Staff AUP (Acceptable Use Policy)
|
|
- Joel Gray
- 5 years ago
- Views:
Transcription
1 Guidance review Date April 2014 Date of next Review April 2016 Who reviewed this Guidance? Deputy Headteacher Guidance: Staff AUP (Acceptable Use Policy) Rights Responsibilities How does the school protect me? How does the Local Authority and London Grid for Learning Protect me? Actions I should take should I suspect something is wrong I have the right to a reliable, fast, secure and safe broadband internet connection within school use this broadband connection for professional purposes only - excessive use for other reasons is not acceptable. It is also my responsibility not to try to access broadband materials by bypassing the firewall and filters set up by the school and internet provider. The school has an agreed AUP. This AUP states clearly how my professional work will be supported by our internet service provider. The school purchases a 100 mbps broadband connection. This is provided by Virgin through the London Grid for Learning. This is dedicated educational provision with fire walling, filters and monitoring software appropriate to an educational setting. If the internet is not working properly I should inform the Network Manger who will assess whether it is a local problem to the school or a regional problem and inform me of the outcome. Page 1 of 5
2 I have the right to access the internet, for research and to develop my professional capabilities through online materials and accessing information on the school network I have the responsibility to use the internet appropriately for my professional work. It is my responsibility not to attempt to gain access to unsuitable or illegal sites - these include those which involve child abuse, sexually explicit material, pornography, race hate and incitement to violence. use broadband in an appropriate way for my professional development and therefore the use of forums, chat rooms, shopping, auction sites and social networking sites will be to support my professional development and not for private use within school. The School through the Network Manager with their team provides a safe and secure environment including filtering and fire walling. The firewall is updated continually to block sites considered inappropriate for school use and allows sites which are suitable. The school is responsible for ensuring that other inappropriate sites are blocked. These include pornography, gambling, race hate, drugs and weapons. The school network monitors all use of computers and can produce logs of evidence which show inappropriate internet access by all users. The LEA with London Grid for Learning provides schools with protection from these inappropriate sites by installing an CachePilot* at the school site. Administration rights are strictly controlled within the school. If I suspect a site should be blocked, or allowed, in school I should inform the Network Manager who will take appropriate action to support me. London Grid for Learning working with the other Regional Broadband Consortiums are continually adding sites suitable to schools to the white list and unsuitable sites to the black list. The Network Manager can contact the London Grid for Learning should sites need changing for my work. * The CachePilot controls access to these sites and is managed by individual schools. The LA and London Grid for Learning strongly recommend that schools do not unblock these categories via the CachePilot Page 2 of 5
3 I have the right to have a secure area where I can store my professional work. This includes the right to a Learning Platform (Fronter) account where I can access, store and retrieve materials used in my professional capacity. I have access to this from anywhere with an internet connection. I also have the right to a secure area for storage. I have the right to be able to access my work safely and be confident that no-one else is plagiarising my work. ensure that my work does not infringe copyright, is not unsuitable and cannot be accessed by others without my permission. acknowledge that the AUP which applies to school work also applies to the Learning Platform (Fronter). I should regularly back up the data stored on my laptop. I should follow the school policy on the use of images when using photographs and images as part of my work. I should change my password regularly and not disclose this to others. It is my responsibility not to attempt to access the work area of others or to copy their work without permission. The Network Manager at the direction of the Head Teacher has the duty to protect the school network. If there is a suspicion that materials stored may be of an unprofessional nature and unsuitable for a school environment the Network Manager may be asked to produce evidence for the Senior leadership team who therefore have access to all files on the network. Monitoring software is used by the school which can record information which will provide evidence of infringements of this Acceptable Use Policy. The Senior leadership team will have the support of the LEA Adviser and LGFL in investigating any serious breach of the AUP. If I suspect that someone is assessing my material or copying my work I should report this to a member of the Senior leadership team who will organise an investigation to help me. If I suspect that someone else is accessing my work I will inform a member of the Senior leadership team who will investigate. acknowledge copyright and not to download or upload work which is protected by copyright Page 3 of 5
