Acceptable use policy

Purpose and applicability

This policy defines the acceptable use of Enfield Council’s information assets and those assets provided to the council by partner organisations. This includes the End User Computing and Smart Mobile Devices hardware and the information accessed by those devices. It is known as the 'Acceptable Use Policy' or 'AUP'.

This policy applies to council workforce including temporary and agency workers, volunteers, independent consultants and suppliers/contractors who need to use council information assets, as part of/to carry out their duties. These people are referred to as 'users' in the rest of this document. Note that there is a separate AUP for Members.

Acceptable use means that access to information is legitimate, it is used only for the intended purpose(s), the required standards of practice are in place to protect the confidentiality, integrity and availability of information, and the use complies with relevant legislation and regulation.

The council will at all times to conduct its business in a professional manner and to provide the highest possible level of service, both internally and to its customers. Any loss, compromise, or misuse of council information and associated assets, however caused, could have potentially devastating consequences for the council and may result in financial loss and legal action.

Definitions

An information asset is any data, device, or other component of the environment that supports information-related activities. Assets include hardware (for example, laptops), software and confidential information (for example, a person’s record).

Inappropriate use of information assets exposes the council and the service users who entrust us with their data to risks.

A data subject is a person or organisation to whom data relates.

A data controller is a person or organisation who is legally in charge of a data asset. The council is the data controller for many of the assets it holds.

A data processor is a person or organisation who is tasked by a data controller with using a data asset. The council is a data processor for some organisations such as the NHS and Police.

A user is any person or organisation accessing information assets.

Personal data is data that relate to an individual. For example, your name, address and date of birth are examples of your personal data.

Special Category personal data is data revealing 'racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, and the processing of genetic data, biometric data for the purpose of uniquely identifying a natural person, data concerning health or data concerning a natural person's sex life or sexual orientation'. This is commonly referred to, along with other data, such as financial information, as 'sensitive'.

'PC' means any computer device such as a tablet, laptop or desktop.

'Mobile' means any Smart Mobile Device that is portable with a mobile network voice or data connection, including smart phones, standard phones, tablets or portable devices such as printers and ticket reading devices. Note that some tablet devices (for example, a tablet with a mobile network connection) fall into both the PC and mobile category and rules for both must be followed.

'BYOD' Bring Your Own Device is the practice of allowing employees to use their own computers smartphones and other devices for work purposes.

Policy statements

It is the responsibility of all users to have annually read and know this policy and to conduct their activities accordingly. Breach by any user could result in disciplinary action or other appropriate action being taken.

Council information facilities are provided for business purposes only, with limited personal use permitted as defined elsewhere in this document.

Use of information facilities must be authorised by line managers.

Any use of council facilities for unauthorised purposes may be regarded as improper use of facilities. Council IT systems must display an appropriate warning notice to this effect when users log on.

Users should be aware that any data they create on council systems (including anything pertaining to themselves) is deemed to be the property of council. Users are responsible for exercising good judgment regarding the reasonableness of personal use and to be compliant with the Employee Code of Conduct.

For security and network maintenance purposes, authorised users may monitor equipment, systems and network traffic at any time. The council reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.

The policy is not designed to be obstructive. If you believe that any element of this policy hinders or prevents you from carrying out your duties, please contact the Digital Services (DS) Service Desk.

This policy is supported by a number of other policies which should be read in conjunction with it.

Use of personal data

The council has access to a wide range of personal data entrusted to us by our citizens and others. This data must be used and access in accordance with law as defined by statutory GDPR.

Users must only use personal data in accordance with the agreed and published purposes for the collection of data. Using personal data in any manner requires a clear legal basis or consent from the Data Controller whether personal or corporate. Merging personal data with other sources, for example, is not permitted unless a legal basis or consent is present, and the use of the data correctly authorised.

Information system security

Security of the council’s information assets is paramount. All information assets must be treated as confidential unless marked as public. The council is the data controller for most information assets held, however users must be aware that the council acts as a data processor for other organisations. Users with access to such information assets must maintain awareness and compliance with the data owner’s policies.

Security controls and reporting

The council has implemented security systems to safeguard information assets. These include controls over viruses, offensive and illegal material, disruption to our systems, and unauthorised access. Bypassing or attempting to bypass these security systems is a breach of policy.

To be effective, all users must support and use these systems and must assist in identifying and eliminating threats to information security. Any breach or suspected breach of this policy must be regarded as a security incident.

Users must report security incidents to the DS Service Desk immediately.

Use of downloaded programmes

Under no circumstances may users use any programme that is not already installed on a PC or download programmes from the Internet for use on council DS systems. For mobile devices, only pre-approved applications will be installed.

All smart mobile devices will be managed through the Mobile Device Manager. Attempts to breach this will be seen by the system.

Council applications and logins should not be downloaded onto personal smart mobile devices (BYOD).

For those who currently have this access (as at 01/01/2023) there will be a 6-month clemency window for this to be removed and transfer to the new council smart mobile devices.

Passwords

Users are responsible for the security of their passwords and accounts. Passwords must be kept confidential and not shared with others.

