SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
THE FIJI GOVERNMENT
INTERNET USAGE POLICY


      Version 1.00.00
DOCUMENT APPROVAL

This document has been reviewed and authorized by the following personnel.



                Writer                               Reviewer

Name:

Position:

Signature:      _____________________                _______________________


Date:           _____________________                _______________________




                Quality Assurance                              Manager

Name:

Position:

Signature:      ______________________                         ________________________

Date:           ______________________                         ________________________




Document Versioning

Revision Date:

Document
Version:

Document Path            T:Quality AssuranceDocumentsPolicies, Procedures, StandardsPoliciesInternet Usage
                         Policy.doc




                                                                                                                  2
TABLE OF CONTENTS

1.        POLICY OVERVIEW ......................................................................................................................................4

2.        DETAILED INTERNET POLICY PROVISIONS ...................................................................................5
     A)                      M ANAGEMENT AND ADMINISTRATION ......................................................................................... 5
     B)                      T ECHNICAL ........................................................................................................................................ 8
     C)                      SECURITY........................................................................................................................................... 9
3.        DECLARATION...............................................................................................................................................10

4.        SIGNOFF ............................................................................................................................................................10




                                                                                                                                                                               3
1.   POLICY OVERVIEW

     Information Technology and Computing Services (ITC) provides access to the
     vast information resources of the Internet to help you do your job faster and
     smarter, and be a well-informed business citizen. The facilities to provide that
     access represent a considerable commitment of company resources for
     telecommunications, networking, software, storage, etc. This Internet usage policy
     is designed to help you understand our expectations for the use of those resources
     in the particular conditions of the Internet, and to help you use those resources
     wisely.

     While we’ve set forth explicit requirements for Internet usage below, we’d like to
     start by describing our Internet usage philosophy. First and foremost, the Internet
     for GOVNET is a business tool, provided to you at significant cost. That means
     we expect you to use your Internet access [primarily] for business-related
     purposes, i.e., to communicate with customers and suppliers, to research relevant
     topics and obtain useful business information [except as outlined below]. We insist
     that you conduct yourself honestly and appropriately on the Internet, and respect
     the copyrights, software licensing rules, property rights, privacy and prerogatives
     of others, just as you would in any other business dealings. To be absolutely clear
     on this point, all existing company policies apply to your conduct on the Internet,
     especially (but not exclusively) those that deal with intellectual property
     protection, privacy, misuse of company resources, sexual harassment, information
     and data security, and confidentiality.

     Unnecessary or unauthorized Internet usage causes network and server congestion.
     It slows other users, takes away from work time, consumes supplies, and ties up
     printers and other shared resources. Unlawful Internet usage may also garner
     negative publicity for the Fiji Government and expose the firm to significant legal
     liabilities.

     The chats, newsgroups and email of the Internet give each individual Internet user
     an immense and unprecedented reach to propagate company messages and tell our
     business story. Because of that power we must take special care to maintain the
     clarity, consistency and integrity of the Fiji Government’s corporate image and
     posture. Anything any one employee writes in the course of acting for the Fiji
     Government on the Internet can be taken as representing the Fiji Government ’s
     corporate posture. That is why we expect you to forgo a measure of your
     individual freedom when you participate in chats or newsgroups on company
     business, as outlined below.




                                                                                       4
While our direct connection to the Internet offers a cornucopia of potential
     benefits, it can also open the door to some significant risks to our data and systems
     if we do not follow appropriate security discipline. As presented in greater detail
     below, that may mean preventing machines with sensitive data or applications
     from connecting to the Internet entirely, or it may mean that certain users must be
     prevented from using certain Internet features like file transfers. The overriding
     principle is that security is to be everyone’s first concern. An Internet user can be
     held accountable for any breaches of security or confidentiality.

     Certain terms in this policy should be understood expansively to include related
     concepts. Company includes our affiliates, subsidiaries, and branches. Document
     covers just about any kind of file that can be read on a computer screen as if it
     were a printed page, including the so-called HTML files read in an Internet
     browser, any file meant to be accessed by a word processing or desk-top
     publishing program or its viewer, or the files prepared for the Adobe Acrobat
     reader and other electronic publishing tools. Graphics includes photographs,
     pictures, animations, movies, or drawings. Display includes monitors, flat-panel
     active or passive matrix displays, monochrome LCDs, projectors, televisions and
     virtual-reality tools.

