Chapter 1 “Dear Staff”
I know what you're thinking: "Wow, this popped up on my screen and won't let me sign in till I click agree (#annoying); I better scroll to the bottom as quickly as possible and click accept to get on with my day.” …Trust me; you will enjoy reading this way more than I enjoyed writing it. I know 11 pages is a lot, but the good news is that you only need to read Chapter 1 to understand it.
~ Austin Janey
North Coast Church extends to staff the use of its networks, applications, and systems. Such access is a privilege that requires individuals to act responsibly. "Our purpose and our product is people," – respecting the rights of others, observing relevant laws, and following policies like this one are some of the ways we build a safe, effective environment for ministry to take place.
Understanding the role the IT Team plays in your ministry helps ensure resources and time are well spent within your ministry. The IT Team at North Coast is exclusively responsible for providing computers, software, services (like Microsoft 365!), and IT support. If you need any of those, please reach out to itteam@northcoastchurch.com so we can work with you! We also offer Wi-Fi at all our locations, but ONLY IT-provided and authorized computers and devices are allowed to connect to our private networks. If you brought a device from home, you are more than welcome to connect to our guest network. Unauthorized computers, devices, and software will be removed when found.
By understanding what is generally "against the rules," you can conclude other behaviors that would also be against policy. For more details, please read Chapter 2 of this document. Examples of misuse include but are not limited to the following:
It is helpful to understand that computer systems are designed to track, log, and relay information. You should never expect any action on any computer or device to be private, hidden, or unable to be discovered at a future date.
Additional computer and network use policies, terms, and conditions may be in place for specific services North Coast Church offers. Because technology advances at a rapid pace, situations not covered in this policy will undoubtedly unfold. As they do, you can expect the IT Team to provide guidance and update our terms of use policy accordingly.
Thanks for reading Chapter 1, you can read Chapter 2 by continuing to scroll at a reasonable pace, or you can scroll rapidly past Chapter 2 to continue your day. Note: Chapter 2 applies to you regardless of whether or not you read it. If you have any questions about North Coasts IT Policy or need help, please reach out to itteam@northcoastchurch.com; IT’s what we are here for.
~ The Networks Applications and Systems Administration
Chapter 2 “North Coast Church Terms of Use”
The intention of publishing an Acceptable Use Policy is not to impose restrictions contrary to North Coast Church's established culture of openness, trust, and integrity. IT is committed to protecting employees, partners, and North Coast Church from illegal or damaging actions by individuals, either knowingly or unknowingly.
Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts, email, web browsing, and file sharing, are the property of North Coast Church. These systems are to be used for ministry purposes.
Effective security is a team effort involving every North Coast Church employee and affiliate who deals with information or information systems. It is the responsibility of every computer user to know these guidelines and conduct their activities accordingly.
This policy aims to outline the acceptable use of technology at North Coast Church. These rules are in place to protect the employee and North Coast Church. Inappropriate use exposes North Coast Church to risks such as virus attacks, compromise of network systems and services, and legal issues.
This policy applies to the use of information, electronic and computing devices, and network resources to conduct North Coast Church business or interact with internal networks and business systems, whether owned or leased by North Coast Church, the employee, or a third party. All employees, contractors, consultants, temporary, and other workers at North Coast Church are responsible for exercising good judgment regarding the appropriate use of information, electronic devices, and network resources in accordance with North Coast Church policies, standards, local laws, and regulations. Exceptions to this policy are documented in section 5.2.
This policy applies to employees, volunteers, contractors, consultants, temporaries, and other workers at North Coast Church, including all personnel affiliated with third parties. This policy applies to all equipment that is owned or leased by North Coast Church.
4.1.1 North Coast Church proprietary information stored on electronic and computing devices, whether owned or leased by North Coast Church, the employee, or a third party, remains the sole property of North Coast Church.
4.1.2 You are responsible for promptly reporting the theft, loss, or unauthorized disclosure of North Coast Church information.
4.1.3 You may access, use, or share North Coast Church proprietary information only to the extent authorized and necessary to fulfill your assigned job duties.
4.1.4 Employees are responsible for exercising good judgment regarding the reasonableness of personal use. If there is any uncertainty, employees should consult their supervisor or reach out to IT for guidance.
4.1.5 For security and network maintenance purposes, authorized individuals within North Coast Church may monitor equipment, systems, and network traffic at any time.