4 I have the right to a professional account for use in my work I have the right to a network which is safe, reliable and secure use this facility in a professional way to support my work. regularly update and run the anti-virus programme on my computer (if provided by school) and not to open attachments on which may be suspicious. The LGFL facility provided by the school uses a filter which blocks inappropriate content and abusive words. It also protects me by stopping unwanted s and spam. The school have invested in anti-virus software and purchase software to enable my equipment to work efficiently. The LGFL have invested in a network which provides reliable and secure access If I receive unsolicited e- mail or have concerns about suspicious attachments I should inform the Network Manager who will investigate. If I suspect that there has been an infringement of the security of the network I should report this to a Senior Member of Staff who will investigate with the appropriate body. report any damage or problems to the Network Manager and the support team. Important links take reasonable precautions to ensure that if I use a computer, laptop or other device (including USB flash drive) outside school and I intend to connect it to the school network it will have suitable up to date anti-virus software running. NUT Guidance Document on and Internet Use Think You Know Website Page 4 of 5
5 What to do with Suspicious You receive an that has potentially illegal material e.g. Child abuse images, Incitement to violence or Race hate You receive an that contains inappropriate content e.g. abusive or bullying content, adult sexual material etc. This is from someone you know within the school environment You receive an that contains inappropriate content e.g. Adult sexual material, bad language etc. and this is not from someone you know but is from what seems to be a real (i.e. not a spam) address You receive an that contains inappropriate content e.g. Adult sexual material This is not from someone you know and appears to be a SPAM . Headteacher. A written log should be kept of the and the fact that it was passed onto the Internet Watch Federation (IWF). IWF Go to Click on the report button and follow the instructions and their advice. The IWF is the only organisation licensed to investigate illegal content Page 5 of 5 Headteacher. A written log should be kept of the . An investigation within the school should be undertaken. If necessary to escalate this investigation your school should contact the LEA to authorise London Grid for Learning to investigate further. Sending such mails using the London Grid for Learning is not allowed under the AUP. Headteacher. A written log should be kept of the and where it was sent for investigation Contact the LEA who will authorise London Grid for Learning to investigate. They will trace the sender s ISP and advise on further action (such as contacting the sender s school/organisation to raise a complaint under their AUP) Headteacher. A written log should be kept of the and where it was sent for investigation Network manager to report this to London Gridfor Learning to investigate. In all cases secure the in a folder and only delete when the investigation has been completed or you are advised to do so. In the case of potential illegal material do not show the to anyone and take the advise of the Internet Watch Foundation. Do NOT always presume that the sender s address is telling you the truth Spammers can and do fake other s addresses.
Digital Safety and Digital Citizenship
Digital Safety and Digital Citizenship A Guide for Students The laptop has been given to you as a tool for learning. Use it for that. While doing so, here are some important rules for keeping yourself
More informationComputer and Internet Use Policy
Computer and Internet Use Policy Author Simon Allan Date Written Autumn 2015 Review Date Autumn 2018 Date Ratified by the Governing Body Autumn 2015 Computer and Internet Use Policy Outline/Overview This
More informationPUPIL ICT ACCEPTABLE USE POLICY
PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status
More informationONLINE SAFETY. Messaging, , Vlogging and Sexting
ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.