     All employees granted Internet access with company facilities will be provided
     with a written copy of this policy. All Internet users must sign the following
     statement:

     "I have a received a written copy of my company’s Internet usage policy. I fully
     understand the terms of this policy and agree to abide by them. I realize that ITC’s
     security software may record for management use the Internet address of any site
     that I visit and keep a record of any network activity in which I transmit or receive
     any kind of file. I acknowledge that any message I send or receive will be recorded
     and stored in an archive file for management use. I know that any violation of this
     policy could lead to dismissal or even criminal prosecution."


2.   DETAILED INTERNET POLICY PROVISIONS
     A)    Management and Administration
            ITC has software and systems in place that can monitor and record all
           Internet usage. We want you to be aware that our security systems are
           capable of recording (for each and every user) each World Wide Web site
           visit, each chat, newsgroup or email message, and each file transfer into and
           out of our internal networks, and we reserve the right to do so at any time.
           No employee should have any expectation of privacy as to his or her
           Internet usage. Our managers will review Internet activity and analyze
           usage patterns, and they may choose to publicize this data to assure that


                                                                                        5
company Internet resources are devoted to maintaining the highest levels of
productivity.

We reserve the right to inspect any and all files stored in private areas of
our network in order to assure compliance with policy. The display of any
kind of sexually explicit image or document on any company system is a
violation of our policy on sexual harassment. In addition, sexually explicit
material may not be archived, stored, distributed, edited or recorded using
our network or computing resources.

ITC uses independently-supplied software and data to identify inappropriate
or sexually-explicit Internet sites. We may block access from within our
networks to all such sites that we know of. If you find yourself connected
incidentally to a site that contains sexually explicit or offensive material,
you must disconnect from that site immediately, regardless of whether that
site had been previously deemed acceptable by any screening or rating
program.

This company’s Internet facilities and computing resources must not be
used knowingly to violate the laws and regulations of Fiji or any other
nation, or the laws and regulations of any state, city, province or other local
jurisdiction in any material way. Use of any company resources for illegal
activity is grounds for immediate dismissal, and we will cooperate with any
legitimate law enforcement activity.

Any software or files downloaded via the Internet into the GOVNET
network become the property of ITC. Any such files or software may be
used only in ways that are consistent with their licenses or copyrights.

No employee may use company facilities knowingly to download or
distribute pirated software or data.

No employee may use GOVNET’s Internet facilities to deliberately
propagate any virus, worm, Trojan horse, or trap-door program code.

No employee may use GOVNET’s Internet facilities knowingly to disable
or overload any computer system or network, or to circumvent any system
intended to protect the privacy or security of another user.

Each employee using the Internet facilities of GOVNET shall identify
himself or herself honestly, accurately and completely (including one’s
company affiliation and function where requested) when participating in



                                                                             6
chats or newsgroups, or when setting up accounts on outside computer
systems.

Only those employees or officials who are duly authorized to speak to the
media, to analysts or in public gatherings on behalf of GOVNET may
speak/write in the name of GOVNET to any newsgroup or chat room. Other
employees may participate in newsgroups or chats in the course of business
when relevant to their duties, but they do so as individuals speaking only
for themselves. Where an individual participant is identified as an employee
or agent of this company, the employee must refrain from any unauthorized
political advocacy and must refrain from the unauthorized endorsement or
appearance of endorsement by GOVNET of any commercial product or
service not sold or serviced by this company, its subsidiaries or its affiliates.
Only those managers and company officials who are authorized to speak to
the media, to analysts or in public gatherings on behalf of GOVNET may
grant such authority to newsgroup or chat room participants.

ITC retains the copyright to any material posted to any forum, newsgroup,
chat or World Wide Web page by any employee in the course of his or her
duties.

Employees are reminded that chats and newsgroups are public forums
where it is inappropriate to reveal confidential company information,
customer data, trade secrets, and any other material covered by existing
company secrecy policies and procedures. Employees releasing protected
information via a newsgroup or chat – whether or not the release is
inadvertent – will be subject to all penalties under in existing data security
policies and procedures.

Use of company Internet access facilities to commit infractions such as
misuse of company assets or resources, sexual harassment, unauthorized
public speaking and misappropriation or theft of intellectual property are
also prohibited by general company policy, and will be sanctioned under
the relevant provisions of the personnel handbook.

