ࡱ>  ;bjbj <t2C**mm) ) ) = = = 8u I!T= }";%L%%%)/1}}}}}}} T}) }2a)|)"}2}2}mm%%}555}2vm%) %}5}2}55v 6e|%#= 2x:}}0}yR3te|) e|}2}25}2}2}2}2}2}}5}2}2}2}}2}2}2}2}2}2}2}2}2}2}2}2}2* 3:    Document Control Organisation[Council Name]Title[Document Title]Author[Document Author Named Person]Filename[Saved Filename]Owner[Document Owner Job Role]Subject[Document Subject e.g. IT Policy]Protective Marking[Marking Classification]Review date Revision History Revision DateRevisorPrevious VersionDescription of Revision Document Approvals This document requires the following approvals: Sponsor ApprovalNameDate Document Distribution This document will be distributed to: NameJob TitleEmail Address Contributors Development of this policy was assisted through information provided by the following organisations: Devon County CouncilSefton Metropolitan Borough CouncilDudley Metropolitan Borough CouncilStaffordshire ConnectsHerefordshire County CouncilWest Midlands Local Government AssociationPlymouth City CouncilWorcestershire County CouncilSandwell Metropolitan Borough Council Contents  TOC \o "1-3" \h \z \u  HYPERLINK \l "_Toc216239292" 1 Policy Statement  PAGEREF _Toc216239292 \h 4  HYPERLINK \l "_Toc216239293" 2 Purpose  PAGEREF _Toc216239293 \h 4  HYPERLINK \l "_Toc216239294" 3 Scope  PAGEREF _Toc216239294 \h 4  HYPERLINK \l "_Toc216239295" 4 Definition  PAGEREF _Toc216239295 \h 4  HYPERLINK \l "_Toc216239296" 5 Risks  PAGEREF _Toc216239296 \h 4  HYPERLINK \l "_Toc216239297" 6 Applying the Policy  PAGEREF _Toc216239297 \h 4  HYPERLINK \l "_Toc216239298" 6.1 Software Acquisition  PAGEREF _Toc216239298 \h 4  HYPERLINK \l "_Toc216239299" 6.2 Software Registration  PAGEREF _Toc216239299 \h 5  HYPERLINK \l "_Toc216239300" 6.3 Software Installation  PAGEREF _Toc216239300 \h 5  HYPERLINK \l "_Toc216239301" 6.4 Software Development  PAGEREF _Toc216239301 \h 6  HYPERLINK \l "_Toc216239302" 6.5 Personal Computer Equipment  PAGEREF _Toc216239302 \h 6  HYPERLINK \l "_Toc216239303" 6.6 Software Misuse  PAGEREF _Toc216239303 \h 6  HYPERLINK \l "_Toc216239304" 7 Policy Compliance  PAGEREF _Toc216239304 \h 6  HYPERLINK \l "_Toc216239305" 8 Policy Governance  PAGEREF _Toc216239305 \h 7  HYPERLINK \l "_Toc216239306" 9 Review and Revision  PAGEREF _Toc216239306 \h 7  HYPERLINK \l "_Toc216239307" 10 References  PAGEREF _Toc216239307 \h 7  HYPERLINK \l "_Toc216239308" 11 Key Messages  PAGEREF _Toc216239308 \h 8  HYPERLINK \l "_Toc216239309" 12 Appendix 1  PAGEREF _Toc216239309 \h 9  Policy Statement [Council Name] will ensure the acceptable use of software by all users of the Councils computer equipment or Information Systems. Purpose The purpose of this document is to state the software policy of [Council Name]. All existing Council policies apply to your conduct with regard to software, especially (but not limited to) the following [amend list as appropriate]: Email Policy. Internet Acceptable Usage Policy. IT Access Policy. Remote Working Policy. Scope This document applies to all Councillors, Committees, Departments, Partners, Employees of the Council, contractual third parties and agents of the Council who have access to Information Systems or information used for [Council Name] purposes. Definition This policy should be applied at all times that the Councils computer equipment or Information Systems are used. Risks [Council name] recognises that there are risks associated with users accessing and handling information in order to conduct official Council business. This policy aims to mitigate the following risks: [List appropriate risks relevant to the policy e.g. the non-reporting of information security incidents, inadequate destruction of data, the loss of direct control of user access to information systems and facilities etc.]