More informationGrand Avenue Primary and Nursery School ICT Data management. Contents
Grand Avenue Primary and Nursery School ICT Data management Contents 1. Acceptable Use Statement 2. Transfer and Offsite Use of Sensitive Data 3. E-safety 4. Declaration Introduction These three policy
More informationUSAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;
USAGE POLICIES Any terms in capitals not defined in these Usage Policies will have the same meaning as in your Contract. These Usage Policies apply to you and anybody you allow to use NOW Broadband and
More informationCommunication and Usage of Internet and Policy
Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority
More informationDCSZ Student AUP Policy
Dulwich College Suzhou DCSZ Student AUP Policy This Policy is underpinned by our School Guiding Statement (No.2) The College provides a safe, secure and stimulating environment Policy Code G1.1.2 Effective
More informationICT Acceptable Use Policy (AUP)
ICT Acceptable Use Policy (AUP) ICT AUP v 5.1 DRAFT Page 1 of 14 Version Control Version Revision Date Author (s) Distributed Notes 1.2 Issued 02/02/2000 1.3 Issued 05/02/2010 Judy Wyld/Jon Shepherd/Vicki
More informationNHS Ayrshire & Arran Organisation & Human Resource Development Policy. Appropriate Use of IT Facilities Policy
NHS Ayrshire & Arran Organisation & Human Resource Development Policy Appropriate Use of IT Facilities Policy Version: 1.5 Date Approved: 2016-01-25 Author: Dept O&HRD, IT Security & Review date: 2018-01-25
More informationKings Heath Academy Acceptable Use (Staff and Students) Policy and Procedures September 2018
Kings Heath Academy Acceptable Use (Staff and Students) Policy and Procedures September 2018 Staff responsible: Kim Duff Principal This policy will be reviewed in September 2019 Dfe number: 9282153 Kings
More informationElectronic Network Acceptable Use Policy
Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s
More informationSTUDENT ICT ACCEPTABLE USE POLICY
The Olive School, Blackburn This policy is in line with the Mission Statement of the School To promote a culture of educational excellence, from within a caring and secure Islamic environment enriched
More informationICT User Policy. for use in Essa Academy Essa Primary Academy Essa Nursery and Support Services
ICT User Policy for use in Essa Academy Essa Primary Academy Essa Nursery and Support Services For approval and adoption by the Board of Directors- 7 July 2017 For adoption by Essa Academy LGB- 19 September
More informationThis Policy applies to all staff and other authorised users in St Therese School.
St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way
More informationReading School: ICT User Agreement Return Form (AUP)
Reading School: ICT User Agreement Return Form (AUP) For clarity, please use block capitals Student First Name Student Last Name Year started at Reading School?.. Tutor + Group Current Year Group House
More informationAcceptable Use Policy Document ID: SER-POL-001
Date of Last Revision: 12/02/2018 Version: 3.0 This Policy will be reviewed on a yearly basis. However, if at any time the legislative or policy is so altered that the policy is no longer appropriate in
More informationData Protection Policy
Page 1 of 6 General Statement The Local Governing Bodies of the academies have overall responsibility for ensuring that records are maintained, including security and access arrangements, in accordance
More informationText and messaging - Safeguarding Guidelines
Safeguarding and Protecting Children Guidance SPCG 32 Text and Email messaging - Safeguarding Guidelines Text messaging and emails can help improve the success of rowing clubs, affiliated organisations
More informationAnti-Cyber Bullying Policy.
Anti-Cyber Bullying Policy. Bullying, in any form, is an issue that we all take very seriously at Bredon School. We accept that victims can become depressed and suicidal, and even take their own lives.
More informationUsing in Schools
Using e-mail in Schools Education, Leisure & Lifelong Learning Baglan Information Technology Centre C O N T E N T S Page Background... 1 Teaching e-safety... 1 Using e-mail to enhance teaching and learning...
More informationE-LEARNING, E-SAFETY & ICT FOR LEARNING POLICY
E-LEARNING, E-SAFETY & ICT FOR LEARNING POLICY Author of Policy Mal Nash Vice Principal Date adopted by Governors/Academy December 2014 Signed on behalf of Governing Body Date reviewed December 2014 ALL
More informationSt James Primary School Mobile Phone Policy for staff, visitors, volunteers and pupils
2017-19 Learning to live, living to learn, learning from Christ Signed by Chair Date.. This policy provides clear guidance on the use of mobile phones in school by both staff and pupils Introduction St
More informationElectronic Device Policy (EDP)
Powerstown Educate Together National School Roll No: 20384J Powerstown Road, Tyrrelstown, Dublin 15 Telephone: 01 8272018 Email: info@powerstownet.com www.powerstownet.com Powerstown Educate Together National
More informationInformation Security Policy for Associates and Contractors
Information Security Policy for Associates and Contractors Version: 1.13 Date: 11 October 2016 Reference: 67972761 Location: Livelink Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...
More informationLambton Primary School
Lambton Primary School Advice to pupils on Cyber Bullying For pupils If you re being bullied by phone or the internet Remember, bullying is never your fault. It can be stopped, and it can usually be traced.