Passwords will be changed every 3 months and the system will prompt this change. Failure to change will cause the user account to be locked until the change is made. The reuse of old passwords is not permitted.

Temporary passwords must be changed at the first log on. Passwords must be changed whenever there is any indication of possible system or password compromise.

If legitimate access to an absent person’s system or data is required, this can only be done by their line manager and then written or email authority must be provided by a senior manager of the users and approved by a Head of Service or Director.

All EUC or smart mobile devices accessing resources must be secured with a password protected screensaver with the automatic activation feature set at 2 minutes or less, if the device is inactive or unattended.

Internet usage

The Code of Conduct provides detailed guidance.

The council provides access to the information resources on the internet to help users carry out their functions. The provision of Internet access is at the council’s discretion and users provided with internet access are required to read and adhere to this policy.

Internet access for personal use is at Enfield Council’s discretion and should not be assumed as a given. Any misuse of this facility can result in it being withdrawn. Limited personal use of the Internet is permitted outside of normal working hours.

Email usage

Enfield Council email system is for council business use only. The use of Enfield Council email for personal business is forbidden.

However, the council understands that users may on occasion need to send or receive personal emails using their work address. Users wishing to send personal email to an alternative email address must seek the prior permission of their manager.

Auto forwarding of email to external email accounts (non LBE) is expressly forbidden.

All emails sent by users on council business should be spell checked before sending. In addition, it is not acceptable for the message to be abusive or out of context of the business in hand. Please note that wording should be full English wording and not shorthand text that might be used when texting on a mobile.

The sender of the email is responsible for the safe arrival of information at its intended destination, it should be noted that it is the sender who is usually liable for any breach of security and confidentiality.

Sending emails internally is secure. Sending emails externally is not generally secure and they can be intercepted and viewed by unauthorised people. Secure email must be used when emailing information to external agencies or individuals when the content of the email includes:

Personal or sensitive business information must not be sent to an email address outside of Enfield Council, unless it is absolutely necessary and the transmission is secure. This can be done using:

Staff must be vigilant with attachments to emails and links to documents downloaded from other locations as they may contain viruses. Users who suspect a possible virus attack must report it to the DS Service Desk immediately.

Staff must be aware that email is easy to forge and that attacks based on this are common. Always treat emails asking for unusual actions with suspicion. For example:

For further information regarding secure information exchange (for example, via email and Cloud Storage) please refer to relevant policies including and not limited, ‘Data Protection Policy’ and ‘Information Classification and Handling Policy’.

Responding to security incidents and malfunctions

Any perceived or actual information security weakness or incident must be reported to the DS Service Desk immediately. Examples of a security incident include unauthorised access to information assets, misuse of information assets, loss/theft of information assets, virus attacks, denial of service attacks, suspicious activity.

Further information on the reporting of security incidents can be found in the Security Incident Reporting Procedure.

Computer viruses and other harmful code

End User computing devices, including PCs, laptops and networking devices are continually scanned for malicious activities and vulnerabilities. To support this process and allow quiet hour background processes to complete all users should shut down their devices at the end of the working day to allow updates to complete on restart.

Software applications used on council networks go through an extensive evaluation process before acceptance into the software catalogue and users wishing to use software applications not available within the existing software suite should approach DS for advice. Under no circumstances are users to attempt to download unvalidated software applications.

It is a crime under the Computer Misuse Act 1990 to deliberately introduce malicious programmes into the network or server (for example, viruses, worms, Trojan horses, email bombs). Users must not use council facilities for intentionally accessing or transmitting computer viruses or other damaging software or software designed for creating computer viruses.

If you are in doubt about any data received or suspect a virus has entered your PC, log out of the network immediately, stop using the PC and inform the DS Service Desk on the number at the top of this document.

All users should shut down their device at the end of each working day to ensure that the relevant updates are deployed to their machine.

Any user downloading a file or software from an external site should seek assistance from DS before downloading.

Hacking and associated activities or breaches of policy

It is a crime under the Computer Misuse Act 1990 to enter into another computer system without authorisation.

Council IT facilities must not be used in any way that breaks the law or breaches standards. Such actions could result in disciplinary action being taken.

Users must not use council facilities for:

Users may be exempted from the some of the above restrictions during the course of their legitimate job responsibilities (for example, systems administration employees may have a need to disable the network access of a host if that host is disrupting production services). Such exemptions should be included in an Access Matrix and approved and documented by the DS Security Manager.

Copyright and encryption

It is illegal to break copyright protection. Users could break copyright if they download, transmit or copy protected material.

Users must not:

The DS Security Manager should be consulted prior to export of any material that is in question and all information in this respect should be documented accordingly.

Unattended user equipment

Users must not leave their workstation unattended without ensuring that sensitive information is not visible on their screen or screen saver has locked access.

All EUC or smart mobile devices accessing resources will be secured with a password protected screensaver with the automatic activation feature set at 2 minutes or less if the device is inactive or unattended.

Users accessing sensitive information whilst remote working must position their workstation in such a way that the information is not visible to unauthorised users or you must use privacy screen.

