...
Abstract
Overview
Purpose
Scope
Administration of this Policy
Policy
Security and Access
No Expectation of Privacy
Network Systems
Downloading and Installing Software/Website Agreements
Confidentiality and Proprietary Rights
E-mail and Text Messaging
Spam
Etiquette
Personal Use of Colonial Williamsburg-provided E-mail
Phishing
Internet
Personal Use of the Internet
Social Media
Computers and Laptops
Removable Storage Media
Mobile Devices
Lost or Stolen Devices or Data
Telephone and Voicemail
Personal Use
Inappropriate Use of Colonial Williamsburg IT Resources and Communications Systems
Corrective Action
Conduct Not Prohibited by This Policy
Additional Resources
...
CWF's and CWC's policies prohibiting harassment apply to the use of the IT resources and communications systems. No one may use a communications or computer system in a manner that may be construed by others as harassing or offensive based on race, national origin, sex, sexual orientation, age, disability, religious beliefs or any other characteristic protected by federal, state or local law.
...
...
...
Purpose
The purpose of this Policy is to protect you and Colonial Williamsburg. Inappropriate use exposes Colonial Williamsburg to risks, including, but not limited to, virus attacks, compromise of network systems and services, loss or exposure of data, and legal issues.
...
...
...
Scope
This Policy applies to all users of Colonial Williamsburg's IT resources and communications systems, including employees, contractors, volunteers, and interns of Colonial Williamsburg. The use of the IT resources and communications systems by an employee, contractor, volunteer or intern of CWF and/or CWC shall signify his or her understanding of an agreement to the terms and conditions of this Policy, as a condition of employment or engagement, as applicable. As used in this policy, "you" means the employee, contractor, volunteer or intern of CWF and/or CWC, as applicable.
...
- Email systems and accounts
- Internet and intranet access
- Telephones and voicemail systems, including wired and wireless phones, smartphones and devices
- Printers, photocopiers, and scanners
- Fax machines, e-fax systems, and modems
- All other associated computer, network and communications systems, hardware, peripherals, and software, including network key fobs and other devices
- Closed-circuit television and other physical security systems and devices, including key cards and fobs
...
AdministrationOfThisPolicy | | _ |
---|
|
...
AdministrationOfThisPolicy |
|
Administration of this Policy...
The Information Technology Department ("IT Department) is responsible for the administration of this Policy. If you have any questions regarding this Policy, please contact the IT Department.
...
Policy...
The IT resources and communications systems are the property of CWF and are to be used for legitimate business purposes. CWF permits CWC and its employees, contractors, volunteers, and interns to access and use the IT resources and communications systems of CWF. You are provided access to the IT resources and communication systems to assist you in the performance of your job. You have the responsibility to use the IT resources and communications systems in a professional, lawful and ethical manner.
Anchor |
---|
_Toc518556312 | manner._Toc518556312 | Anchor |
---|
_Toc518556504 | _Toc518556504 | Anchor |
---|
_Toc518556603 | _Toc518556603 | Anchor |
---|
_Toc518558301 | _Toc518558301...
...
Security and Access Anchor |
---|
_Toc518556313 | _Toc518556313 | Anchor |
---|
_Toc518556505 | _Toc518556505 | Anchor |
---|
_Toc518556604 | _Toc518556604 | Security of the Information Technology ("IT") resources and communication systems is the responsibility of the IT Department, including approval and control of your and others' access to systems and suspension or termination of access in cases of misuse and you are no longer an employee, contractor, volunteer, intern or other authorized user, or otherwise ineligible to use the systems.
Anchor |
_Toc518556314_Toc518556314 | Anchor |
---|
_Toc518556506 | _Toc518556506 | Anchor |
---|
_Toc518556605 | _Toc518556605 | It is your responsibility to adhere to the IT security guidelines, including, but not limited to the creation, format and scheduled changes of passwords. All usernames, passcodes, passwords, and information used or stored on CWF's computers, networks and systems are the property of CWF and/or CWC, as applicable. You may not use a username, passcode, password or method of encryption that has not been issued to you authorized in advance by CWF.in advance by CW
Anchor |
---|
_Toc518556315 | _Toc518556315 | Anchor |
---|
_Toc518556507 | _Toc518556507 | Anchor |
---|
_Toc518556606 | _Toc518556606 | You may not share usernames, passcodes or passwords with any other person. You must immediately inform the IT Department if you know or suspect that any username, passcode or password has been improperly shared or used, of that IT security has been violated in any way.
...
...
...
No Expectation of Privacy
Anchor |
---|
| _Toc518556317 |
---|
| _Toc518556317 |
---|
|
Anchor |
---|
| _Toc518556509 |
---|
| _Toc518556509 |
---|
|
Anchor |
---|
| _Toc518556608 |
---|
| _Toc518556608 |
---|
|
All contents of the IT resources and communications systems are the property of CWF and/or CWC, as applicable. Therefore, you should have no expectation of privacy whatsoever in any message, file, data, document, facsimile, telephone conversation, social media post, conversation or message, or any other kind or form of information or communication transmitted to, received or printed from, or stored or recorded on the IT resources and communications systems.