ITC will limit Internet access to those employees who demonstrate a
legitimate business need. Recommendations must be given from managers
within the section, and to also include time slots, sites to visit and reasons
for going to the site.

Since a wide variety of materials may be deemed offensive by colleagues,
customers or suppliers, it is a violation of company policy to store, view,



                                                                               7
print or redistributes any document or graphic file that is not directly related
     to the user’s job or the Fiji Government ’s business activities.

     Employees may use their Internet facilities for non-business research or
     browsing during meal time or other breaks, or outside of work hours,
     provided that all other usage policies are adhered to.

     ITC will comply with reasonable requests from law enforcement and
     regulatory agencies for logs, diaries and archives on individuals’ Internet
     activities.

     Employees with Internet access may download only software with direct
     business use, and must arrange to have such software properly licensed and
     registered. Downloaded software must be used only under the terms of its
     license.

     Employees with Internet access may not use company Internet facilities to
     download entertainment software or games, or to play games against
     opponents over the Internet.

     Employees with Internet access may not use company Internet facilities to
     download images or videos unless there is an explicit business-related use
     for the material.

     Employees with Internet access may not upload any software licensed to
     the Fiji Government or data owned or licensed by the Fiji Government
     without explicit authorization from the manager responsible for the
     software or data.

B)   Technical
     User IDs and passwords help maintain individual accountability for Internet
     resource usage. Any employee who obtains a password or ID for an Internet
     resource must keep that password confidential. Company policy prohibits
     the sharing of user IDs or passwords obtained for access to Internet sites.

     Any file that is downloaded must be scanned for viruses before it is run or
     accessed.

     Video and audio streaming and downloading technologies represent
     significant data traffic which can cause local network congestion. Video
     and audio downloading are can only be done with prior approval from ITC.



                                                                                   8
C)   Security
     ITC has installed [a variety of firewalls, proxies, Internet address screening
     programs and other security systems] to assure the safety and security of the
     Fiji Government’s networks. Any employee who attempts to disable, defeat
     or circumvent any company security facility will be subject to immediate
     dismissal.

     Computers that use their own modems to create independent data
     connections sidestep our network security mechanisms. An individual
     computer’s private connection to any outside computer can be used by an
     attacker to compromise any company network to which that computer is
     attached. That is why any computer used for independent dial-up or leased-
     line connections to any outside computer or network must be physically
     isolated from company’s internal networks.

     Only those Internet services and functions with documented business
     purposes for this company will be enabled at the Internet firewall.


     - However, users with a specific business need for FTP may request such
     access in writing from the IS/IT/department management.

     Any machine used for FTP may not contain any sensitive applications or
     data.

      Any machine used for FTP must be isolated from all servers that contain
     sensitive applications or data.

     Any machine used for FTP can be used only for Internet access and must be
     isolated completely from all internal networks and servers.

     FTP will be disabled for users on networks used for running mission-
     critical applications or the storage and production of core business data.




                                                                                 9
3.   DECLARATION
     I have read, understand and acknowledge receipt of the Internet Usage policy. I
     will comply with the guidelines set out in this policy and understand that failure to
     do so might result in withdrawal of services and disciplinary or legal action.


4.   SIGNOFF

                Quality Assurance                             PC/Server Team
      Name:                                      Name:
      Date:                                      Date:
      Signature:                                 Signature:


             Database Support Team                         Development Team
      Name:                                      Name:
      Date:                                      Date:
      Signature:                                 Signature:




                                                                                        10

Weitere ähnliche Inhalte

Was ist angesagt?

Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkGary Chambers
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward F. T. Charfauros
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy PresentationSarah Forbes
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyNani Owen
 
Internet usepolicy
Internet usepolicyInternet usepolicy
Internet usepolicyAnkit Juneja
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safetyheidirobison
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workShankar Myadharaveni
 
Workplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and MethodsWorkplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and Methodscmilliken09
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditTamir Harper
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal lawHamza Cheema
 
Workplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesWorkplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesThomas Benjamin Huggett
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world finalshanikosh
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawRamon Ray
 
e-Safety webinar - Nov 2013
e-Safety webinar - Nov 2013e-Safety webinar - Nov 2013
e-Safety webinar - Nov 2013Jisc Scotland
 

Was ist angesagt? (20)

Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Liabilty
LiabiltyLiabilty
Liabilty
 
Internet usepolicy
Internet usepolicyInternet usepolicy
Internet usepolicy
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safety
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_work
 
Workplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and MethodsWorkplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and Methods
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Workplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesWorkplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer Responses
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the Law
 
e-Safety webinar - Nov 2013
e-Safety webinar - Nov 2013e-Safety webinar - Nov 2013
e-Safety webinar - Nov 2013
 

Ähnlich wie Internet usage policy(1)

TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
 
2020 dm expert reference guide
2020   dm expert reference guide2020   dm expert reference guide
2020 dm expert reference guideAnkitKumar250429
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020EmmanuelGazelle
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyKunal Sharma
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicAlleneMcclendon878
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access policARIV4
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxtodd331
 
2 Understand what is meant by professional practice
2 Understand what is meant by professional practice2 Understand what is meant by professional practice
2 Understand what is meant by professional practiceMark Anthony Kavanagh
 
Azstec cyber-security-workbook
Azstec cyber-security-workbookAzstec cyber-security-workbook
Azstec cyber-security-workbookYulia Dianova
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxhealdkathaleen
 

Ähnlich wie Internet usage policy(1) (20)

TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
2020 dm expert reference guide
2020   dm expert reference guide2020   dm expert reference guide
2020 dm expert reference guide
 
Rules of Behavior
Rules of BehaviorRules of Behavior
Rules of Behavior
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020Briefpack library system license terms & privacy policy 2020
Briefpack library system license terms & privacy policy 2020
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access Polic
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
 
Tl vi a
Tl vi aTl vi a
Tl vi a
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
 
2 Understand what is meant by professional practice
2 Understand what is meant by professional practice2 Understand what is meant by professional practice
2 Understand what is meant by professional practice
 
Azstec cyber-security-workbook
Azstec cyber-security-workbookAzstec cyber-security-workbook
Azstec cyber-security-workbook
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 

Kürzlich hochgeladen

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Internet usage policy(1)

