Christ Temple Church Information Technology Acceptable Use Policy


Vision of Christ Temple Church
Our mission compels us to equip this generation to discover and establish an intimate relationship with God through all expressions of worship, this enabling the receiving of the abundant life and character of Christ, and the subsequent joyful out-flowing of the Holy Spirit to one another and the community of humanity.


Vision of the Information Technology Department
To support the vision of the church by the application of our knowledge and expertise to the cost effective development, implementation, support, and improvement of the church's information technology infrastructure to meet the present and future requirements of the church, school, and each department therein.


1. General
Christ Temple Church provides computers and Internet connections ("facilities") for the sole purpose of promoting and supporting the vision. Those facilities should only be used for Christ Temple Church business. Christ Temple Church has the right, but not the duty, to monitor all communications and downloads that pass through its facilities, at its sole discretion. Any information retained on these facilities may be disclosed to outside parties or to law enforcement authorities. This policy applies to all employees, volunteers, and guests when they are using computers or Internet connections supplied by Christ Temple Church, whether or not during work hours, and whether or not from church premises. Use of these facilities will be considered as acknowledgement of consent to this policy.

2. User Responsibilities - "Do's and Don'ts"
• Do use appropriate, courteous, and respectful language in all communications. If something is questionable, it is probably best avoided. 
• Do use mass email capabilities and address lists sparingly and for necessary communications. 
• Do honor copyrights, trademarks, license agreements, and ownership of intellectual property.
    Ethically, one should always cite original sources and give proper credit.
• Do not use mass email capabilities and address lists for a wasteful manner such as forwarding chain letters, potential hoax messages, etc. 
    If you are not sure if you should send it or not, please contact the IT Department for advice. 
 Do not access or disseminate material that is obscene, explicit, pornographic, harassing, threatening, illegal or otherwise inappropriate, 
    including jokes, stories, or cartoons which could be considered offensive or distasteful.
• Do not use church facilities to engage in "hacking" or attempts to otherwise compromise system security. 
• Do not intentionally waste finite resources or use them carelessly such as watching YouTube videos or downloading files that are
   not in regard to vision-related work.
• Do not change the data or trespass in the account of another user. 
 Do not use church facilities for personal or commercial advertisements, solicitations or promotions.

3. Personal Safety
• Use only your account and password and keep your password confidential. Shared passwords compromise security by limiting 
    the ability to track and correct breaches of security. 
• Report to a system administrator or supervisor, any security problems, password breaches, violations of this policy, or information 
    that makes you uncomfortable. 
• Never reveal your home address, image, or phone numbers, or those of others. Use church addresses and phone numbers only. 
• Always remember that electronic mail (e-mail) is never guaranteed to be private.

4. Inappropriate Use
The network account holder is responsible for their actions and activity within their account. Unacceptable uses of facilities will be addressed on an individual basis by church administration.

5. Monitoring/Filtering
The church has technology in place to protect the user from material that is inappropriate and/or harmful to either the user or computer. With this technology internet activity and usage patterns are recorded and monitored to ensure enforcement of the policy. Attempts to access inappropriate materials are automatically reported.

6. Nature of E-Mail 
E-mail resembles speech in its speed and lack of formality. Unlike speech, e-mail leaves a record that is often retrievable even after the sender and recipient delete it. If you would not want to read your message in the local newspaper, do not send it by e-mail. E-mail is also a very quick and easy way to communicate to many people at once; however, over-use of mass e-mails carries a high cost of time and Network Resources. Please send e-mails only to those to whom they apply. Please only forward e-mails to people you know want to receive them. We don’t want to be perceived as purveyors of “Junk E-mail.”

7. Conserving Network Resources
The church IT Department strongly discourages storage of large numbers of e-mail messages, voice mail messages, or non-essential files on the network. In order to help conserve file space on servers and backup systems, promptly delete unnecessary data and old versions of files.

8. Intellectual Property of Others
Users should not download or use material from the Internet or elsewhere in violation of software licenses, or the copyright trademark and patent laws. Users should not install or use any outside software without authorization from a supervisor and the IT department. This includes file sharing and instant messaging software, music and video downloads, or any other unauthorized files.

9. Equipment Usage
Even if equipment appears idle - it may be scheduled, reserved, in use remotely or there may be limited supplies on hand. Please give advance notice to the responsible person. Do not download, install, upgrade, or alter any software/hardware on any equipment without first consulting the IT Department.