Anchor |
---|
| _Toc518556318 |
---|
| _Toc518556318 |
---|
|
Anchor |
---|
| _Toc518556510 |
---|
| _Toc518556510 |
---|
|
Anchor |
---|
| _Toc518556609 |
---|
| _Toc518556609 |
---|
|
You are expressly advised that in order to prevent against misuse, Colonial Williamsburg reserves the right to monitor, intercept and review, without further notice, every employee's, contractor's, volunteer's and intern's activities using the IT resources and communications systems, including, but not limited to, email (both incoming and outgoing), telephone conversations and voice mail recordings, instant messages and internet and social media postings and activities, and you consent to such monitoring by your acknowledgement of this Policy and your use of such resources and systems. This might include, without limitation, the monitoring, interception, accessing, recording, disclosing, inspecting, reviewing, retrieving and printing of transactions, messages, communications, postings, log-ins, recordings and other uses of the systems as well as keystroke capturing and other network monitoring technologies.
Anchor |
---|
| _Toc518556319 |
---|
| _Toc518556319 |
---|
|
Anchor |
---|
| _Toc518556511 |
---|
| _Toc518556511 |
---|
|
Anchor |
---|
| _Toc518556610 |
---|
| _Toc518556610 |
---|
|
CWF may also store copies of such data and communications for a period of time after they are created and may delete such copies from time to time without notice.
Anchor |
---|
| _Toc518556320 |
---|
| _Toc518556320 |
---|
|
Anchor |
---|
| _Toc518556512 |
---|
| _Toc518556512 |
---|
|
Anchor |
---|
| _Toc518556611 |
---|
| _Toc518556611 |
---|
|
Do not use the IT resources and communications systems for any matter that you desire to be kept private or confidential from CWF and/or CWC.
Anchor |
---|
| _Toc518556321 |
---|
| _Toc518556321 |
---|
|
Anchor |
---|
| _Toc518556513 |
---|
| _Toc518556513 |
---|
|
Anchor |
---|
| _Toc518556612 |
---|
| _Toc518556612 |
---|
|
CWC uses the IT resources and communications systems owned, leased and otherwise made available by CWF to CWC. CWF may disclose to CWC any and all contents of the IT resources and communications systems, including, without limitation, messages, files, data, documents, facsimiles, telephone conversations, social media posts, conversations or messages, or any other kind or form of information or communication transmitted to, received or printed from, or stored or recorded on the electronic information and communications systems, as they are sent to, received from, or otherwise relate to any CWC employee, contractor, volunteer or intern, or CWC's business.
...
Anchor |
---|
| _Toc518556373 |
---|
| _Toc518556373 |
---|
|
Anchor |
---|
| _Toc518556565 |
---|
| _Toc518556565 |
---|
|
Anchor |
---|
| _Toc518556664 |
---|
| _Toc518556664 |
---|
|
Social media is technology that enables online users to interact and share information (including video, audio, photographs, and text) publicly or privately. Employees must adhere to Colonial Williamsburg's Social Media Policy & Principles.
...
ComputersAndLaptops | | _ComputersAndLaptops |
---|
|
...
Computers and Laptops Anchor |
---|
| _Toc518556354 |
---|
| _Toc518556354 |
---|
|
Anchor |
---|
| _Toc518556546 |
---|
| _Toc518556546 |
---|
|
Anchor |
---|
| _Toc518556645 |
---|
| _Toc518556645 |
---|
|
Colonial Williamsburg has a managed desktop policy to help protect the IT resources and communications systems from the threat of virus, malware, etc. A managed desktop policy restricts your right to install software and reduces the risk of being infected with malicious code. Only Colonial Williamsburg issued equipment is allowed to be connected directly to the Colonial Williamsburg network.
Anchor |
---|
| _Toc518556355 |
---|
| _Toc518556355 |
---|
|
Anchor |
---|
| _Toc518556547 |
---|
| _Toc518556547 |
---|
|
Anchor |
---|
| _Toc518556646 |
---|
| _Toc518556646 |
---|
|
Colonial Williamsburg uses several levels of virus and spam monitoring. Upon any indication or notification of any infection, quarantine, or compromised by a virus, Trojan or malicious code, you must immediately stop using your computer and are required to contact the IT Department immediately. The IT Department may, at its discretion, remove and replace the computer.
Anchor |
---|
| _Toc518556356 |
---|
| _Toc518556356 |
---|
|
Anchor |
---|
| _Toc518556548 |
---|
| _Toc518556548 |
---|
|
Anchor |
---|
| _Toc518556647 |
---|
| _Toc518556647 |
---|
|
Colonial Williamsburg may require other security measures to be taken to protect computers, such as logging out when your computer is not in use or inactivity timeouts. To prevent unauthorized access to the IT resources and communications systems and to ensure that security updates can be applied to Colonial Williamsburg's computers.
Anchor |
---|
| _Toc518556357 |
---|
| _Toc518556357 |
---|
|
Anchor |
---|
| _Toc518556549 |
---|
| _Toc518556549 |
---|
|
Anchor |
---|
| _Toc518556648 |
---|
| _Toc518556648 |
---|
|
You must exercise caution when opening files, attachments or emails from unknown sources. If you are unsure of the validity of a file, attachment or email, please contact the IT Department.
You will be required to use passphrases as an alternative to passwords. What's the difference? A password typically consists of an eight-character entry, usually based on a set of random characters or even a single dictionary word with additional special characters and numbers. Passwords are now trivial to crack with today's modern technology.
The rule for how you will enter the "password" fields now requires longer entries when accessing CWF's networks. Changing the parameters of this one factor alone raises the length of time to an infeasible amount of time and resources to crack. Therefore, CWF will require the use of passphrases.
Anchor |
---|
| _Toc432432101 |
---|
| _Toc432432101 |
---|
|
Passphrases can be a combination of words, letters, numbers, and special characters that can be easily remembered versus a long password.
The following password guidelines should be used to create strong easy to remember passphrases. They:
...