  • 1. THE FIJI GOVERNMENT INTERNET USAGE POLICY Version 1.00.00
  • 2. DOCUMENT APPROVAL This document has been reviewed and authorized by the following personnel. Writer Reviewer Name: Position: Signature: _____________________ _______________________ Date: _____________________ _______________________ Quality Assurance Manager Name: Position: Signature: ______________________ ________________________ Date: ______________________ ________________________ Document Versioning Revision Date: Document Version: Document Path T:Quality AssuranceDocumentsPolicies, Procedures, StandardsPoliciesInternet Usage Policy.doc 2
  • 3. TABLE OF CONTENTS 1. POLICY OVERVIEW ......................................................................................................................................4 2. DETAILED INTERNET POLICY PROVISIONS ...................................................................................5 A) M ANAGEMENT AND ADMINISTRATION ......................................................................................... 5 B) T ECHNICAL ........................................................................................................................................ 8 C) SECURITY........................................................................................................................................... 9 3. DECLARATION...............................................................................................................................................10 4. SIGNOFF ............................................................................................................................................................10 3
  • 4. 1. POLICY OVERVIEW Information Technology and Computing Services (ITC) provides access to the vast information resources of the Internet to help you do your job faster and smarter, and be a well-informed business citizen. The facilities to provide that access represent a considerable commitment of company resources for telecommunications, networking, software, storage, etc. This Internet usage policy is designed to help you understand our expectations for the use of those resources in the particular conditions of the Internet, and to help you use those resources wisely. While we’ve set forth explicit requirements for Internet usage below, we’d like to start by describing our Internet usage philosophy. First and foremost, the Internet for GOVNET is a business tool, provided to you at significant cost. That means we expect you to use your Internet access [primarily] for business-related purposes, i.e., to communicate with customers and suppliers, to research relevant topics and obtain useful business information [except as outlined below]. We insist that you conduct yourself honestly and appropriately on the Internet, and respect the copyrights, software licensing rules, property rights, privacy and prerogatives of others, just as you would in any other business dealings. To be absolutely clear on this point, all existing company policies apply to your conduct on the Internet, especially (but not exclusively) those that deal with intellectual property protection, privacy, misuse of company resources, sexual harassment, information and data security, and confidentiality. Unnecessary or unauthorized Internet usage causes network and server congestion. It slows other users, takes away from work time, consumes supplies, and ties up printers and other shared resources. Unlawful Internet usage may also garner negative publicity for the Fiji Government and expose the firm to significant legal liabilities. The chats, newsgroups and email of the Internet give each individual Internet user an immense and unprecedented reach to propagate company messages and tell our business story. Because of that power we must take special care to maintain the clarity, consistency and integrity of the Fiji Government’s corporate image and posture. Anything any one employee writes in the course of acting for the Fiji Government on the Internet can be taken as representing the Fiji Government ’s corporate posture. That is why we expect you to forgo a measure of your individual freedom when you participate in chats or newsgroups on company business, as outlined below. 4
  • 5. While our direct connection to the Internet offers a cornucopia of potential benefits, it can also open the door to some significant risks to our data and systems if we do not follow appropriate security discipline. As presented in greater detail below, that may mean preventing machines with sensitive data or applications from connecting to the Internet entirely, or it may mean that certain users must be prevented from using certain Internet features like file transfers. The overriding principle is that security is to be everyone’s first concern. An Internet user can be held accountable for any breaches of security or confidentiality. Certain terms in this policy should be understood expansively to include related concepts. Company includes our affiliates, subsidiaries, and branches. Document covers just about any kind of file that can be read on a computer screen as if it were a printed page, including the so-called HTML files read in an Internet browser, any file meant to be accessed by a word processing or desk-top publishing program or its viewer, or the files prepared for the Adobe Acrobat reader and other electronic publishing tools. Graphics includes photographs, pictures, animations, movies, or drawings. Display includes monitors, flat-panel active or passive matrix displays, monochrome LCDs, projectors, televisions and virtual-reality tools. All employees granted Internet access with company facilities will be provided with a written copy of this policy. All Internet users must sign the following statement: "I have a received a written copy of my company’s Internet usage policy. I fully understand the terms of this policy and agree to abide by them. I realize that ITC’s security software may record for management use the Internet address of any site that I visit and keep a record of any network activity in which I transmit or receive any kind of file. I acknowledge that any message I send or receive will be recorded and stored in an archive file for management use. I know that any violation of this policy could lead to dismissal or even criminal prosecution." 2. DETAILED INTERNET POLICY PROVISIONS A) Management and Administration ITC has software and systems in place that can monitor and record all Internet usage. We want you to be aware that our security systems are capable of recording (for each and every user) each World Wide Web site visit, each chat, newsgroup or email message, and each file transfer into and out of our internal networks, and we reserve the right to do so at any time. No employee should have any expectation of privacy as to his or her Internet usage. Our managers will review Internet activity and analyze usage patterns, and they may choose to publicize this data to assure that 5
