SCOPE OF POLICY
Computer systems and equipment, including networks and internet access, in use within Hickling Barn.
This policy sets out the guiding principles for use of Hickling Barn computer equipment, networks and internet services.
Computer use must comply with the standards and practices of all village hall service provision and on no account are Hickling Barn computers and networks to be used for accessing and/or downloading inappropriate content in the form of software, images, audio files or other variations of pornographic or undesirable material. They must not be used to communicate such files, images or access forums where they might be exchanged. Communications must be restricted to approved uses and under no circumstances be used to express or exchange defamatory, racist, sexist, anti-religious or any other form of offensive communication. These statements are made here to set the tone of the policy and are not an exclusive list of inappropriate use.
1. The purpose of this policy is to enable Hickling Barn to have a computer environment that its users can trust
2. The trustees have approved this policy
3. Computer systems will be protected against unauthorised access
4. Internet access is only available to approved users
5. Regulatory and legal requirements will be met
6. The role and responsibility for co-ordinating computer security will be performed by the computer security manager
4. Any exceptions to these policies must have the written approval of the trustees
5. This policy and its supplementary policies will be reviewed at least annually, by the computer security manager in conjunction with the trustees
6. IT IS THE RESPONSIBILITY OF ALL USERS, HIRERS, AND THEIR USERS TO ADHERE TO THIS POLICY
1. Computer assets must only be used in accordance of the guiding principles of Hickling Barn and the terms and conditions of Barn use
2. External Users (third parties, suppliers, etc.) who use the Barn
3. Hickling Barn systems or data must be authorised to do so by the trustees or under the terms and conditions of the hire agreement
4. The computers and peripherals, including network devices should be secured in a locked cupboard within Hickling Barn when not in use
5. Wireless access, if available must be through a secure hidden connection with strong password protection and device address restriction
6. Access to the physical network must remain secure and it must not be possible for any unapproved party to make a connection to the BT circuit
1. Only licensed software programs to be installed on Hickling Barn computer systems and licence keys to be held securely by the computer security manager
2. Hickling Barn computers and networks must be protected at all times by up-to-date anti-virus and access prevention systems. Network devices must be configured to block inbound connections
3. Any incidence of malicious code, whether actual or suspected, should be reported immediately to the computer security manager who will treat the event as a security incident.
4. Use of attachable external media should be avoided but when use is necessary and approved within the context of the use of the computer systems, it must be restricted to the exchange of legitimate data files and not be used to add or remove software or inappropriate content.
INTERNET AND E-MAIL USE
1. Computer users should be aware there is no such thing as confidential e-mail unless appropriate security measures are put in place. Nothing should be written in any e-mail, either internal or external, that is confidential or could potentially bring Hickling Barn into disrepute
2. Correspondence via e-mail should not contain any personal data
3. E-mail must not contain any material that may be deemed threatening, harassing, defamatory, libellous, offensive or obscene
4. It is strictly forbidden to run non-approved software on Hickling Barn computers, whether or not such software is received via the internet. Files found in contravention of this may be deleted without notice. File attachments received in e-mail that may reasonably be assumed to be non-business-related should not be opened
5. Computer users who use the Internet on Hickling Barn computers must not visit sites which could contain material which may embarrass Hickling Barn or its trustees or offend other volunteers or users in any way.
6. Mail (both incoming and outgoing) and internet browsing may be monitored to ensure compliance with this policy
7. All connections to the internet must be via the secure Hickling Barn internet connection unless explicit permission has been given in advance by the computer security manager
1. The system backup and restore responsibility lies with the computer security manager.
2. In the event of a system crash or corruption the computer security manager will restore the system to its base configuration.
3. Hickling Barn does not provide computer systems for purposes other than training and does not operate a data backup regime. Hickling Barn computer systems should not therefore be used to store any data that must not be subject to risk of loss or deletion