4.1.6 North Coast Church reserves the right to audit networks and systems periodically to ensure compliance with this policy.
4.2.1 System-level and user-level passwords must comply with the Password Policy (outlined in 4.5). Providing access to another individual, either deliberately or through failure to secure its access, is prohibited.
4.2.2 You must lock the screen or log off when the device is unattended.
4.2.3 Postings by employees from a North Coast Church email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of North Coast Church unless posting is during business duties.
4.2.4 Employees must use extreme caution when opening emails received from unknown senders.
4.3.1 All use of email must be consistent with North Coast Church policies and procedures of ethical conduct, safety, compliance with applicable laws, and proper business practices.
4.3.2 North Coast Church email accounts should be used for North Coast Church business/ministry-related purposes only.
4.3.3 The North Coast Church email system shall not be used for the creation or distribution of any disruptive or offensive messages, including offensive comments about race, gender, hair color, disabilities, age, sexual orientation, pornography, political beliefs, or national origin. Employees who receive any emails with this content from any North Coast Church employee should report the matter to their supervisor immediately.
4.3.4 Users are prohibited from automatically forwarding North Coast Church email to a third-party email system (noted in 4.3.5 below). Individual messages which are forwarded by the user must not contain North Coast Church confidential or above information.
4.3.5 Users are prohibited from using third-party email systems and storage servers such as Google, Yahoo, MSN Hotmail, etc. to conduct North Coast Church business, to create or memorialize any binding transactions, or to store or retain email on behalf of North Coast Church.
4.3.6 Sending chain letters or joke emails from a North Coast Church email account is prohibited.
4.3.7 North Coast Church employees shall have no expectation of privacy in anything they store, send or receive on North Coast Church’s email system.
4.3.8 North Coast Church may monitor messages without prior notice. North Coast Church is not obliged to monitor email messages.
The following activities are, in general, prohibited. Employees may be exempted from these restrictions during their job responsibilities (e.g., systems administration staff may need to disable network access if a computer or device disrupts production services).
Under no circumstances is an employee of North Coast Church authorized to engage in any illegal activity under local, state, federal, or international law while utilizing North Coast Church-owned resources.
The lists below are incomplete but attempt to provide a framework for activities that fall into unacceptable use.
The following activities are strictly prohibited, with no exceptions:
When using North Coast Church resources to access and use the Internet, users must realize they represent the North Coast Church. Whenever employees state an affiliation to the North Coast Church, they must also clearly indicate that "the opinions expressed are my own and not necessarily those of the North Coast Church." Questions may be addressed to the IT Team.
Passwords are an essential aspect of computer security. A poorly chosen password may result in unauthorized access and exploitation of our resources. All staff, including contractors and vendors with access to North Coast Church systems, are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.
All users at North Coast Church should be aware of how to select strong passwords. Strong passwords have the following characteristics:
Weak passwords have the following characteristics:
Passwords should not contain common usage words such as:
Try to create passwords that can be easily remembered. One way to do this is to create a password based on a song title, affirmation, or other phrases. For example, the phrase might be: "This May Be One Way To Remember," and the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation.
NOTE: Do not use our examples as passwords!
North Coast Church utilizes a suite of approved software tools for internal use by staff and volunteers. These software tools are either self-hosted with security managed by the IT Team or hosted by entities with the appropriate business agreements to preserve data integrity. The setup of new digital tools is the sole responsibility of the IT Team; if you would like to add a tool to the approved applications list, please contact itteam@northcoastchurch.com.
In general, North Coast does not recommend using Browser Add-ons outside of the ones listed below; however, we allow these tools if they enhance productivity. If you would like to use a browser extension, please contact itteam@northcoastchurch.com so we can review and add it to the allowed list of extensions.
You may be assigned Hardware and Software to perform your work if assigned IT Assets; you should be aware of your responsibilities.
The IT team will verify compliance with this policy through various methods, including but not limited to business tool reports, internal and external audits.
The IT team must approve any exception to the policy in advance.
An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
Minor policy infractions or those that appear accidental are typically handled informally by email or in-person discussions. Individuals who violate church policy, law(s), regulations, contractual agreement(s), or violate an individual's rights can expect the immediate deactivation of their accounts for review. Failure to comply with this policy may result in temporary or permanent access restrictions, removal from your role, termination, or legal action.
Please direct any questions to the IT Team at itteam@northcoastchurch.com.