. Non-compliance with this policy could have a significant effect on the efficient operation of the Council and may result in financial loss and an inability to provide necessary services to our customers. Applying the Policy Software Acquisition All software acquired by [Council Name] must be purchased through the [Name a department e.g. Procurement Department]. Software may not be purchased through user corporate credit cards, petty cash, travel or entertainment budgets. Software acquisition channels are restricted to ensure that [Council Name] has a complete record of all software that has been purchased for [Council Name] computers and can register, support, and upgrade such software accordingly. This includes software that may be downloaded and/or purchased from the Internet. Under no circumstances should personal or unsolicited software (this includes screen savers, games and wallpapers etc.) be loaded onto a Council machine as there is a serious risk of introducing a virus. Software Registration The Council uses software in all aspects of its business to support the work carried out by its employees. In all instances every piece of software is required to have a licence and the Council will not condone the use of any software that does not have a licence. Software must be registered in the name of [Council Name] and the department in which it will be used. Due to personnel turnover, software will never be registered in the name of the individual user. The [Name a department e.g. IT Helpdesk] maintains a register of all [Council Name] software and will keep a library of software licenses. The register must contain: The title and publisher of the software. The date and source of the software acquisition. The location of each installation as well as the serial number of the hardware on which each copy of the software is installed. The existence and location of back-up copies. The software product's serial number. Details and duration of support arrangements for software upgrades. Software on Local Area Networks or multiple machines shall only be used in accordance with the licence agreement. [Council Name] holds licences for the use of a variety of software products on all Council Information Systems and computer equipment. This software is owned by the software company and the copying of such software is an offence under the Copyright, Designs and Patents Act 1988, unless authorised by the software manufacturer. It is the responsibility of users to ensure that all the software on their computer equipment is licensed. Software Installation Software must only be installed by the [Name a department e.g. IT Helpdesk] once the registration requirements have been met. Once installed, the original media will be [insert council storage procedure here e.g. kept in a safe storage area maintained by the IT Helpdesk]. Software may not be used unless approved by the [Name a role e.g. Head of Department], or their nominated representative. Shareware, Freeware and Public Domain Software are bound by the same policies and procedures as all other software. No user