More informationJoseph Swan Academy ICT, Internet and Acceptable Use Policy (Incorporating electronic and online safety and mobile device use)
Joseph Swan Academy ICT, Internet and Acceptable Use Policy (Incorporating electronic and online safety and mobile device use) 2017 2018 To be reviewed September 2018 1 Contents Page Introduction 3 ICT
More informationLeiden University Regulations on ICT and Internet Use. Version
1 Leiden University Regulations on ICT and Internet Use Version 1.0 4-11-2014 These Regulations state the rules regarding the use of ICT and internet facilities offered by Leiden University to its students,
More informationThe Provincial Grand Lodge and Chapter of East Lancashire. Data Protection Act 1998
The Provincial Grand Lodge and Chapter of East Lancashire Data Protection Act 1998 Why do I need to read this? If you have access to the systems and records that the Province holds about our members, or
More informationDIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018
DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information
More informationPolicy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.
London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate
More informationAcceptable Use Policy (AUP)
Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet
More informationNebraskaLink Acceptable Use Policy
NebraskaLink Acceptable Use Policy Introduction This acceptable use policy (the "Policy") defines acceptable practices relating to the use of NebraskaLink's services (the "Service") by customers of NebraskaLink
More informationPOLICY BURLINGTON TOWNSHIP BOARD OF EDUCATION. PROGRAM 2361/page 1 of 8 Acceptable Use of Computer Network/Computers and Resources M
2361/page 1 of 8 M 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The Board shall develop a technology plan that effectively uses electronic communication to advance and promote learning
More informationThe John Fisher School ICT Policy
The John Fisher School ICT Policy Responsible: Governors Resources Committee Review Date: May 2018 The need for a policy All The John Fisher School s information communication technology (ICT) facilities
More informationSTUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY
STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY Introduction The college offer an extensive range of IT systems across campuses and online for course related activities and drop-in purposes. This policy applies
More informationWelcome Pack.
Welcome Pack This welcome pack is intended to get you up and running with your new account as smoothly as possible and contains the following information: What is the London Grid for Learning? Accessing
More informationKarratha Senior High School. Bring Your Own Device. Computer Usage Policy
Karratha Senior High School Bring Your Own Device Computer Usage Policy Table of Contents 1 Introduction 3 2 Description and Purpose of the Project 3/4 3 Responsibilities 4 3.1 The Role of Students 4 3.2
More informationSt Bernard s Primary School Data Protection Policy
St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General
More informationICT Acceptable Use Policy for Students
ICT Acceptable Use Policy for Students a 52 Eurobin Avenue, Manly NSW 2095 t +61 2 9977 5144 f +61 2 9976 2753 cricos 03290E e administration@stellamaris.nsw.edu.au w www.stellamaris.nsw.edu.au abn 88
More informationEADS up. stop think connect
EADS up stop think connect You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through
More informationREPORTING INFORMATION SECURITY INCIDENTS
INFORMATION SECURITY POLICY REPORTING INFORMATION SECURITY INCIDENTS ISO 27002 13.1.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-13.1.1 Version No: 1.0 Date: 1 st
More informationUCL Policy on Electronic Mail ( )
LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD
More informationNEN The Education Network
NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected
More informationHeavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017
Heavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017 Introduction The Data Protection Act 1998 (the Act) is the primary legislation in the United Kingdom, which regulates
More informationData Protection. Policy
Data Protection Policy Policy adopted: April 2016 Policy review date: April 2018 OAT Model Policy 1 Contents 1. Policy statement and principles... 3 1.1 Policy aims and principles... 3 1.2 Data protection
More informationHealing School - A Science Academy GDPR Policy (Exams) 2018/19
