Staff AUP (Acceptable Use Policy)

Size: px
Start display at page:

Download "Staff AUP (Acceptable Use Policy)"

Transcription

1 Guidance review Date April 2014 Date of next Review April 2016 Who reviewed this Guidance? Deputy Headteacher Guidance: Staff AUP (Acceptable Use Policy) Rights Responsibilities How does the school protect me? How does the Local Authority and London Grid for Learning Protect me? Actions I should take should I suspect something is wrong I have the right to a reliable, fast, secure and safe broadband internet connection within school use this broadband connection for professional purposes only - excessive use for other reasons is not acceptable. It is also my responsibility not to try to access broadband materials by bypassing the firewall and filters set up by the school and internet provider. The school has an agreed AUP. This AUP states clearly how my professional work will be supported by our internet service provider. The school purchases a 100 mbps broadband connection. This is provided by Virgin through the London Grid for Learning. This is dedicated educational provision with fire walling, filters and monitoring software appropriate to an educational setting. If the internet is not working properly I should inform the Network Manger who will assess whether it is a local problem to the school or a regional problem and inform me of the outcome. Page 1 of 5

2 I have the right to access the internet, for research and to develop my professional capabilities through online materials and accessing information on the school network I have the responsibility to use the internet appropriately for my professional work. It is my responsibility not to attempt to gain access to unsuitable or illegal sites - these include those which involve child abuse, sexually explicit material, pornography, race hate and incitement to violence. use broadband in an appropriate way for my professional development and therefore the use of forums, chat rooms, shopping, auction sites and social networking sites will be to support my professional development and not for private use within school. The School through the Network Manager with their team provides a safe and secure environment including filtering and fire walling. The firewall is updated continually to block sites considered inappropriate for school use and allows sites which are suitable. The school is responsible for ensuring that other inappropriate sites are blocked. These include pornography, gambling, race hate, drugs and weapons. The school network monitors all use of computers and can produce logs of evidence which show inappropriate internet access by all users. The LEA with London Grid for Learning provides schools with protection from these inappropriate sites by installing an CachePilot* at the school site. Administration rights are strictly controlled within the school. If I suspect a site should be blocked, or allowed, in school I should inform the Network Manager who will take appropriate action to support me. London Grid for Learning working with the other Regional Broadband Consortiums are continually adding sites suitable to schools to the white list and unsuitable sites to the black list. The Network Manager can contact the London Grid for Learning should sites need changing for my work. * The CachePilot controls access to these sites and is managed by individual schools. The LA and London Grid for Learning strongly recommend that schools do not unblock these categories via the CachePilot Page 2 of 5

3 I have the right to have a secure area where I can store my professional work. This includes the right to a Learning Platform (Fronter) account where I can access, store and retrieve materials used in my professional capacity. I have access to this from anywhere with an internet connection. I also have the right to a secure area for storage. I have the right to be able to access my work safely and be confident that no-one else is plagiarising my work. ensure that my work does not infringe copyright, is not unsuitable and cannot be accessed by others without my permission. acknowledge that the AUP which applies to school work also applies to the Learning Platform (Fronter). I should regularly back up the data stored on my laptop. I should follow the school policy on the use of images when using photographs and images as part of my work. I should change my password regularly and not disclose this to others. It is my responsibility not to attempt to access the work area of others or to copy their work without permission. The Network Manager at the direction of the Head Teacher has the duty to protect the school network. If there is a suspicion that materials stored may be of an unprofessional nature and unsuitable for a school environment the Network Manager may be asked to produce evidence for the Senior leadership team who therefore have access to all files on the network. Monitoring software is used by the school which can record information which will provide evidence of infringements of this Acceptable Use Policy. The Senior leadership team will have the support of the LEA Adviser and LGFL in investigating any serious breach of the AUP. If I suspect that someone is assessing my material or copying my work I should report this to a member of the Senior leadership team who will organise an investigation to help me. If I suspect that someone else is accessing my work I will inform a member of the Senior leadership team who will investigate. acknowledge copyright and not to download or upload work which is protected by copyright Page 3 of 5