may install any free or evaluation software onto the Councils systems without prior approval from Information Services [or equivalent department]. Software Development All software, systems and data development for the Council is to be used only for the purposes of the Council. Software must not be changed or altered by any user unless there is a clear business need. All changes to software should be authorised before the change is implemented. A full procedure should be in place and should include, but not be limited to, the following steps [amend as appropriate or replace with your own procedure]: Change requests affecting a software asset should be approved by the software assets owner. All change requests should consider whether the change is likely to affect existing security arrangements and these should then be approved. A record should be maintained of agreed authorisation levels. A record should also be maintained of all changes made to software. Changes to software that have to be made before the authorisation can be granted should be controlled. Personal Computer Equipment [Council Name] computers are Council-owned assets and must be kept both software legal and virus free. Only software acquired through the procedures outlined above may be used on [Council Name] machines. Users are not permitted to bring software from home (or any other external source) and load it onto [Council Name] computers. Generally, Council-owned software cannot be taken home and loaded on a user's home computer if it also resides on a [Council Name] computer. If a user needs to use software at home, [insert council procedure here e.g. purchase a separate package and record it as a Council-owned asset in the software register]. Software Misuse [Council Name] will ensure that Personal Firewalls are installed where appropriate. Users must not attempt to disable or reconfigure the Personal Firewall software. It is the responsibility of all Council staff to report any known software misuse to the appropriate [Name a role e.g. Head of Department]. Councillors should inform the [Name a role e.g. Members ICT Support Officer] of such instances. According to the Copyright, Designs and Patents Act 1988, illegal reproduction of software is subject to civil damages and criminal penalties. Any [Council Name] user who makes, acquires, or uses unauthorised copies of software will be disciplined as appropriate under the circumstances. [Council Name] does not condone the illegal duplication of software and will not tolerate it. Policy Compliance If any user is found to have breached this policy, they may be subject to [Council Names] disciplinary procedure. If a criminal offence is considered to have been committed further action may be taken to assist in the prosecution of the offender(s). If you do not understand the implications of this policy or how it may apply to you, seek advice from [name appropriate department]. Policy Governance The following table identifies who within [Council Name] is Accountable, Responsible, Informed or Consulted with regards to this policy. The following definitions apply: Responsible the person(s) responsible for developing and implementing the policy. Accountable the person who has ultimate accountability and authority for the policy. Consulted the person(s) or groups to be consulted prior to final policy implementation or amendment. Informed the person(s) or groups to