No paper copies of data, memory sticks or other portable media may be left on desks when unattended.

Lockable cabinets need to be available to store sensitive documentation when a desk is unattended.

Hardware usage

All council owned computer equipment and software remain the property of the council. Any user who leaves council employment / engagement is required to return all hardware and software that has been provided to them on or before their last day of employment as directed by their line manager.

Only hardware provided by the council is authorised for use for council business. Users must not attempt to attach any other equipment to council hardware or to network or telephone sockets.

BYOD or the use of personal computers, smartphones or other devices is prohibited for use.

Software usage

Enfield Council is committed to the use of authorised software within its computer systems. It is expressly forbidden for users to load or operate software gained from the Internet, magazines or other sources. The council is also committed to using software for which it has current licences.

It is the responsibility of all users to ensure that they do not introduce viruses into computer systems. Users should take care when receiving electronic information from unknown sources, including attachments within email. Where there are reasons to access information from questionable source(s), active virus checking must be performed, preferably on a standalone computer and/or test server, thus having no communication links to other systems.

The following provisions, which apply to the use of all computers, govern all users:

Mobile computing

When using computing and communication facilities outside of the secure office environment, special care should be taken to ensure that information is not compromised. Protection must be in place to avoid unauthorised access to or disclosure of information including ensuring your screen cannot be seen by others and that equipment is not left unattended.

If a device is lost or stolen, the DS Service desk must be contacted as soon as possible.

Access from overseas

Access to the council’s network from overseas is subject to additional controls to ensure compliance with relevant legislation and this may place additional personal liability on users.

Access from countries with a 'decision of adequacy' from the UK Information Commissioner is generally permitted for Enfield Council information assets, but not for those owned by others such as data entrusted to the council by Department of Work and Pension (DWP) – please seek advice from the DS Service Desk before taking devices with access to non-Enfield data overseas.

The user should seek advice from the DS Service Desk before taking any council supplied IT equipment outside the United Kingdom. The equipment may not be covered by the council’s normal insurance against loss or theft and the equipment is liable to be confiscated by Airport Security personnel. Network security systems in place will also flag overseas access and the user will be excluded from the network services as a result. See Smart working Policy on the staff intranet page.

Fax

All faxes must include a non-disclosure statement and security classification.

All users must ensure that confidential faxes are protected during transmission and only sent when the recipient is aware of the transmission and is instructed to protect its content.

Confidential faxes must be removed as soon as the transmission has ended.

Telephones

Personal calls should be kept to a minimum and not interfere with performance of duties. The council reserves the right to check, review and monitor telephone calls made using any council telephone or telephone system.

Where the council provides a user with a mobile phone, it is to ensure that the user is contactable when away from the office. Therefore, council mobile phones should be switched on or directed to voicemail or an alternative phone at all times during working hours.

Voicemail should be checked regularly and greetings updated as necessary. Voicemail users should secure their messages with a minimum four-digit pin code and clear down messages on a frequent basis.

To ensure that a mobile phone cannot be used fraudulently, it should be protected by using a PIN number. If a council mobile phone is lost or stolen it must be reported to the DS Service Desk.

Legislative requirements

Under no circumstances are users allowed to engage in any activity that is illegal under local, national or international law while utilising council resources.

Whilst using the council smart mobile devices any attempt to change the SIM card or in any way alter the IMEI information of the device is a disciplinary action by the council and a punishable offence under UK law.

Monitoring use

The council reserves the right to monitor, review and record the use of all information and telephone systems and all documents stored on information systems, including documents profiled as private and confidential.

The council may exercise this right in order to establish facts relevant to council business and to comply with:

Therefore, users do not have the right to complete privacy when using council information systems or in relation to any communications generated, received, processed or stored on council information systems.

Policy compliance

The council expects that all users will comply to the directives presented within this policy. This policy will be included within the Information Security Internal Audit Programme, and regular compliance checks will take place to review the effectiveness of its implementation.

Exceptions

In the following exceptional cases compliance with some parts of the policy may be relaxed. The parts that may be relaxed will depend on the particular circumstances of the incident in question.

In such cases, the user concerned must take the following action:

Failure to take these steps may result in disciplinary action.

In addition, the DS Security Manager maintains a list of known exceptions and non-conformities to the policy. This list contains:

The council will not take disciplinary action in relation to known, authorised exceptions to the information security management system.

Penalties

Non-compliance is defined as any one or more of the following:

Any violation or non-compliance with this policy may be treated as serious misconduct.

Penalties may include termination of employment or contractual arrangements, civil or criminal prosecution.

View the Acceptable Use Policy declaration (PDF, 124.77 KB).


Policy details

Author - Information Governance Manager
Owner - Information and Data Governance Board
Version - 6.3
Reviewer - Information and Data Governance Board
Classification - Official
Issue status - Final
Date of first issue - 20.08.2009
Date of latest re-issue - 30.05.2023
Date approved by IGB - 19.05.2023
Date of next review - 30.04.2024

Council news directly to you

The latest news in your inbox every week. Council news, community updates, local events and more.

Sign up Sign up