4 I have the right to a professional account for use in my work I have the right to a network which is safe, reliable and secure use this facility in a professional way to support my work. regularly update and run the anti-virus programme on my computer (if provided by school) and not to open attachments on which may be suspicious. The LGFL facility provided by the school uses a filter which blocks inappropriate content and abusive words. It also protects me by stopping unwanted s and spam. The school have invested in anti-virus software and purchase software to enable my equipment to work efficiently. The LGFL have invested in a network which provides reliable and secure access If I receive unsolicited e- mail or have concerns about suspicious attachments I should inform the Network Manager who will investigate. If I suspect that there has been an infringement of the security of the network I should report this to a Senior Member of Staff who will investigate with the appropriate body. report any damage or problems to the Network Manager and the support team. Important links take reasonable precautions to ensure that if I use a computer, laptop or other device (including USB flash drive) outside school and I intend to connect it to the school network it will have suitable up to date anti-virus software running. NUT Guidance Document on and Internet Use Think You Know Website Page 4 of 5

5 What to do with Suspicious You receive an that has potentially illegal material e.g. Child abuse images, Incitement to violence or Race hate You receive an that contains inappropriate content e.g. abusive or bullying content, adult sexual material etc. This is from someone you know within the school environment You receive an that contains inappropriate content e.g. Adult sexual material, bad language etc. and this is not from someone you know but is from what seems to be a real (i.e. not a spam) address You receive an that contains inappropriate content e.g. Adult sexual material This is not from someone you know and appears to be a SPAM . Headteacher. A written log should be kept of the and the fact that it was passed onto the Internet Watch Federation (IWF). IWF Go to Click on the report button and follow the instructions and their advice. The IWF is the only organisation licensed to investigate illegal content Page 5 of 5 Headteacher. A written log should be kept of the . An investigation within the school should be undertaken. If necessary to escalate this investigation your school should contact the LEA to authorise London Grid for Learning to investigate further. Sending such mails using the London Grid for Learning is not allowed under the AUP. Headteacher. A written log should be kept of the and where it was sent for investigation Contact the LEA who will authorise London Grid for Learning to investigate. They will trace the sender s ISP and advise on further action (such as contacting the sender s school/organisation to raise a complaint under their AUP) Headteacher. A written log should be kept of the and where it was sent for investigation Network manager to report this to London Gridfor Learning to investigate. In all cases secure the in a folder and only delete when the investigation has been completed or you are advised to do so. In the case of potential illegal material do not show the to anyone and take the advise of the Internet Watch Foundation. Do NOT always presume that the sender s address is telling you the truth Spammers can and do fake other s addresses.

Digital Safety and Digital Citizenship

Digital Safety and Digital Citizenship Digital Safety and Digital Citizenship A Guide for Students The laptop has been given to you as a tool for learning. Use it for that. While doing so, here are some important rules for keeping yourself

More information

Computer and Internet Use Policy

Computer and Internet Use Policy Computer and Internet Use Policy Author Simon Allan Date Written Autumn 2015 Review Date Autumn 2018 Date Ratified by the Governing Body Autumn 2015 Computer and Internet Use Policy Outline/Overview This

More information

PUPIL ICT ACCEPTABLE USE POLICY

PUPIL ICT ACCEPTABLE USE POLICY PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status

More information

ONLINE SAFETY. Messaging, , Vlogging and Sexting

ONLINE SAFETY. Messaging,  , Vlogging and Sexting ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.

More information

Grand Avenue Primary and Nursery School ICT Data management. Contents

Grand Avenue Primary and Nursery School ICT Data management. Contents Grand Avenue Primary and Nursery School ICT Data management Contents 1. Acceptable Use Statement 2. Transfer and Offsite Use of Sensitive Data 3. E-safety 4. Declaration Introduction These three policy

More information

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment; USAGE POLICIES Any terms in capitals not defined in these Usage Policies will have the same meaning as in your Contract. These Usage Policies apply to you and anybody you allow to use NOW Broadband and

More information

Communication and Usage of Internet and Policy

Communication and Usage of Internet and  Policy Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority

More information

DCSZ Student AUP Policy

DCSZ Student AUP Policy Dulwich College Suzhou DCSZ Student AUP Policy This Policy is underpinned by our School Guiding Statement (No.2) The College provides a safe, secure and stimulating environment Policy Code G1.1.2 Effective

More information

ICT Acceptable Use Policy (AUP)

ICT Acceptable Use Policy (AUP) ICT Acceptable Use Policy (AUP) ICT AUP v 5.1 DRAFT Page 1 of 14 Version Control Version Revision Date Author (s) Distributed Notes 1.2 Issued 02/02/2000 1.3 Issued 05/02/2010 Judy Wyld/Jon Shepherd/Vicki

More information

NHS Ayrshire & Arran Organisation & Human Resource Development Policy. Appropriate Use of IT Facilities Policy

NHS Ayrshire & Arran Organisation & Human Resource Development Policy. Appropriate Use of IT Facilities Policy NHS Ayrshire & Arran Organisation & Human Resource Development Policy Appropriate Use of IT Facilities Policy Version: 1.5 Date Approved: 2016-01-25 Author: Dept O&HRD, IT Security & Review date: 2018-01-25

More information

Kings Heath Academy Acceptable Use (Staff and Students) Policy and Procedures September 2018

Kings Heath Academy Acceptable Use (Staff and Students) Policy and Procedures September 2018 Kings Heath Academy Acceptable Use (Staff and Students) Policy and Procedures September 2018 Staff responsible: Kim Duff Principal This policy will be reviewed in September 2019 Dfe number: 9282153 Kings

More information

Electronic Network Acceptable Use Policy

Electronic Network Acceptable Use Policy Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s

More information

STUDENT ICT ACCEPTABLE USE POLICY

STUDENT ICT ACCEPTABLE USE POLICY The Olive School, Blackburn This policy is in line with the Mission Statement of the School To promote a culture of educational excellence, from within a caring and secure Islamic environment enriched

More information

ICT User Policy. for use in Essa Academy Essa Primary Academy Essa Nursery and Support Services

ICT User Policy. for use in Essa Academy Essa Primary Academy Essa Nursery and Support Services ICT User Policy for use in Essa Academy Essa Primary Academy Essa Nursery and Support Services For approval and adoption by the Board of Directors- 7 July 2017 For adoption by Essa Academy LGB- 19 September

More information

This Policy applies to all staff and other authorised users in St Therese School.

This Policy applies to all staff and other authorised users in St Therese School. St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way

More information

Reading School: ICT User Agreement Return Form (AUP)

Reading School: ICT User Agreement Return Form (AUP) Reading School: ICT User Agreement Return Form (AUP) For clarity, please use block capitals Student First Name Student Last Name Year started at Reading School?.. Tutor + Group Current Year Group House

More information

Acceptable Use Policy Document ID: SER-POL-001

Acceptable Use Policy Document ID: SER-POL-001 Date of Last Revision: 12/02/2018 Version: 3.0 This Policy will be reviewed on a yearly basis. However, if at any time the legislative or policy is so altered that the policy is no longer appropriate in

More information

Data Protection Policy

Data Protection Policy Page 1 of 6 General Statement The Local Governing Bodies of the academies have overall responsibility for ensuring that records are maintained, including security and access arrangements, in accordance

More information

Text and messaging - Safeguarding Guidelines

Text and  messaging - Safeguarding Guidelines Safeguarding and Protecting Children Guidance SPCG 32 Text and Email messaging - Safeguarding Guidelines Text messaging and emails can help improve the success of rowing clubs, affiliated organisations

More information

Anti-Cyber Bullying Policy.

Anti-Cyber Bullying Policy. Anti-Cyber Bullying Policy. Bullying, in any form, is an issue that we all take very seriously at Bredon School. We accept that victims can become depressed and suicidal, and even take their own lives.

More information

Using in Schools

Using  in Schools Using e-mail in Schools Education, Leisure & Lifelong Learning Baglan Information Technology Centre C O N T E N T S Page Background... 1 Teaching e-safety... 1 Using e-mail to enhance teaching and learning...