be informed after policy implementation or amendment. Responsible[Insert appropriate Job Title e.g. Head of Information Services, Head of Human Resources etc.]Accountable[Insert appropriate Job Title e.g. Section 151 Officer, Director of Finance etc. It is important that only one role is held accountable.]Consulted[Insert appropriate Job Title, Department or Group e.g. Policy Department, Employee Panels, Unions etc.]Informed[Insert appropriate Job Title, Department or Group e.g. All Council Employees, All Temporary Staff, All Contractors etc.] Review and Revision This policy will be reviewed as it is deemed appropriate, but no less frequently than every 12 months. Policy review will be undertaken by [Name an appropriate role]. References The following [Council Name] policy documents are directly relevant to this policy, and are referenced within this document [amend list as appropriate]: Email Policy. Internet Acceptable Usage Policy. IT Access Policy. Remote Working Policy. The following [Council Name] policy documents are indirectly relevant to this policy [amend list as appropriate]: GCSx Acceptable Usage Policy and Personal Commitment Statement. Computer, Telephone and Desk Use Policy. Legal Responsibilities Policy. Removable Media Policy. Information Protection Policy. Human Resources Information Security Standards. Information Security Incident Management Policy. IT Infrastructure Policy. Communications and Operation Management Policy. Key Messages All software acquired must be purchased through the [Name a department e.g. Procurement Department]. Under no circumstances should personal or unsolicited software be loaded onto a Council machine. Every piece of software is required to have a licence and the Council will not condone the use of any software that does not have a licence. Unauthorised changes to software must not be made. Users are not permitted to bring software from home (or any other external source) and load it onto Council computers. Users must not attempt to disable or reconfigure the Personal Firewall software. Illegal reproduction of software is subject to civil damages and criminal penalties. Appendix 1 [Include any relevant associated information within appendices. This may include any templates or forms that need to be completed as stated within the policy]     Software Policy FINAL COPY v2.0 Page  PAGE \* MERGEFORMAT 2 of  NUMPAGES \* Arabic \* MERGEFORMAT 9 DRAFT v0.1 Page  PAGE \* MERGEFORMAT 1 of  NUMPAGES \* Arabic \* MERGEFORMAT 3 [Local Authority Logo] Policy Document Software Policy [Date]   #$56CQRSYZikqrs * , 8 : ͼ͋zi͋z͋zͼͼͼ͜ hYdhYd5B*CJ^Jph *h7h7B*CJ^Jph *h7h}B*CJ^JphhYdhB*CJ^Jph *h}hB*CJ^Jph *h}h}B*CJ^Jph hYdh5B*CJ^Jphhk h5 hk h hk hjhk hU'    !gdk !"#56CRSYVkd$$Ifl40j 5&j  t05&644 lalf4ytYd $If^gd E $If^gd^gdk gdk Yjkrqd $If^gdkd$$Ifl40j 5&j  t05&644 lalf4ytYd $If^gd7~qd $If^gd7 $If^gdkdF$$Ifl40j 5&j  t05&644 lalf4ytYd~qq $If^gdkd$$Ifl40j 5&j  t05&644 lalf4ytYd~qq $If^gdkd$$Ifl40j 5&j  t05&644 lalf4ytYd + ~qq $If^gdkd/$$Ifl40j 5&j  t05&644 lalf4ytYd+ , 8 9 ~qq $If^gdkd$$Ifl40j 5&j  t05&644 lalf4ytYd9 : ; L M [ c t ~ypk^Q^Q H$If^Hgd H$If^HgdYdgdk ^gdk gdkdu$$Ifl40j 5&j  t05&644 lalf4ytYd: ; C L M V Z [ b c s      " # 8 9 : ` d e n o | ~ ͼͼͼͼͲ~uou hhCJhhhhCJhhhh5hh hYd5hYd5B*CJ^JphhmzhYdCJhYdhYd5hYdhB*^Jph hYdhYd5B*CJ^Jph hYdh5B*CJ^Jph hk hYdhk h5hk hYd5hYdB*^Jph+ XKKKK