  • 6. company Internet resources are devoted to maintaining the highest levels of productivity. We reserve the right to inspect any and all files stored in private areas of our network in order to assure compliance with policy. The display of any kind of sexually explicit image or document on any company system is a violation of our policy on sexual harassment. In addition, sexually explicit material may not be archived, stored, distributed, edited or recorded using our network or computing resources. ITC uses independently-supplied software and data to identify inappropriate or sexually-explicit Internet sites. We may block access from within our networks to all such sites that we know of. If you find yourself connected incidentally to a site that contains sexually explicit or offensive material, you must disconnect from that site immediately, regardless of whether that site had been previously deemed acceptable by any screening or rating program. This company’s Internet facilities and computing resources must not be used knowingly to violate the laws and regulations of Fiji or any other nation, or the laws and regulations of any state, city, province or other local jurisdiction in any material way. Use of any company resources for illegal activity is grounds for immediate dismissal, and we will cooperate with any legitimate law enforcement activity. Any software or files downloaded via the Internet into the GOVNET network become the property of ITC. Any such files or software may be used only in ways that are consistent with their licenses or copyrights. No employee may use company facilities knowingly to download or distribute pirated software or data. No employee may use GOVNET’s Internet facilities to deliberately propagate any virus, worm, Trojan horse, or trap-door program code. No employee may use GOVNET’s Internet facilities knowingly to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user. Each employee using the Internet facilities of GOVNET shall identify himself or herself honestly, accurately and completely (including one’s company affiliation and function where requested) when participating in 6
  • 7. chats or newsgroups, or when setting up accounts on outside computer systems. Only those employees or officials who are duly authorized to speak to the media, to analysts or in public gatherings on behalf of GOVNET may speak/write in the name of GOVNET to any newsgroup or chat room. Other employees may participate in newsgroups or chats in the course of business when relevant to their duties, but they do so as individuals speaking only for themselves. Where an individual participant is identified as an employee or agent of this company, the employee must refrain from any unauthorized political advocacy and must refrain from the unauthorized endorsement or appearance of endorsement by GOVNET of any commercial product or service not sold or serviced by this company, its subsidiaries or its affiliates. Only those managers and company officials who are authorized to speak to the media, to analysts or in public gatherings on behalf of GOVNET may grant such authority to newsgroup or chat room participants. ITC retains the copyright to any material posted to any forum, newsgroup, chat or World Wide Web page by any employee in the course of his or her duties. Employees are reminded that chats and newsgroups are public forums where it is inappropriate to reveal confidential company information, customer data, trade secrets, and any other material covered by existing company secrecy policies and procedures. Employees releasing protected information via a newsgroup or chat – whether or not the release is inadvertent – will be subject to all penalties under in existing data security policies and procedures. Use of company Internet access facilities to commit infractions such as misuse of company assets or resources, sexual harassment, unauthorized public speaking and misappropriation or theft of intellectual property are also prohibited by general company policy, and will be sanctioned under the relevant provisions of the personnel handbook. ITC will limit Internet access to those employees who demonstrate a legitimate business need. Recommendations must be given from managers within the section, and to also include time slots, sites to visit and reasons for going to the site. Since a wide variety of materials may be deemed offensive by colleagues, customers or suppliers, it is a violation of company policy to store, view, 7
  • 8. print or redistributes any document or graphic file that is not directly related to the user’s job or the Fiji Government ’s business activities. Employees may use their Internet facilities for non-business research or browsing during meal time or other breaks, or outside of work hours, provided that all other usage policies are adhered to. ITC will comply with reasonable requests from law enforcement and regulatory agencies for logs, diaries and archives on individuals’ Internet activities. Employees with Internet access may download only software with direct business use, and must arrange to have such software properly licensed and registered. Downloaded software must be used only under the terms of its license. Employees with Internet access may not use company Internet facilities to download entertainment software or games, or to play games against opponents over the Internet. Employees with Internet access may not use company Internet facilities to download images or videos unless there is an explicit business-related use for the material. Employees with Internet access may not upload any software licensed to the Fiji Government or data owned or licensed by the Fiji Government without explicit authorization from the manager responsible for the software or data. B) Technical User IDs and passwords help maintain individual accountability for Internet resource usage. Any employee who obtains a password or ID for an Internet resource must keep that password confidential. Company policy prohibits the sharing of user IDs or passwords obtained for access to Internet sites. Any file that is downloaded must be scanned for viruses before it is run or accessed. Video and audio streaming and downloading technologies represent significant data traffic which can cause local network congestion. Video and audio downloading are can only be done with prior approval from ITC. 8
  • 9. C) Security ITC has installed [a variety of firewalls, proxies, Internet address screening programs and other security systems] to assure the safety and security of the Fiji Government’s networks. Any employee who attempts to disable, defeat or circumvent any company security facility will be subject to immediate dismissal. Computers that use their own modems to create independent data connections sidestep our network security mechanisms. An individual computer’s private connection to any outside computer can be used by an attacker to compromise any company network to which that computer is attached. That is why any computer used for independent dial-up or leased- line connections to any outside computer or network must be physically isolated from company’s internal networks. Only those Internet services and functions with documented business purposes for this company will be enabled at the Internet firewall. - However, users with a specific business need for FTP may request such access in writing from the IS/IT/department management. Any machine used for FTP may not contain any sensitive applications or data. Any machine used for FTP must be isolated from all servers that contain sensitive applications or data. Any machine used for FTP can be used only for Internet access and must be isolated completely from all internal networks and servers. FTP will be disabled for users on networks used for running mission- critical applications or the storage and production of core business data. 9
  • 10. 3. DECLARATION I have read, understand and acknowledge receipt of the Internet Usage policy. I will comply with the guidelines set out in this policy and understand that failure to do so might result in withdrawal of services and disciplinary or legal action. 4. SIGNOFF Quality Assurance PC/Server Team Name: Name: Date: Date: Signature: Signature: Database Support Team Development Team Name: Name: Date: Date: Signature: Signature: 10