More information

E-LEARNING, E-SAFETY & ICT FOR LEARNING POLICY

E-LEARNING, E-SAFETY & ICT FOR LEARNING POLICY E-LEARNING, E-SAFETY & ICT FOR LEARNING POLICY Author of Policy Mal Nash Vice Principal Date adopted by Governors/Academy December 2014 Signed on behalf of Governing Body Date reviewed December 2014 ALL

More information

St James Primary School Mobile Phone Policy for staff, visitors, volunteers and pupils

St James Primary School Mobile Phone Policy for staff, visitors, volunteers and pupils 2017-19 Learning to live, living to learn, learning from Christ Signed by Chair Date.. This policy provides clear guidance on the use of mobile phones in school by both staff and pupils Introduction St

More information

Electronic Device Policy (EDP)

Electronic Device Policy (EDP) Powerstown Educate Together National School Roll No: 20384J Powerstown Road, Tyrrelstown, Dublin 15 Telephone: 01 8272018 Email: info@powerstownet.com www.powerstownet.com Powerstown Educate Together National

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Information Security Policy for Associates and Contractors Version: 1.13 Date: 11 October 2016 Reference: 67972761 Location: Livelink Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

Lambton Primary School

Lambton Primary School Lambton Primary School Advice to pupils on Cyber Bullying For pupils If you re being bullied by phone or the internet Remember, bullying is never your fault. It can be stopped, and it can usually be traced.

More information

Joseph Swan Academy ICT, Internet and Acceptable Use Policy (Incorporating electronic and online safety and mobile device use)

Joseph Swan Academy ICT, Internet and Acceptable Use Policy (Incorporating electronic and online safety and mobile device use) Joseph Swan Academy ICT, Internet and Acceptable Use Policy (Incorporating electronic and online safety and mobile device use) 2017 2018 To be reviewed September 2018 1 Contents Page Introduction 3 ICT

More information

Leiden University Regulations on ICT and Internet Use. Version

Leiden University Regulations on ICT and Internet Use. Version 1 Leiden University Regulations on ICT and Internet Use Version 1.0 4-11-2014 These Regulations state the rules regarding the use of ICT and internet facilities offered by Leiden University to its students,

More information

The Provincial Grand Lodge and Chapter of East Lancashire. Data Protection Act 1998

The Provincial Grand Lodge and Chapter of East Lancashire. Data Protection Act 1998 The Provincial Grand Lodge and Chapter of East Lancashire Data Protection Act 1998 Why do I need to read this? If you have access to the systems and records that the Province holds about our members, or

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager. London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

NebraskaLink Acceptable Use Policy

NebraskaLink Acceptable Use Policy NebraskaLink Acceptable Use Policy Introduction This acceptable use policy (the "Policy") defines acceptable practices relating to the use of NebraskaLink's services (the "Service") by customers of NebraskaLink

More information

POLICY BURLINGTON TOWNSHIP BOARD OF EDUCATION. PROGRAM 2361/page 1 of 8 Acceptable Use of Computer Network/Computers and Resources M

POLICY BURLINGTON TOWNSHIP BOARD OF EDUCATION. PROGRAM 2361/page 1 of 8 Acceptable Use of Computer Network/Computers and Resources M 2361/page 1 of 8 M 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The Board shall develop a technology plan that effectively uses electronic communication to advance and promote learning

More information

The John Fisher School ICT Policy

The John Fisher School ICT Policy The John Fisher School ICT Policy Responsible: Governors Resources Committee Review Date: May 2018 The need for a policy All The John Fisher School s information communication technology (ICT) facilities

More information

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY Introduction The college offer an extensive range of IT systems across campuses and online for course related activities and drop-in purposes. This policy applies

More information

Welcome Pack.

