ࡱ; .  !"#$%&'()*+,-/Root Entry   FMicrosoft Word-Dokument MSWordDocWord.Document.89qOh+'0( X`   @Authorization for monitoring in accordance with UCL policy moniMarion Rosenberg Normal.dot Paul Lamb14@]@\Z2 [hhNormal$a$1$*$7$5$3$A$/B*OJQJCJmH sH PJnHtH^JaJ_HJJ Heading 1@& & F & F$B*phCJ5.. WW8Num1z0 OJQJ^J"" WW8Num1z1"" WW8Num1z2"!" WW8Num1z3"1" WW8Num1z4"A" WW8Num1z5"Q" WW8Num1z6"a" WW8Num1z7"q" WW8Num1z8.. WW8Num2z0 OJQJ^J<<Default Paragraph FontBBWW-Default Paragraph Font::Footnote CharactersH*88Footnote ReferenceH*.. WW8Num3z0 OJQJ^J88Endnote CharactersH*::WW-Endnote Characters6U6 Internet Link B*ph>*22Footnote anchorH*0!0Endnote anchorH*2&12Footnote AnchorH*0*A0Endnote AnchorH*FbFHeading %x$OJQJCJPJ^JaJ.Bb. Text Body &x /ar List'^J<"<Caption (xx $CJ6aJ]&&Index) $^J4a4Table Contents* $DD Table Heading +$a$ $ 65]\BBCaption1 ,xx $CJ6^JaJ],,Footnote-CJaJ>>WW-Normal (Web). OJQJ^J@@ Balloon Text/OJQJCJ^JaJ0a0Frame contents000Frame Contents19 -.-.9 <p hhBVfr8@P(    N|C" N s *9 w'T ^`POJQJ^J^@`^`0^``^`^`^`^``^0` ^`OJQJ^JWW8Num2@9 9 PGTimes New Roman5Symbol3&ArialGTimes New RomanG$ HelveticaArial3&ArialI&Arial Unicode MS5&Tahoma"hF"F (( (('00?Authorization for monitoring in accordance with UCL policy moniMarion Rosenberg Paul Lamb@O@՜.+,D՜.+,\X@P_AdHocReviewCycleID _AuthorEmail_AuthorEmailDisplayName_EmailSubject_PreviousAdHocReviewCycleIDB]ccaamar@ucl.ac.ukccaamar@ucl.ac.uk.Update to our monitoring policy and new formsggM 0rCaolan80 2<7 .   @Thd  bj e "8 : ,(   STRICTLY CONFIDENTIAL Form M01 - Request for authorization of monitoring in accordance with LSHTM policy on monitoring computer and network use Please ensure you have read the LSHTM Policy on Monitoring Computer and Network Use before using this form. This form is to be used when authorization for monitoring is requested in accordance with section 4.2 of the LSHTM policy on Monitoring Computer and Network Use. The following must be completed by the person issuing the request and signed by the appropriate person. It must be countersigned by the LSHTM Head of IT Security, IT Audit and Compliance and the LSHTM Head of Legal Services before any monitoring is carried out. Person requesting monitoringJob TitleDepartment Reason for request Please tick relevant boxTo prevent or detect crimeTo investigate or detect unauthorized use, including the use of systems outside LSHTMTo ensure the effective and authorized operation of systemsFor other lawful purposes as set out in the relevant legislationTo establish the existence of factsTo ascertain compliance with regulatory or self-regulatory procedures Please supply the following details: The reason for monitoring, including any internal disciplinary offence or suspected or alleged civil or criminal act which may have been committed and an indication of why the proposed action is felt to be a proportionate approach. Form continues overleaf Scope of monitoring (e.g. user name or account to be monitored, system(s) to be monitored and/or material to be examined)Intended duration The names and job titles of those who will be carrying out the monitoring. (NB LSHTM policy requires that the monitoring must be witnessed and logged). Steps to be taken (i) to protect the privacy of the person(s) being monitored (other than as authorized) and (ii) to avoid compromising the privacy of other persons.  Authorization: Name (block caps): Position: Signature Date When complete, please send to the LSHTM Head of IT Security, IT Audit and Compliance with a copy to the LSHTM Head of Legal Services. The Head of IT Security, IT Audit and Compliance will send authorization to the person named as carrying out the monitoring. IT Security approval: Head of Legal Services approval: Reference Number for request:  Monitoring may only be carried out with written authorization from one of the following as appropriate: the Head of Human Resources (in pursuance of staff disciplinary matters) the Assistant Registrar, Student Records and Assessments (in pursuance of student disciplinary matters) the Head of the IT Security, IT Audit and Compliance (in pursuance of security issues) the Head of Department or Dean of Faculty (in relation to systems under his/her authority. Reference Number (IT Services use only)  48* .  L P     \ ` .2fjldhjDJ>BDhlnFL`fjU0J#0JCJ CJ5\CJCJ5 jUYTXZ\^`bdfhjlnp@VbfhjpPJjU0JOJQJ5 B*phCJCJCJ5# 68, .  N P ^ ` $IfG$$If$a$$a$$a$$a$$a$$a$$a$ KC$IfG$R$$If08  p44444f4$IfG$$IfR$$If08  p44444f4 02hQP$$If0  p44444f4$IfR$$If08  p44444f4hjlG?$IfG$P$$If0  p44444f4$IfG$$IfP$$If0  p44444f4$IfG$fhOG$IfG$P$$If0  p44444f4$IfG$$IfP$$If0  p44444f4hjFOMKP$$If0  p44444f4$IfG$$IfP$$If0  p44444f4L@B$IfG$$If$a$$a$R$$If0) Y p44l44l4f4$IfG$BDjlnKC$IfG$R$$If0$  p44444f4$IfG$$IfR$$If0$  p44444f4KR$$If0$  p44444f4$IfG$R$$If0$  p44444f4$IfHNbhV^]`VXZ\^`bdfhjlnBXdf $If$a$G$ $If$a$- & F & Ffhlnpr & FR$$If0/ p44l44l4f40. A!"#$2P1X0p3P(20Root Entry FCompObjjOle 1TableDSummaryInformation(XWordDocument2<ObjectPoolDocumentSummaryInformation8