Acceptable usage policy
This acceptable usage policy covers the security and use of all BSU information and it equipment. It also includes the use of email, internet, voice and mobile it equipment. This policy applies to all BSU employees, contractors, partners and agents (hereafter referred to as ‘individuals’).
This policy applies to all information, in whatever form, relating to BSU business activities worldwide, and to all information handled by (BSU relating to other organisations with whom it deals. It also covers all it and information communications facilities operated by BSU or on its behalf.
Computer access control – individual’s responsibility
Access to BSU it systems is controlled by the use of user ids, passwords and/or pin. All user ids and passwords are to be uniquely assigned to named individuals and consequently, individuals are accountable for all actions on the BSU it systems.
Individuals must not:
- Allow anyone else to use their user id/ pin and password on any BSU it system.
- Leave their user accounts, logged in at an unattended and unlocked computer.
- Use someone else’s user id and password to access BSU it systems.
- Leave their password unprotected (for example writing it down).
- Perform any unauthorised changes to BSU it systems or information.
- Attempt to access data that they are not authorised to use or access.
- Exceed the limits of their authorisation or specific business need to interrogate the system or data.
- Connect any non- BSU authorised device to the BSU network or it systems.
- Store BSU data on any non-authorised BSU equipment.
- Give or transfer BSU data or software to any person or organisation outside BSU without the authority of senior management and CEO.
- Line managers/ co-odinators must ensure that individuals are given clear direction on the extent and limits of their authority with regard to it systems and data.
Internet, social media and email conditions of use
Use of BSU internet, social media and email is intended for business use. Personal access is permitted, where such use does not affect the individual’s business performance; is not detrimental to BSU in any way; is not in breach of our terms and conditions of employment; which does not place the individual or BSU in breach of statutory or other legal obligations.
All individuals are accountable for their actions on the internet, social media and email systems.
Individuals must not:
- Use the internet, social media and email for the purposes of harassment, abuse or bullying.
- Use profanity, obscenities, or derogatory remarks in communications.
- Access, download, send or receive any data (including images), which (acme corporation) considers offensive in any way, including sexually explicit, discriminatory, defamatory or libellous material.
- Use the internet, social media and email to make personal gains or conduct a personal business.
- Use the internet, social media and email to gamble.
- Use the internet, social media and email systems in a way that could affect its reliability or effectiveness, for example distributing chain letters or spam.
- Place any information on the internet, social media and email that relates to Revo Seccus , alter any information about it, or express any opinion about Revo Seccus , unless they are specifically authorised to do this.
- Send unprotected sensitive or confidential information externally.
- Forward BSU mail to personal (non-acme corporation) email accounts (for example a personal hotmail account).
- Make official commitments through the internet or email on behalf of BSU unless authorised to do so.
- Download copyrighted material such as music media files, film and video files without appropriate approval.
- In any way infringe any copyright, database rights, trademarks or other intellectual property.
- Download any software from the internet, social media and email without prior approval of the it department.
- Connect BSU devices to the internet using non-standard connections.
Clear desk and clear screen policy
In order to reduce the risk of unauthorised access or loss of information, BSU enforces a clear desk and screen policy as follows:
- Personal or confidential business information must be protected using security features provided, for example secure print on printers.
- Computers must be logged off/locked or protected with a screen locking mechanism controlled by a password when unattended.
- Care must be taken to not leave confidential material on screen, printers or photocopiers.
- All business-related printed matter must be disposed of using confidential waste bins or shredders.
It is accepted that laptops and mobile devices will be taken off-site. The following controls must be applied:
- Working away from the office must be in line with BSU remote working policy.
- Equipment and media taken off-site must not be left unattended in public places and not left in sight in a car.
- Information should be protected against loss or compromise when working remotely (for example at home or in public places). Laptop encryption must be used.
- Particular care should be taken with the use of mobile devices such as laptops, mobile phones, smartphones and tablets. They must be protected at least by a password or a pin and, where available, encryption.
Mobile storage devices
- Mobile devices such as memory sticks, CDs, DVDs and removable hard drives must be used only in situations when network connectivity is unavailable or there is no other secure method of transferring data. Only BSU authorised mobile storage devices with encryption enabled must be used, when transferring sensitive or confidential data.
- Employees must use only software that is authorised by BSU on BSU computers. Authorised software must be used in accordance with the software supplier’s licensing agreements. All software on BSU computers must be approved and installed by the BSU it department.
Individuals must not:
- Store personal files such as music, video, photographs or games on residents running projects It equipment.
- The IT department has implemented centralised, automated virus detection and virus software updates within the residents running projects. All pcs have antivirus software installed to detect and remove any virus automatically.
Individuals must not:
- Remove or disable anti-virus software.
- Attempt to remove virus-infected files or clean up an infection, other than by the use of approved BSU anti-virus software and procedures.
Telephony (voice) equipment conditions of use
- Use of BSU voice equipment is intended for business use. Individuals must not use BSU voice facilities for sending or receiving private communications on personal matters, except in exceptional circumstances. All non-urgent personal communications should be made at an individual’s own expense using alternative means of communications
Individuals must not:
- Use BSU voice for conducting private business.
- Make hoax or threatening calls to internal or external destinations.
- Accept reverse charge calls from domestic or international operators, unless it is for business use.
Actions upon termination of contract
- All BSU equipment and data, for example laptops and mobile devices including telephones, smartphones, usb memory devices and CDs/DVDs, must be returned to BSU at termination of contract.
- All BSU data or intellectual property developed or gained during the period of employment remains the property of BSU and must not be retained beyond termination or reused for any other purpose.
Monitoring and filtering
- All data that is created and stored on BSU computers is the property of BSU and there is no official provision for individual data privacy, however wherever possible BSU will avoid opening personal emails.
- It system logging will take place where appropriate, and investigations will be commenced where reasonable suspicion exists of a breach of this or any other policy. BSU has the right (under certain conditions) to monitor activity on its systems, including internet and email use, in order to ensure systems security and effective operation, and to protect against misuse.
- Any monitoring will be carried out in accordance with audited, controlled internal processes, the UK data protection act 1998, the regulation of investigatory powers act 2000 and the telecommunications (lawful business practice interception of communications) regulations 2000.
This policy must be read in conjunction with:
Computer misuse act 1990
Data protection act 1998