Welcome Pack. Welcome Pack This welcome pack is intended to get you up and running with your new account as smoothly as possible and contains the following information: What is the London Grid for Learning? Accessing

More information

Karratha Senior High School. Bring Your Own Device. Computer Usage Policy

Karratha Senior High School. Bring Your Own Device. Computer Usage Policy Karratha Senior High School Bring Your Own Device Computer Usage Policy Table of Contents 1 Introduction 3 2 Description and Purpose of the Project 3/4 3 Responsibilities 4 3.1 The Role of Students 4 3.2

More information

St Bernard s Primary School Data Protection Policy

St Bernard s Primary School Data Protection Policy St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General

More information

ICT Acceptable Use Policy for Students

ICT Acceptable Use Policy for Students ICT Acceptable Use Policy for Students a 52 Eurobin Avenue, Manly NSW 2095 t +61 2 9977 5144 f +61 2 9976 2753 cricos 03290E e administration@stellamaris.nsw.edu.au w www.stellamaris.nsw.edu.au abn 88

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through

More information

REPORTING INFORMATION SECURITY INCIDENTS

REPORTING INFORMATION SECURITY INCIDENTS INFORMATION SECURITY POLICY REPORTING INFORMATION SECURITY INCIDENTS ISO 27002 13.1.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-13.1.1 Version No: 1.0 Date: 1 st

More information

UCL Policy on Electronic Mail ( )

UCL Policy on Electronic Mail ( ) LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD

More information

NEN The Education Network

NEN The Education Network NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected

More information

Heavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017

Heavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017 Heavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017 Introduction The Data Protection Act 1998 (the Act) is the primary legislation in the United Kingdom, which regulates

More information

Data Protection. Policy

Data Protection. Policy Data Protection Policy Policy adopted: April 2016 Policy review date: April 2018 OAT Model Policy 1 Contents 1. Policy statement and principles... 3 1.1 Policy aims and principles... 3 1.2 Data protection

More information

Healing School - A Science Academy GDPR Policy (Exams) 2018/19

Healing School - A Science Academy GDPR Policy (Exams) 2018/19 Healing School - A Science Academy GDPR Policy (Exams) 2018/19 This policy is reviewed annually to ensure compliance with current regulations Author Date adopted by MAT Directors Mrs D Barnard Review Date

More information

Date Approved: Board of Directors on 7 July 2016

Date Approved: Board of Directors on 7 July 2016 Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory

More information

ILM Whistle-blowing Policy for Centres, Providers and Candidates

ILM Whistle-blowing Policy for Centres, Providers and Candidates ILM Whistle-blowing Policy for Centres, Providers and Candidates V1 November 2017 Contents Document Change History 2 Scope 3 Definition 3 How to report a concern 4 What happens next? 4 Confidentiality

More information

Colburn Community Primary School ICT and Computing Policy

Colburn Community Primary School ICT and Computing Policy Colburn Community Primary School ICT and Computing Policy Introduction The use of information and communication technology is an integral part of the national curriculum and is a key skill for everyday

More information

Stopsley Community Primary School. Data Breach Policy

Stopsley Community Primary School. Data Breach Policy Stopsley Community Primary School Data Breach Policy Contents Page 1 Introduction... 3 2 Aims and objectives... 3 3 Policy Statement... 4 4 Definitions... 4 5 Training... 5 6 Identification... 5 7 Risk

More information

Mobile Phones and Electronic Devices Policy

Mobile Phones and Electronic Devices Policy Wetherby School Little Wetherby and Reception 19 Pembridge Villas London W11 3EP Wetherby School Years 1, 2 and 3 11 Pembridge Square London W2 4ED Mobile Phones and Electronic Devices Policy Policy reviewed

More information

A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST

A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST WHAT IS BULLYING? Bullying is repeated aggression, verbal, psychological or physical conduct by an individual or a group against others. Bullying is always

More information

COMPUTER ACCEPTABLE USE POLICY - STUDENTS (summary)

COMPUTER ACCEPTABLE USE POLICY - STUDENTS (summary) COMPUTER ACCEPTABLE USE POLICY - STUDENTS (summary) This agreement includes all computers, laptops, smartphones and other electronic equipment in College as well as College s Firefly VLE and College-sponsored

More information

General Data Protection Regulation policy 2017/18

General Data Protection Regulation policy 2017/18 EXAMINATIONS GDPR POLICY General Data Protection Regulation policy 2017/18 This policy is annually reviewed to ensure compliance with current regulations 1 Key staff involved in the General Data Protection

More information

Terms and Conditions of use for the

Terms and Conditions of use for the Terms and Conditions of use for the Site Builder 1 Introduction The Site Builder is a computer system operated over the Internet to support the creation and management of websites for individual U3A, including

More information

Policy Use of Information and Communications Technology (ICT) Resources

Policy Use of Information and Communications Technology (ICT) Resources Policy Use of Information and Communications Technology (ICT) Resources Background This policy is necessary in order to: Provide all Hereworth members (Board, staff, boys and volunteers) with clear parameters

More information

LEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive.

LEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive. LEARNER I.T. ACCEPTABLE USE POLICY Learner I.T. Acceptable Use Policy 2012-13 [Type text] Updated November 2011. Authorised by ILT Board/Executive. Learner I.T. Acceptable Use Policy Table of Contents

More information

Fooji Code of Conduct

Fooji Code of Conduct Fooji Code of Conduct In order to protect the experience of the Fooji fans and employees, there are some limitations on the type of content and behavior that we allow. These limitations are set forth in

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

Level 1 Internet Safety for IT Users ( )

Level 1 Internet Safety for IT Users ( ) Level 1 Internet Safety for IT Users (7574-135) ITQ (QCF) Assignment guide for Candidates Assignment A www.cityandguilds.com November 2011 Version 1.0 About City & Guilds City & Guilds is the UK s leading

More information

Garth Hill College THE USE OF MOBILE PHONES AND DIGITAL DEVICES POLICY. Ratified by Curriculum and Pupil Development Committee:

Garth Hill College THE USE OF MOBILE PHONES AND DIGITAL DEVICES POLICY. Ratified by Curriculum and Pupil Development Committee: Garth Hill College THE USE OF MOBILE PHONES AND DIGITAL DEVICES POLICY Policy Owner: Principal Amended: September 2017 Amended: March 2018 Ratified by Curriculum and Pupil Development Committee: 5-3-2015

More information

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017 GMSS Information Governance & Cyber Security Incident Reporting Procedure February 2017 Review Date; April 2018 1 Version Control: VERSION DATE DETAIL D1.0 20/04/2015 First Draft (SC) D 2.0 28/04/2015

More information

General Data Protection Regulation policy (exams) 2017/18

General Data Protection Regulation policy (exams) 2017/18 General Data Protection Regulation policy () 2017/18 This policy is annually reviewed to ensure compliance with current regulations This policy can beviewed on the school website Approved/reviewed by Gail

More information

1. Introduction and Overview 3

1. Introduction and Overview 3 Data Breach Policy Contents 1. Introduction and Overview 3 1.1 What is a Serious Information Governance Incident? 3 1.2 What causes a SIGI? 3 1.3 How can a SIGI be managed? 4 2. How to manage an incident

More information

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources

More information

amaysim NBN Broadband Fair Go Policy Valid as of May 2017

amaysim NBN Broadband Fair Go Policy Valid as of May 2017 Valid as of May 2017 Table of Contents 1. ABOUT THIS POLICY 2 2. GENERAL 2 3. ILLEGAL ACTIVITY 3 4. SECURITY 3 5. RISKS OF THE INTERNET 4 6. CONTENT PUBLISHING 5 7. ELECTRONIC MESSAGING 6 8. ONLINE FORUMS

More information

LEGAL ADVICE ON THE USE OF MOBILE PHONES, PROTABLE COMPUTER GAMES, TAPE RECORDERS AND CAMERAS IN SCHOOL

LEGAL ADVICE ON THE USE OF MOBILE PHONES, PROTABLE COMPUTER GAMES, TAPE RECORDERS AND CAMERAS IN SCHOOL LEGAL ADVICE ON THE USE OF MOBILE PHONES, PROTABLE COMPUTER GAMES, TAPE RECORDERS AND CAMERAS IN SCHOOL DIOCESE OF WAGGA WAGGA Policy Number 02/10 Policy Name Legal advice on the use of Mobile Phones,

More information

How to Record an Exclusion

How to Record an Exclusion How to Record an Exclusion Applicable to SIMS.net version 7.104 onwards. Permissions required You must be a member of any of the following user groups in System Manager to run this function: Administration

More information

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

Each member of the St. Margaret s Community has the privilege to access Google Apps  provided by the school s network NETWORK APPROPRIATE USE AGREEMENT 2018-2019 We are pleased to offer students of St. Margaret s School access to our computer network for electronic mail and the Internet. To gain access to e-mail and the

More information

Remote Access (Supporting Document)

Remote Access (Supporting Document) Remote Access (Supporting Document) April 2007 Version Control Sheet Title: Purpose: Owner: Approved by: Remote Access (Supporting Document The advise staff of the councils policy and procedures regarding

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY The purpose of this document is to communicate Clayton County Public Schools Board of Education policies to ensure efficient, effective, and safe use of all CCPS's digital resources.

