I.T. Acceptable Use Policy - Health Service Executive
I.T. Acceptable Use Policy - Health Service Executive
I.T. Acceptable Use Policy - Health Service Executive
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Health</strong> <strong>Service</strong> <strong>Executive</strong><br />
Information Technology <strong>Acceptable</strong> <strong>Use</strong> <strong>Policy</strong><br />
1) For excessive personal use;<br />
2) For commercial activities, such as running any sort of private business,<br />
advertising or performing work for personal gain or profit;<br />
3) For political activities, such as promoting a political party / movement, or a<br />
candidate for political office, or campaigning for or against government decisions;<br />
4) To knowingly misrepresent the HSE;<br />
5) To transmit confidential or restricted information outside the HSE unless the<br />
information has been encrypted and transmission has been authorised by their<br />
HSE line manager (at grade 8 level or above);<br />
6) To store or transfer confidential or restricted information(encrypted or otherwise)<br />
onto an unapproved USB memory stick;<br />
7) To enter into contractual agreements inappropriately (i.e. without authorisation or<br />
where another form of agreement is required);<br />
8) To create, view, download, host or transmit material (other than users who are<br />
authorised by the HSE to access such material for research etc.) of a pornographic<br />
or sexual nature or which may generally be considered offensive or obscene and<br />
could cause offence to others on the grounds of race, creed, gender, sexual<br />
orientation, disability, age or political beliefs. material is defined as information<br />
(irrespective of format), images, video clips, audio recordings etc;<br />
9) To retrieve, create, host or transmit material which is designed to cause<br />
annoyance, inconvenience or needless anxiety to others;<br />
10) To retrieve, create, host or transmit material which is defamatory;<br />
11) For any activity that would infringe intellectual property rights (e.g. unlicensed<br />
installation, distribution or copying of copyrighted material);<br />
12) For any activity that would compromise the privacy of others;<br />
13) For any activity that would intentionally cause disruption to the computer<br />
systems, telephone systems or networks belonging to the HSE or others;<br />
14) For any activity that would deliberately cause the corruption or destruction of data<br />
belonging to the HSE or others;<br />
15) For any activity that would intentionally waste the HSE’s resources (e.g. staff<br />
time and Information Technology (I.T.) resources);<br />
16) For any activity that would intentionally compromise the security of the HSE’s<br />
Information Technology (I.T.) resources, including the confidentiality and<br />
integrity of information and availability of IT resources (e.g. by deliberately or<br />
carelessly causing computer virus and malicious software infection);<br />
17) For the installation and use of software or hardware tools which could be used to<br />
probe or break the HSE I.T. security controls;<br />
Version 3.0 25 February 2013