1. Introduction

1. Introduction

Information and communication technologies (ICT) are integral to the work undertaken by Key.  Key is committed to using these technologies in a secure, efficient and legitimate manner. It fully supports compliance with the General Data Protection Regulation, and other legislation relating to the use of information and communication technologies.

The purpose of this policy is to ensure that the organisations technologies are used in a manner which is ethical, legal and appropriate to Key’s values, and not used to the detriment of others.  These technologies include, but are not limited to, computers, email, the Internet and Internet services, social media, messaging services, mobile phones, and fixed landlines.

The policy sets out the conditions of use of these technologies and provides a set of procedures that ensure responsible use of equipment provided by Key.  The policy also exists to minimise the risks these technologies bring to Key, the people we support, our employees and our information systems.

This policy is relevant to all ICT equipment irrespective of the use or location, and applies to:

  • All Key employees and volunteers.
  • Employees and agents of other organisations who directly or indirectly support or use Key’s communication infrastructure.

The following are straightforward conditions and procedures which must be observed at all times.