Healing School - A Science Academy GDPR Policy (Exams) 2018/19 This policy is reviewed annually to ensure compliance with current regulations Author Date adopted by MAT Directors Mrs D Barnard Review Date
More informationDate Approved: Board of Directors on 7 July 2016
Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory
More informationILM Whistle-blowing Policy for Centres, Providers and Candidates
ILM Whistle-blowing Policy for Centres, Providers and Candidates V1 November 2017 Contents Document Change History 2 Scope 3 Definition 3 How to report a concern 4 What happens next? 4 Confidentiality
More informationColburn Community Primary School ICT and Computing Policy
Colburn Community Primary School ICT and Computing Policy Introduction The use of information and communication technology is an integral part of the national curriculum and is a key skill for everyday
More informationStopsley Community Primary School. Data Breach Policy
Stopsley Community Primary School Data Breach Policy Contents Page 1 Introduction... 3 2 Aims and objectives... 3 3 Policy Statement... 4 4 Definitions... 4 5 Training... 5 6 Identification... 5 7 Risk
More informationMobile Phones and Electronic Devices Policy
Wetherby School Little Wetherby and Reception 19 Pembridge Villas London W11 3EP Wetherby School Years 1, 2 and 3 11 Pembridge Square London W2 4ED Mobile Phones and Electronic Devices Policy Policy reviewed
More informationA GUIDE TO CYBERBULLYING THINK BEFORE YOU POST
A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST WHAT IS BULLYING? Bullying is repeated aggression, verbal, psychological or physical conduct by an individual or a group against others. Bullying is always
More informationCOMPUTER ACCEPTABLE USE POLICY - STUDENTS (summary)
COMPUTER ACCEPTABLE USE POLICY - STUDENTS (summary) This agreement includes all computers, laptops, smartphones and other electronic equipment in College as well as College s Firefly VLE and College-sponsored
More informationGeneral Data Protection Regulation policy 2017/18
EXAMINATIONS GDPR POLICY General Data Protection Regulation policy 2017/18 This policy is annually reviewed to ensure compliance with current regulations 1 Key staff involved in the General Data Protection
More informationTerms and Conditions of use for the
Terms and Conditions of use for the Site Builder 1 Introduction The Site Builder is a computer system operated over the Internet to support the creation and management of websites for individual U3A, including
More informationPolicy Use of Information and Communications Technology (ICT) Resources
Policy Use of Information and Communications Technology (ICT) Resources Background This policy is necessary in order to: Provide all Hereworth members (Board, staff, boys and volunteers) with clear parameters
More informationLEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive.
LEARNER I.T. ACCEPTABLE USE POLICY Learner I.T. Acceptable Use Policy 2012-13 [Type text] Updated November 2011. Authorised by ILT Board/Executive. Learner I.T. Acceptable Use Policy Table of Contents
More informationFooji Code of Conduct
Fooji Code of Conduct In order to protect the experience of the Fooji fans and employees, there are some limitations on the type of content and behavior that we allow. These limitations are set forth in
More informationData protection. 3 April 2018
Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd
More informationLevel 1 Internet Safety for IT Users ( )
Level 1 Internet Safety for IT Users (7574-135) ITQ (QCF) Assignment guide for Candidates Assignment A www.cityandguilds.com November 2011 Version 1.0 About City & Guilds City & Guilds is the UK s leading
More informationGarth Hill College THE USE OF MOBILE PHONES AND DIGITAL DEVICES POLICY. Ratified by Curriculum and Pupil Development Committee:
Garth Hill College THE USE OF MOBILE PHONES AND DIGITAL DEVICES POLICY Policy Owner: Principal Amended: September 2017 Amended: March 2018 Ratified by Curriculum and Pupil Development Committee: 5-3-2015
More informationGMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017
GMSS Information Governance & Cyber Security Incident Reporting Procedure February 2017 Review Date; April 2018 1 Version Control: VERSION DATE DETAIL D1.0 20/04/2015 First Draft (SC) D 2.0 28/04/2015
More informationGeneral Data Protection Regulation policy (exams) 2017/18
General Data Protection Regulation policy () 2017/18 This policy is annually reviewed to ensure compliance with current regulations This policy can beviewed on the school website Approved/reviewed by Gail
More information1. Introduction and Overview 3