More information

COMPUTER USE POLICY Staff

COMPUTER USE POLICY Staff COMPUTER USE POLICY Staff Introduction The Pontifical Council for Social Communications (2002) has acknowledged the powerful contribution that the Internet 1 can make to the development of human life and

More information

Staff Information System Acceptable Use Policy

Staff Information System Acceptable Use Policy Staff Information System Acceptable Use Policy Hing Shung Chan Vice President of Information Technology Information Security Officer Table of Contents I. Definitions II. Rights and Responsibilities III.

More information

Milton State School BYOD Frequently Asked Questions

Milton State School BYOD Frequently Asked Questions Milton State School BYOD Frequently Asked Questions What is BYOD? BYOD stands for Bring Your Own Device. BYOD is an initiative that will allow students who have personal technology devices to bring them

More information

Your Views Matter. Improvement Works: What to Expect

Your Views Matter. Improvement Works: What to Expect Your Views Matter Improvement Works: What to Expect We aim to provide excellent services to all our tenants and customers. Your feedback allows us to understand if we are getting it right. We would like

More information

BCS Professional Certification BCS Professional Certification Guidelines for Candidates Remote Proctor Guidelines for Candidates August 2016 January

BCS Professional Certification BCS Professional Certification Guidelines for Candidates Remote Proctor Guidelines for Candidates August 2016 January BCS Professional Certification BCS Professional Certification Guidelines for Candidates Remote Proctor Guidelines for Candidates August 2016 January 2019 Copyright BCS 2019 Page 1 of 8 Contents 1. Purpose

More information

SDHS Security Policy v5.3, revised March 2015

SDHS Security Policy v5.3, revised March 2015 SDHS Security Policy v5.3, revised March 2015 The SDHS Security Policy is reviewed annually by the Council of the School - the policy presented here was approved in March 2015. Interim revisions may be

More information

INFORMATION TECHNOLOGY SECURITY POLICY

INFORMATION TECHNOLOGY SECURITY POLICY INFORMATION TECHNOLOGY SECURITY POLICY Author Responsible Director Approved By Data Approved September 15 Date for Review November 17 Version 2.3 Replaces version 2.2 Mike Dench, IT Security Manager Robin

More information

Site Builder Privacy and Data Protection Policy

Site Builder Privacy and Data Protection Policy Site Builder Privacy and Data Protection Policy This policy applies to the work of the Third Age Trust s Site Builder Team. The policy sets out the approach of the Team in managing personal information

More information

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

The Global Fund to Prevent Violence against Children

The Global Fund to Prevent Violence against Children The Global Fund to Prevent Violence against Children There are children out there, vulnerable children, who are counting on us to get this right. Every single child is precious. Every child deserves a

More information

Safe OnLine Outreach Society

Safe OnLine Outreach Society Safe OnLine Outreach Society s 2004 Staff Knowledge Assessment Tool and The Key to Technological Recommendations for Non-Profit Organizations This package contains three tools you can use to take a look

More information

Castle View Primary School Data Protection Policy

Castle View Primary School Data Protection Policy Castle View Primary School Data Protection Policy Aims The Headteacher and Governors of the school intend to comply fully with the requirements and principles of the Data Protection Act 1998. All staff

More information

The Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY

The Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY Policy for the acceptable use of mobile phones and cameras by the staff of the Lee Wiggins Childcare Centre (LWCC) Mobile Phones In order to provide a safe environment for children, parents and staff we

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Preamble This document may be augmented or replaced by relevant sections of other parts of our Agreement, and should be read in conjunction with other supporting documents, so please

