On Thu, 28 Jul 2005, Steel, Rachael wrote:
> I am enquiring as to whether anyone on the list has created a policy (or
> guidelines) on severity scales for breaches/abuse of the Internet or
> Emails. We are looking to produce something that will be linked to
> disciplinary actions so as to ensure consistency throughout the
> organisation.
>
> Any thoughts, comments or links to good sites would be much appreciated,
> thanks
Here is something I have saved that may help a little:
http://www.seattleu.edu/it/policies/cupolicy.asp
I haven't made a note of any similar ones in my travels (while reviewing
some of our policies here).
Jethro.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Jethro R Binks
Computing Officer, IT Services
University Of Strathclyde, Glasgow, UK
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|