Data Breach Policy Contents 1. Introduction and Overview 3 1.1 What is a Serious Information Governance Incident? 3 1.2 What causes a SIGI? 3 1.3 How can a SIGI be managed? 4 2. How to manage an incident
More informationREGULATION BOARD OF EDUCATION FRANKLIN BOROUGH
R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources
More informationamaysim NBN Broadband Fair Go Policy Valid as of May 2017
Valid as of May 2017 Table of Contents 1. ABOUT THIS POLICY 2 2. GENERAL 2 3. ILLEGAL ACTIVITY 3 4. SECURITY 3 5. RISKS OF THE INTERNET 4 6. CONTENT PUBLISHING 5 7. ELECTRONIC MESSAGING 6 8. ONLINE FORUMS
More informationLEGAL ADVICE ON THE USE OF MOBILE PHONES, PROTABLE COMPUTER GAMES, TAPE RECORDERS AND CAMERAS IN SCHOOL
LEGAL ADVICE ON THE USE OF MOBILE PHONES, PROTABLE COMPUTER GAMES, TAPE RECORDERS AND CAMERAS IN SCHOOL DIOCESE OF WAGGA WAGGA Policy Number 02/10 Policy Name Legal advice on the use of Mobile Phones,
More informationHow to Record an Exclusion
How to Record an Exclusion Applicable to SIMS.net version 7.104 onwards. Permissions required You must be a member of any of the following user groups in System Manager to run this function: Administration
More informationEach member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network
NETWORK APPROPRIATE USE AGREEMENT 2018-2019 We are pleased to offer students of St. Margaret s School access to our computer network for electronic mail and the Internet. To gain access to e-mail and the
More informationRemote Access (Supporting Document)
Remote Access (Supporting Document) April 2007 Version Control Sheet Title: Purpose: Owner: Approved by: Remote Access (Supporting Document The advise staff of the councils policy and procedures regarding
More informationACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY The purpose of this document is to communicate Clayton County Public Schools Board of Education policies to ensure efficient, effective, and safe use of all CCPS's digital resources.
More informationCOMPUTER USE POLICY Staff
COMPUTER USE POLICY Staff Introduction The Pontifical Council for Social Communications (2002) has acknowledged the powerful contribution that the Internet 1 can make to the development of human life and
More informationStaff Information System Acceptable Use Policy
Staff Information System Acceptable Use Policy Hing Shung Chan Vice President of Information Technology Information Security Officer Table of Contents I. Definitions II. Rights and Responsibilities III.
More informationMilton State School BYOD Frequently Asked Questions
Milton State School BYOD Frequently Asked Questions What is BYOD? BYOD stands for Bring Your Own Device. BYOD is an initiative that will allow students who have personal technology devices to bring them
More informationYour Views Matter. Improvement Works: What to Expect
Your Views Matter Improvement Works: What to Expect We aim to provide excellent services to all our tenants and customers. Your feedback allows us to understand if we are getting it right. We would like
More informationBCS Professional Certification BCS Professional Certification Guidelines for Candidates Remote Proctor Guidelines for Candidates August 2016 January
BCS Professional Certification BCS Professional Certification Guidelines for Candidates Remote Proctor Guidelines for Candidates August 2016 January 2019 Copyright BCS 2019 Page 1 of 8 Contents 1. Purpose
More informationSDHS Security Policy v5.3, revised March 2015
SDHS Security Policy v5.3, revised March 2015 The SDHS Security Policy is reviewed annually by the Council of the School - the policy presented here was approved in March 2015. Interim revisions may be
More informationINFORMATION TECHNOLOGY SECURITY POLICY
INFORMATION TECHNOLOGY SECURITY POLICY Author Responsible Director Approved By Data Approved September 15 Date for Review November 17 Version 2.3 Replaces version 2.2 Mike Dench, IT Security Manager Robin
More informationSite Builder Privacy and Data Protection Policy
Site Builder Privacy and Data Protection Policy This policy applies to the work of the Third Age Trust s Site Builder Team. The policy sets out the approach of the Team in managing personal information
More informationData protection policy
Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees
More informationThe Global Fund to Prevent Violence against Children
The Global Fund to Prevent Violence against Children There are children out there, vulnerable children, who are counting on us to get this right. Every single child is precious. Every child deserves a
More informationSafe OnLine Outreach Society
