of this Policy
Policy
Security and Access
No Expectation of Privacy
Network Systems
Downloading and Installing Software/Website Agreements
Confidentiality and Proprietary Rights
E-mail and Text Messaging
Spam
Etiquette
Personal Use of Colonial Williamsburg-provided E-mail
Phishing
Anchor |
---|
_GoBack | _GoBack | Internet Personal Use of the Internet Social Media Computers and Laptops Removable Storage Media Mobile Devices Lost or Stolen Devices or Data Telephone and Voicemail Personal Use Inappropriate Use of Colonial Williamsburg IT Resources and Communications Systems Corrective Action Conduct Not Prohibited by This Policy Additional Resources ...
...
OverviewThis Policy covers use of and access to the Colonial Williamsburg Foundation's computers, networks, communication systems and other information technology resources. The IT resources and communications systems are intended for business purposes only (except for the limited personal use described below) during working time and at all other times. To protect CWF and the Colonial Williamsburg Company ("CWC" and collectively with CWF, "Colonial Williamsburg"), and their respective employees, contractors, volunteers and interns, it is CWF's policy to restrict the use of the IT resources and communications systems as described below. Each user is responsible for using the IT resources and communications systems in a productive, ethical and lawful manner.
CWF's and CWC's policies prohibiting harassment apply to the use of the IT resources and communications systems. No one may use a communications or computer system in a manner that may be construed by others as harassing or offensive based on race, national origin, sex, sexual orientation, age, disability, religious beliefs or any other characteristic protected by federal, state or local law.
Anchor |
---|
| _Toc518556307 |
---|
| _Toc518556307 |
---|
|
Anchor |
---|
| _Toc518556499 |
---|
| _Toc518556499 |
---|
|
Anchor |
---|
| _Toc518556598 |
---|
| _Toc518556598 |
---|
|
Anchor |
---|
| _Toc518558297 |
---|
| _Toc518558297 |
---|
|
...
This Policy applies to all users of Colonial Williamsburg's IT resources and communications systems, including employees, contractors, volunteers, and interns of Colonial Williamsburg. The use of the IT resources and communications systems by an employee, contractor, volunteer or intern of CWF and/or CWC shall signify his or her understanding of an agreement to the terms and conditions of this Policy, as a condition of employment or engagement, as applicable. As used in this policy, "you" means the employee, contractor, volunteer or intern of CWF and/or CWC, as applicable.
This Policy applies to all IT resources and communications systems owned or leased by Colonial Williamsburg, or otherwise made available at CWF and/or CWC, and all use of such resources and systems when accessed using your own resources, including but not limited to:
...
Anchor |
---|
| _Toc518556313 |
---|
| _Toc518556313 |
---|
|
Anchor |
---|
| _Toc518556505 |
---|
| _Toc518556505 |
---|
|
Anchor |
---|
| _Toc518556604 |
---|
| _Toc518556604 |
---|
|
Security of the Information Technology ("IT") resources and communication systems is the responsibility of the IT Department, including approval and control of your and others' access to systems and suspension or termination of access in cases of misuse and you are no longer an employee, contractor, volunteer, intern or other authorized user, or otherwise ineligible to use the systems.
Anchor |
---|
| _Toc518556314 |
---|
| _Toc518556314 |
---|
|
Anchor |
---|
| _Toc518556506 |
---|
| _Toc518556506 |
---|
|
Anchor |
---|
| _Toc518556605 |
---|
| _Toc518556605 |
---|
|
It is your responsibility to adhere to the IT security guidelines, including, but not limited to the creation, format and scheduled changes of passwords. All usernames, passcodes, passwords, and information used or stored on CWF's computers, networks and systems are the property of CWF and/or CWC, as applicable. You may not use a username, passcode, password or method of encryption that has not been issued to you authorized in advance by CWF.
Anchor |
---|
| _Toc518556315 |
---|
| _Toc518556315 |
---|
|
Anchor |
---|
| _Toc518556507 |
---|
| _Toc518556507 |
---|
|
Anchor |
---|
| _Toc518556606 |
---|
| _Toc518556606 |
---|
|
You may not share usernames, passcodes or passwords with any other person. You must immediately inform the IT Department if you know or suspect that any username, passcode or password has been improperly shared or used, of that IT security has been violated in any way.
Anchor |
---|
| _Toc518556316 |
---|
| _Toc518556316 |
---|
|
Anchor |
---|
| _Toc518556508 |
---|
| _Toc518556508 |
---|
|
Anchor |
---|
| _Toc518556607 |
---|
| _Toc518556607 |
---|
|
Anchor |
---|
| _Toc518558302 |
---|
| _Toc518558302 |
---|
|
...