Monitoring Computer and Network Use Policy
The policy aims to set expectations for staff on the degree of privacy they can expect when using Ïã¸ÛÁùºÏ²ÊÖÐÌØÍø IT systems and equipment.
Overview
There are circumstances where Ïã¸ÛÁùºÏ²ÊÖÐÌØÍø may monitor or record communications made using its computer and telecommunication systems, or examine material stored on those systems. This document sets out Ïã¸ÛÁùºÏ²ÊÖÐÌØÍø's policy in respect of such activity.
Contents include
- In what circumstances can monitoring occur
- Monitoring for operational reasons
- Monitoring for policy (and legal) compliance
- Who can authorize monitoring of computer or network use
- Procedures for monitoring computer or network use
- Access to stored documents (including email) for business purposes
- Exceptional Modification of User Files
Who should read this policy
- All staff
- Contractors
- Temporary staff
- Students
- Visitors
- Managers
- Teaching staff
- Student support staff
- Researchers
Policy
/information-security/sites/information-security/files/monitoring.pdf
Last updated: Monday, April 10, 2017