H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^HgdkdT$$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^Hgdkd# $$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^Hgdkd $$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^Hgdkd $$Ifl4\  % $ t0%644 lalf4ytYd  XVMMM@@ H$If^Hgd^gdYdkd $$Ifl4\  % $ t0%644 lalf4ytYd      ^kd_ $$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd H$If^Hgd     k^^^ H$If^Hgdkd $$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd   ! k^^^ H$If^Hgdkd $$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd! " # 9 : ` e o } kbbbbUUU H$If^Hgd^gdYdkd$$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd} ~  k^^^ H$If^HgdkdC$$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd k^^^ H$If^Hgdkd$$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd k^^^ H$If^Hgdkd$$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd  7 kbbbbQ@ & F>$If^>gdL<{ & F7$If^7gdL<{^gd=*kdn$$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd  6 \ r t    # $ % & = > ? @ \ ] ^ _ ` a q r ʻ~_ShM|ShM|SCJaJ<hM|ShM|SB*CJOJQJ\^JaJmHnHphsH tH 'jhM|ShM|S0JCJUaJhM|ShM|S0JCJaJ!jhM|ShM|S0JCJUaJhM|ShM|SCJaJjhM|ShM|SCJUaJh=*h=*5 hM|S5hk h5hhhCJhL<{hULCJhL<{hhCJ hULCJ7 8 \ s t 5Tkd$$Ifl0&$  t/'644 laytL<{ & F>$If^>gdL<{ & F7$If^7gdL<{Tkd'$$Ifl0&$  t/'644 laytL<{  5TkdG$$Ifl0&$  t/'644 laytL<{ & F>$If^>gdL<{ & F7$If^7gdL<{Tkd$$Ifl0&$  t/'644 laytL<{   $ % ) x u-@^gd=*Tkd$$Ifl0&$  t/'644 laytL<{ $If^gdL<{r s ﵖ~jVﵖ~&j~hM|ShM|SCJUaJ'jhM|ShM|S0JCJUaJhM|ShM|SCJaJhM|ShM|S0JCJaJ<hM|ShM|SB*CJOJQJ\^JaJmHnHphsH tH !jhM|ShM|S0JCJUaJhULCJaJ&jhM|ShM|SCJUaJhM|ShM|SCJaJ jhM|ShM|SCJUaJ     # $ % & ' ( ) * + G H I J K L V W X r ͮ͢}tڮiUͮ͢'jhM|ShM|S0JCJUaJhM|ShM|SCJaJhULCJaJ&jxhM|ShM|SCJUaJ jhM|ShM|SCJUaJhM|ShM|SCJaJ<hM|ShM|SB*CJOJQJ\^JaJmHnHphsH tH hM|ShM|S0JCJaJ!jhM|ShM|S0JCJUaJ'jhM|ShM|S0JCJUaJr s t u v w x y z vjjV&jlhM|ShM|SCJUaJhM|ShM|SCJaJ'jhM|ShM|S0JCJUaJhM|ShM|SCJaJhM|ShM|S0JCJaJ<hM|ShM|SB*CJOJQJ\^JaJmHnHphsH tH !jhM|ShM|S0JCJUaJhULCJaJ jhM|ShM|SCJUaJ&jrhM|ShM|SCJUaJ 89:;>ͮ͢}tڮdP'jhM|ShM|S0JCJUaJhM|ShM|SCJaJmHnHuhULCJaJ&jfhM|ShM|SCJUaJ jhM|ShM|SCJUaJhM|ShM|SCJaJ<hM|ShM|SB*CJOJQJ\^JaJmHnHphsH tH hM|ShM|S0JCJaJ!jhM|ShM|S0JCJUaJ'jhM|ShM|S0JCJUaJ>?STUopqrstuvwĮĕuueQuĮ'jhM|ShM|S0JCJUaJhM|ShM|SCJaJmHnHu!jhM|ShM|S0JCJUaJhULCJaJmHnHu1j`hM|ShM|SCJUaJmHnHu+jhM|ShM|SCJUaJmHnHu"hM|ShM|SCJaJmHnHuhM|ShM|S0JCJaJ8hM|ShM|SB*CJOJQJaJmHnHphsH tH u   '()*аvbPP71jThM|ShM|SCJUaJmHnHu"hM|ShM|SCJaJmHnHu'jhM|ShM|S0JCJUaJhM|ShM|SCJaJmHnHuhM|ShM|S0JCJaJ8hM|ShM|SB*CJOJQJaJmHnHphsH tH u!jhM|ShM|S0JCJUaJhULCJaJmHnHu+jhM|ShM|SCJUaJmHnHu1jZhM|ShM|SCJUaJmHnHu*+,-./KLMNQRfghػخخxx_PػخhULCJaJmHnHu1jNhM|ShM|SCJUaJmHnHu"hM|ShM|SCJaJmHnHu'jhM|ShM|S0JCJUaJhM|ShM|SCJaJmHnHuhM|ShM|S0JCJaJ8hM|ShM|SB*CJOJQJaJmHnHphsH tH u!jhM|ShM|S0JCJUaJ+jhM|ShM|SCJUaJmHnHu   Ͱ͞o`ڰP<Ͱ'jhM|ShM|S0JCJUaJhM|ShM|SCJaJmHnHuhULCJaJmHnHu1jHhM|ShM|SCJUaJmHnHu+jhM|ShM|SCJUaJmHnHu"hM|ShM|SCJaJmHnHu8hM|ShM|SB*CJOJQJaJmHnHphsH tH uhM|ShM|S0JCJaJ!jhM|ShM|S0JCJUaJ'jhM|ShM|S0JCJUaJ :;<=>?@AB^_`abctذ؟ujuVu7u<hM|ShM|SB*CJOJQJ\^JaJmHnHphsH tH 'jhM|ShM|S0JCJUaJhM|ShM|SCJaJhM|ShM|S0JCJaJ8hM|ShM|SB*CJOJQJaJmHnHphsH tH u!jhM|ShM|S0JCJUaJhULCJaJmHnHu1jBhM|ShM|SCJUaJmHnHu+jhM|ShM|SCJUaJmHnHu"hM|ShM|SCJaJmHnHutuv  ⴕ}iUⴕ}&j6!hM|ShM|SCJUaJ'j hM|ShM|S0JCJUaJhM|ShM|SCJaJhM|ShM|S0JCJaJ<hM|ShM|SB*CJOJQJ\^JaJmHnHphsH tH !jhM|ShM|S0JCJUaJhULCJaJ&j< hM|ShM|SCJUaJ jhM|ShM|SCJUaJhM|ShM|SCJaJ@D689:;MN,-(gd:gd} (0^`0(gd}^gd}gduM^gdYd^gdM|S   "#$>?