Safe OnLine Outreach Society s 2004 Staff Knowledge Assessment Tool and The Key to Technological Recommendations for Non-Profit Organizations This package contains three tools you can use to take a look
More informationCastle View Primary School Data Protection Policy
Castle View Primary School Data Protection Policy Aims The Headteacher and Governors of the school intend to comply fully with the requirements and principles of the Data Protection Act 1998. All staff
More informationThe Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY
Policy for the acceptable use of mobile phones and cameras by the staff of the Lee Wiggins Childcare Centre (LWCC) Mobile Phones In order to provide a safe environment for children, parents and staff we
More informationAcceptable Use Policy
Acceptable Use Policy Preamble This document may be augmented or replaced by relevant sections of other parts of our Agreement, and should be read in conjunction with other supporting documents, so please
More informationWeeding Google Drive Guidance and advice for managing your files with Google (September 2018)
Weeding Google Drive Guidance and advice for managing your files with Google (September 2018) Disclaimer: Google is continually developing and updating its G-Suite products for Education (of which Google
More informationYour security on click Jobs
Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can
More informationF9A0 04 (ESKINT2): Using the Internet 2
F9A0 04 (ESKINT2): Using the Internet 2 4 SCQF credit points at SCQF level 5 Description: This is the ability to set up and use appropriate connection methods to access the internet; make the best use
More informationS E R V E R C E N T R E
S E R V E R C E N T R E H O S T I N G Acceptable Use Policy Server Centre Hosting Ltd 28/06/2011 Server Centre Hosting Ltd, The Old Public Hall, 3 Watnall Road, Hucknall, Nottingham, NG15 7LD Acceptable
More informationDumas ISD. Acceptable Use Policy
Dumas ISD Acceptable Use Policy Introduction Dumas ISD is excited to offer our staff and students access to modern technologies and mobile devices in conjunction with access to the Internet. Use of the
More informationLearning and Development. UWE Staff Profiles (USP) User Guide
Learning and Development UWE Staff Profiles (USP) User Guide About this training manual This manual is yours to keep and is intended as a guide to be used during the training course and as a reference
More informationMasada College Student Bring Your Own Device (BYOD) Policy Guidelines Years 7-12
Masada College Student Bring Your Own Device (BYOD) Policy Guidelines Years 7-12 1. Introduction Masada College supports the bringing of a computing device to school by all students in Years 7-12 for use
More informationOrmiston Sandwell Community Academy Personal Electronic Devices Policy
Ormiston Academies Trust Ormiston Sandwell Community Academy Personal Electronic Devices Policy Policy version control Policy type Author Mandatory OAT Sarah Bloomer Approved by Paula Arrowsmith October
More informationGrove Country Day School aka Academ y Acceptable Use Policy (AUP)
Grove Country Day School aka Academ y Acceptable Use Policy (AUP) Computer & Network Access Wireless Devices Students, staff and members of the community using Grove Country Day School LLC aka Academy
More informationBrochure for Information Security
福山大学 Application of Tools for Information Security for a fulfilling Life at University Brochure for Information Security Raising the Quality of Learning Fukuyama University Information Service Promoting
More informationGLOBAL PAYMENTS AND CASH MANAGEMENT. Security
GLOBAL PAYMENTS AND CASH MANAGEMENT Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
More informationFOUNDRY COLLEGE. General Data Protection Regulation (GDPR) Policy Incorporating Freedom of Information
FOUNDRY COLLEGE General Data Protection Regulation (GDPR) Policy Incorporating Freedom of Information Document Control Information Version DATE DESCRIPTION 1 01/02/2012 Adopted for Foundry College 2 27/01/2013
More informationFair and acceptable usage policy
What is this document? This document details all the uses of NTE Limited s Internet and Fixed network services that we consider unacceptable in other words, unfair usage. By Internet services we mean any
More informationPolicy & Procedure Privacy Policy
NUMBER POL 050 PAGES 12 VERSION V3.8 CREATED: LAST MODIFIED: REVISION: 05/11/2009 06/06/2018 06/06/2019 DOCUMENTS: Authority to Exchange Information Media Authority Student Staff Privacy Agreement REFERENCES:
More information