More information

Weeding Google Drive Guidance and advice for managing your files with Google (September 2018)

Weeding Google Drive Guidance and advice for managing your files with Google (September 2018) Weeding Google Drive Guidance and advice for managing your files with Google (September 2018) Disclaimer: Google is continually developing and updating its G-Suite products for Education (of which Google

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

F9A0 04 (ESKINT2): Using the Internet 2

F9A0 04 (ESKINT2): Using the Internet 2 F9A0 04 (ESKINT2): Using the Internet 2 4 SCQF credit points at SCQF level 5 Description: This is the ability to set up and use appropriate connection methods to access the internet; make the best use

More information

S E R V E R C E N T R E

S E R V E R C E N T R E S E R V E R C E N T R E H O S T I N G Acceptable Use Policy Server Centre Hosting Ltd 28/06/2011 Server Centre Hosting Ltd, The Old Public Hall, 3 Watnall Road, Hucknall, Nottingham, NG15 7LD Acceptable

More information

Dumas ISD. Acceptable Use Policy

Dumas ISD. Acceptable Use Policy Dumas ISD Acceptable Use Policy Introduction Dumas ISD is excited to offer our staff and students access to modern technologies and mobile devices in conjunction with access to the Internet. Use of the

More information

Learning and Development. UWE Staff Profiles (USP) User Guide

Learning and Development. UWE Staff Profiles (USP) User Guide Learning and Development UWE Staff Profiles (USP) User Guide About this training manual This manual is yours to keep and is intended as a guide to be used during the training course and as a reference

More information

Masada College Student Bring Your Own Device (BYOD) Policy Guidelines Years 7-12

Masada College Student Bring Your Own Device (BYOD) Policy Guidelines Years 7-12 Masada College Student Bring Your Own Device (BYOD) Policy Guidelines Years 7-12 1. Introduction Masada College supports the bringing of a computing device to school by all students in Years 7-12 for use

More information

Ormiston Sandwell Community Academy Personal Electronic Devices Policy

Ormiston Sandwell Community Academy Personal Electronic Devices Policy Ormiston Academies Trust Ormiston Sandwell Community Academy Personal Electronic Devices Policy Policy version control Policy type Author Mandatory OAT Sarah Bloomer Approved by Paula Arrowsmith October

More information

Grove Country Day School aka Academ y Acceptable Use Policy (AUP)

Grove Country Day School aka Academ y Acceptable Use Policy (AUP) Grove Country Day School aka Academ y Acceptable Use Policy (AUP) Computer & Network Access Wireless Devices Students, staff and members of the community using Grove Country Day School LLC aka Academy

More information

Brochure for Information Security

Brochure for Information Security 福山大学 Application of Tools for Information Security for a fulfilling Life at University Brochure for Information Security Raising the Quality of Learning Fukuyama University Information Service Promoting

More information

GLOBAL PAYMENTS AND CASH MANAGEMENT. Security

GLOBAL PAYMENTS AND CASH MANAGEMENT. Security GLOBAL PAYMENTS AND CASH MANAGEMENT Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

FOUNDRY COLLEGE. General Data Protection Regulation (GDPR) Policy Incorporating Freedom of Information

FOUNDRY COLLEGE. General Data Protection Regulation (GDPR) Policy Incorporating Freedom of Information FOUNDRY COLLEGE General Data Protection Regulation (GDPR) Policy Incorporating Freedom of Information Document Control Information Version DATE DESCRIPTION 1 01/02/2012 Adopted for Foundry College 2 27/01/2013

More information

Fair and acceptable usage policy

Fair and acceptable usage policy What is this document? This document details all the uses of NTE Limited s Internet and Fixed network services that we consider unacceptable in other words, unfair usage. By Internet services we mean any

More information

Policy & Procedure Privacy Policy

Policy & Procedure Privacy Policy NUMBER POL 050 PAGES 12 VERSION V3.8 CREATED: LAST MODIFIED: REVISION: 05/11/2009 06/06/2018 06/06/2019 DOCUMENTS: Authority to Exchange Information Media Authority Student Staff Privacy Agreement REFERENCES:

More information