@ABCDEFbcdeghrstͮ͢}tڮiUͮ͢'j"hM|ShM|S0JCJUaJhM|ShM|SCJaJhULCJaJ&j0"hM|ShM|SCJUaJ jhM|ShM|SCJUaJhM|ShM|SCJaJ<hM|ShM|SB*CJOJQJ\^JaJmHnHphsH tH hM|ShM|S0JCJaJ!jhM|ShM|S0JCJUaJ'j!hM|ShM|S0JCJUaJvjjV&j$$hM|ShM|SCJUaJhM|ShM|SCJaJ'j#hM|ShM|S0JCJUaJhM|ShM|SCJaJhM|ShM|S0JCJaJ<hM|ShM|SB*CJOJQJ\^JaJmHnHphsH tH !jhM|ShM|S0JCJUaJhULCJaJ jhM|ShM|SCJUaJ&j*#hM|ShM|SCJUaJ  012345679;<=LMNͮ͢}tڮea[WPLPCh}hCJh} hk hh hM|SCJhM|SjhM|ShM|SCJUaJhULCJaJ&j%hM|ShM|SCJUaJ jhM|ShM|SCJUaJhM|ShM|SCJaJ<hM|ShM|SB*CJOJQJ\^JaJmHnHphsH tH hM|ShM|S0JCJaJ!jhM|ShM|S0JCJUaJ'j$hM|ShM|S0JCJUaJN\*+ !%&'(ij()*ƼƳҎ|qe\h:CJ\^Jh:h:CJ\^Jh5CJ\^Jhmz5\^Jh5\^Jhmzh:CJ hCJhmz hk h hk hmzhhphhphCJ *hphhphCJ hphCJ h=*CJ h:CJ *h:h:CJh:h:CJh} h}CJ *h}h}CJ" !'(();<nogd}^gd}^^gd:gduM^gdmz( & Fgd:oO !)456KLes47sqs?@ȼ؛yoyoyyoyoyyiyiy h=CJ *h Eh ECJh Eh ECJ h ECJ h Eh Ehshk hZ huMhZh}h}CJ\^J *h}h}CJ\^Jh}h}5\^J h}h}h}5\^Jhmz5\^Jh:h:CJ\^Jh:CJ\^Jh}CJ\^J&oRS !56KLrs?@AWXab+, & Fgd Egd7^gd EgduM^gdmz^gd} & Fgd}@AIWX`ab *+,0Vs/01FGH B !!3!c!q!r!浯ΜΖΐh EhH0CJ hH0CJ hCJ *hhCJh EhnPHCJ hULCJ hnPHCJh EhphCJ *h Eh ECJh Eh ECJ hICJhIhICJ h ECJ h Eh E huMh E h=*CJ50HI!!q!r!s!!!""# #1$2$G$^gdI^gdz0gd7^gdH0^gd E & F^gd E & Fgd Er!s!!!!! " " "6"E"M""""""""# #Z#[###$$/$1$2$G$$$¸䨞wmw_YR huMhH0 hICJ *hphhphCJmH sH hICJmH sH hphCJmH sH hIhICJmH sH  h ECJ *hh ECJ *hhCJh Eh ECJ *h=*CJ *hH0hH0CJhz0hH0CJ hH0CJhH0hH0CJ *h=hz0CJh Ehz0CJ hz0CJ huMhz0 h=*CJ G$H$$$&&`&&+'o''''''}*~****6+7+(,),--^gddfFgd7 & FgddfF^gdH0^gd E$$%%%%%%%&&&&''''''(k(s(((()')5))))))|*~*******7++ulh Eh ECJhphhph5CJh EhH0CJ huMhH0 hULCJhdfFhdfFCJ *hdfFhdfFCJ hdfFCJ huMh E huMhdfFh Eh=*CJhH0hphCJ *hphCJ *hphhphCJ hphCJ h=*CJhH0hH0CJ hM|SCJ hH0CJ*+++++++,',(,),,,K-Y----..!/>/B/T///0 0U0`00011p1|1111=2t2u2w22222w *hYh}5CJh}h}5CJ *h=h}CJ *hYh}CJh}h}CJ h}h} h}CJ *hIhICJhdfFhdfFCJhdfFh ECJhIh ECJ hN 2CJh Eh ECJ *h=h ECJ *h=hdfFCJ.----..@/A/B/T/U/00U001o1p1|11xx$If^gd= & Fgd}^gd}gdM|S^gdmz111v2tccxx$If^gd=kd%$$Ifl03$  t 0644 lap yt=v2w222tccxx$If^gd=kdS&$$Ifl03$  t 0644 lap yt=222r3tccxx$If^gd=kd '$$Ifl03$  t 0644 lap yt=22q3s3t33404142444?4@4N4\444445152535B5P55556677 7!7U777777u888໲໊ztt hogCJ hYCJ *hoghogCJhoghogCJh~hphCJ h=*CJ hphCJ *hphhphCJhphhphCJ hmzCJhh=*hCJ *hh=*CJhh=*CJhmzhdfFh}CJ *hYh}CJh}h}CJ*r3s3t3u33333243444tkkfk]]]kk^gd=*gduM^gdmzkd'$$Ifl03$  t 0644 lap yt= 44?4@4444 5535455556/6G6f6666777 7!7 & Fgd~ & Fgdph^gdph^gdmzgduM!777v88 9q999999t:v:w:y:z:|:}:::::: 9(#%AB$dNgd=*^gd0:gduM^gdmz & FgdPZt88888 999 9&9.9p9q9r999999999r:s:t:u:w:x:z:{:}:ڻueZRNRNRNhkjhkUh0:h0:CJaJh0:B*CJ]^JaJph' *h0:h0:B*CJ]^JaJph$h0:h0:B*CJ]^JaJphh0:5B*]^JaJphhh0:hB*ph hYCJ hphCJhphhph5CJhphhphCJ hPZtCJ hULCJhPZthPZtCJ hogCJh=*hog5CJ}:~::::::::::::::::::::::::::::;; ; ;!;";#;$;';(;M;N;O;P;Q;R;S;T;h;ŽŽŽŽٞŽŽŽŽy *hhh hhhULmHnHuh$1mHnHuh7 hYdh hh EhU;hbbmHnHujh EUh EhYdhN 2hULh=*hh:"jhUmHnHsH tH uhkjhkU/::::Q;R;S;j;k;{;|;;;;;;;^gd0: $^a$gd  9(#%ABgd 9(#%AB$dNgd=*h;j;k;{;|;;;;;;;;;;h0:h0:CJaJ *hhCJ$hhCJ$ h:5CJ0hh5CJ0hh :&P 1h/R :p$1. A!n"5#$% $$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd^$$If!vh5$5 #v$#v :V l t/'65$5 ytL<{^$$If!vh5$5 #v$#v :V l t/'65$5 ytL<{^$$If!vh5$5 #v$#v :V l t/'65$5 ytL<{^$$If!vh5$5 #v$#v :V l t/'65$5 ytL<{^$$If!vh5$5 #v$#v :V l t/'65$5 ytL<{}DyK _Toc216239292}DyK _Toc216239292}DyK _Toc216239293}DyK _Toc216239293}DyK _Toc216239294}DyK _Toc216239294}DyK _Toc216239295}DyK _Toc216239295}DyK _Toc216239296}DyK _Toc216239296}DyK _Toc216239297}DyK _Toc216239297}DyK _Toc216239298}DyK _Toc216239298}DyK _Toc216239299}DyK _Toc216239299}DyK _Toc216239300}DyK _Toc216239300}DyK _Toc216239301}DyK _Toc216239301}DyK _Toc216239302}DyK _Toc216239302}DyK _Toc216239303}DyK _Toc216239303}DyK _Toc216239304}DyK _Toc216239304}DyK _Toc216239305}DyK _Toc216239305}DyK _Toc216239306}DyK _Toc216239306}DyK _Toc216239307}DyK _Toc216239307}DyK _Toc216239308}DyK _Toc216239308}DyK _Toc216239309}DyK _Toc216239309$$If!vh55#v#v:V l  t 06,55p yt=$$If!vh55#v#v:V l  t 06,55p yt=$$If!vh55#v#v:V l  t 06,55p yt=$$If!vh55#v#v:V l  t 06,55p yt=^3 666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH L`L Normal ^CJOJQJ_HmH sH tH T@"T uM Heading 1$ & F@&5B*\^JaJphF@F 7 Heading 2  & F@&CJ\]aJ@@  Heading 3  & F@&\aJLL  Heading 4  & F@&5B*\aJphVV  Heading 5  & F@&56B* CJ\]aJphFF  Heading 6  & F@&5CJ\aJHaH  Heading 7  & F@&CJOJQJaJ<a<  Heading 8  & F@&]8 a8  Heading 9 & F@&DA`D Default Paragraph FontVi@V 0 Table Normal :V 44 la (k ( 0No List @@  Balloon Text CJ^JaJF@F Header$ (#^a$^JaJV @V +0Footer,$ 9(#$dN^a$CJ:)!:  Page Number CJOJQJ`@`pTOC 1$ h$^a$B*\^JaJmHnHphuL@L pTOC 2 $^` B*aJphRU@QR0 Hyperlink'>*B*CJOJQJmHnHphsH u.. TOC 3 ^RR Section Heading  & F@& B*CJphH>H Title$ & F@& a$5CJ KH\aJ 22 Bullet  & Fm$66 Numbered  & Fm$FVF FollowedHyperlink >*B* ph&& TOC 444 TOC 5$^a$.. TOC 6 ^.. TOC 7 ^.. TOC 8 ^.. TOC 9 !^BC"B Body Text Indent"$a$RR2R Body Text Indent 2#$a$ B*]ph:B: Style1$& #$./FBRF  Body Text%$^a$ B*phJSbJ Body Text Indent 3& B*phl1rl Style Heading 3 + Black Left'$a$B*^JaJphDP@D  Body Text 2($^a$aJll Style Header + 12 pt Bold Left)$ 9a$5\`;`  List Number 3$*$ ^`a$aJtH 66  E0 Footer CharOJQJB'B =0Comment ReferenceCJaJ88 .=0 Comment Text-CJNN -=0Comment Text CharOJQJmH sH tH @j@ 0=0Comment Subject/5\FF /=0Comment Subject Char5\t t M|Sp TOC Heading1$ & Fd@& )B*CJOJPJQJ^JmH ph6_sH tH j#j h Table Grid7:V202PK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] ):B3):BE3 : r r >*t N@r!$+28}:h;;(:>?@ABCDEFGIJKLNPRTUZ^_a!Y+ 9    ! } 7  @oG$-1v22r344!7:; !"#$%&')*+,-./0123456789;<=HMOQSVWXY[\]`%=>^r$&')IWsuvx:Tprsu (*+-Mg ;=>@`u # ? A B D d s   1 3 4 6 3 X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4̕7OQV|~!t!tt    ,R$A!D@0:!@ (  VB  C D"?D(  t  3 S"?   s *X)?3"?   s *X)?3"?   s *X)?3"? B S  ? 3'Rt/St>a t/ct z%zu6 _Toc151889812 _Toc151889833 _Toc160615973 _Toc160616200 _Toc160616367 _Toc216239173 _Toc216239291 _Toc160615976 _Toc160616203 _Toc160616370 _Toc161078637 _Hlt190759227 _Toc190759234 _Toc216239174 _Toc216239292 _Toc216239175 _Toc216239293 _Toc160615977 _Toc160616204 _Toc160616371 _Toc161078638 _Toc190759235 _Toc216239176 _Toc216239294 _Toc190759236 _Toc216239177 _Toc216239295 _Toc216239178 _Toc216239296 _Toc190759237 _Toc216239179 _Toc216239297 _Toc216239180 _Toc216239298 _Toc216239181 _Toc216239299 _Toc216239182 _Toc216239300 _Toc216239183 _Toc216239301 _Toc216239184 _Toc216239302 _Toc216239185 _Toc216239303 _Toc216239304 _Toc216239305 _Toc216239186 _Toc216239306 _Toc216239187 _Toc216239307 _Toc216239188 _Toc216239308 _Toc216239189 _Toc216239309; ; < < < < < < < <     ! ! !    !!!66AAss22""%B'u+u+4,4,//113 @ + !"#$%&'()*,-./012345##; ; ; ; ; L L L L L L L M % % % % % & & ' ' ' 44JJVVFF"")$%S'++>,>,//113[bt2t2v2v2w2w2y2z2|2}222R3S33 $$**\+_+ - -..t2t2v2v2w2w2y2z2|2}222R3S3333333333r'WvTs +g>u# B s  4 1t2t2v2v2w2w2y2z2|2}22222222222222223333#3$3'3R3S3i3k3z3|333337|m, @ P Cn6>_r1.}>?^h|k!WK$A:&v5A&ײ<+LDrh6+œ$+3lzE;v%#;R;~>n>4 2Dډ@cR%Pf*SrV_{Yܬ&F`Ȧ>3$fL s$}?ls~&6wn**h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh P^`PhHh @^@`hH.h 0^`0hH..h `^``hH... h ^`hH .... h ^`hH ..... h ^`hH ...... h `^``hH....... h 0^0`hH........h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH8^`B*OJQJo(ph:uhH8^`B*OJQJo(ph:uhH8pp^p`B*OJQJo(ph:uhH8@ @ ^@ `OJQJo(hH8^`OJQJ^Jo(hHo8^`OJQJo(hH8^`OJQJo(hH8^`OJQJ^Jo(hHo8PP^P`OJQJo(hHhh^h`o(hh^h`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........^`B*OJQJo(ph ^`OJQJo(o   ^ `OJQJo(   ^ `OJQJo( xx^x`OJQJo(o HH^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(hh^h`CJOJQJo(888^8`CJOJQJo(^`CJOJQJo(  ^ `CJOJQJo(  ^ `CJOJQJo(xx^x`CJOJQJo(HH^H`CJOJQJo(^`CJOJQJo(^`CJOJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH0^`0o(0^`0o(.0^`0o(..88^8`o(... 88^8`o( .... ^`o( ..... ^`o( ...... `^``o(....... 00^0`o(........h ^`OJQJo(h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(h88^8`OJQJo(hH^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH^`B*OJQJo(ph ^`OJQJo(o   ^ `OJQJo(   ^ `OJQJo( xx^x`OJQJo(o HH^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(^`B*OJQJo(ph ^`OJQJo(o   ^ `OJQJo(   ^ `OJQJo( xx^x`OJQJo(o HH^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHpp^p`B*OJQJo(ph   ^ `OJQJo(o   ^ `OJQJo( xx^x`OJQJo( HH^H`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(h^`.hhhhhhhh h^h`hH.5P^`P3*G/5]B*CJOJQJsHtHph^JaJ_H.. ^`hH... x^`xhH.... ^`hH .....  X^ `XhH ......  ^ `hH.......  8^`8hH........  `^``hH.........h 88^8`OJQJo(h ^`OJQJo(oh   ^ `OJQJo(h   ^ `OJQJo(h xx^x`OJQJo(oh HH^H`OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH^`o()^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.h hh^h`OJQJo(h 88^8`OJQJo(oh ^`OJQJo(h   ^ `OJQJo(h   ^ `OJQJo(oh xx^x`OJQJo(h HH^H`OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.^`B*o(ph:uhH. ^`hH. L^`LhH. pp^p`hH. @ @ ^@ `hH. L^`LhH. ^`hH. ^`hH. L^`LhH.^`B*OJQJo(ph ^`OJQJo(o   ^ `OJQJo(   ^ `OJQJo( xx^x`OJQJo(o HH^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(h hh^h`OJQJo(h 88^8`OJQJo(oh ^`OJQJo(h   ^ `OJQJo(h   ^ `OJQJo(oh xx^x`OJQJo(h HH^H`OJQJo(h ^`OJQJo(oh ^`OJQJo(A:&s6>_D~>n>lszE;+3^<+05A&*S|k!F`6wm, #;_{Y1>3$fcR%PV7 P 6+K$         l3F                 DK        ,f6:5DFpz'f                                    DK        DK                 DK        jt|.vWFLdj(?42W                  $zn                          m        DK                 A@Z1$1s`k K=,H0z0N 2j70:;U; EdfFnPH^MM|S6Yo\bbogphkUsPZtmzL<{}: ^*h Gh}ULPkwZ=:'GsYd E7PIYuMpC~+h=*Gt2v2@3@@Unknown G*Ax Times New Roman5Symbol3. *Cx Arial7.{ @Calibri5. *[`)Tahoma7K@Cambria?= *Cx Courier New;WingdingsA BCambria Math"1hѦѦ|&L* [* [nx0d[2[2 2qHX $P2!xxYS:\Chief Executive\ISD\ICT\Security\Security Policy\Admin\IT Security Policy Template.dotSoftware Policy TemplatePolicyOlly Baker - Aperia Olly Bakert                     Oh+'0 0< \ h t Software Policy TemplatePolicyOlly Baker - Aperia IT Security Policy Template.dot Olly Baker5Microsoft Office Word@ @2f^@ )RЂ@4 *՜.+,D՜.+,D hp|   [[2 Software Policy Template Title 8@ _PID_HLINKSAl4h,_Toc2162393094b,_Toc2162393084\,_Toc2162393074V,_Toc2162393064P,_Toc2162393054J,_Toc2162393044D,_Toc2162393034>,_Toc21623930248,_Toc21623930142,_Toc2162393005,,_Toc2162392995&,_Toc2162392985 ,_Toc2162392975,_Toc2162392965,_Toc2162392955,_Toc2162392945,_Toc2162392935,_Toc216239292  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abdefghijklmnopqrstuvwyz{|}~Root Entry F,Data c{(1TablexvWordDocument <SummaryInformation(DocumentSummaryInformation8MsoDataStore#1CXMN1LOSW==2#Item  PropertiesUCompObj y   F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q