LEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive.

Size: px
Start display at page:

Download "LEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive."

Transcription

1 LEARNER I.T. ACCEPTABLE USE POLICY Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive.

2 Learner I.T. Acceptable Use Policy Table of Contents Pg. 1. This policy and your responsibilities Your Agreement, Monitoring & Disciplinary Action How we protect you and why What you must do to protect yourself The Rules What you mustn t do Personal Use Review of this Policy Related Documents 10 Updated November Authorised by ILT Board 2

3 1. This Policy and Your Responsibilities Introduction This policy applies to every learner who connects to and uses parts of or all of the College s I.T. services. It applies whether you are here on campus or working from home, a workplace or a distance. It applies to your use of our equipment and your own equipment on our services and it also applies to your conduct when using your mobile phone from our premises or to contact other College students and staff. You must read this policy and keep to the rules and guidelines set out within it. These exist to protect you and to ensure that you learn safely and get the most from our systems. When you sign your Student Learner Agreement, you also sign your agreement to keep to these rules. A printed copy of this policy is available for you to see when you Enrol and you can look at it online at any time on the Student Intranet. 2. Your agreement and disciplinary action of you break it Monitoring and disciplinary action What you do online and what you access and store on the College network is monitored and this is the case whether you are using our equipment or your own equipment. If we find that you have broken the rules within this policy, you will be interviewed about this, it will go on your record and depending how serious your actions are, it could result in disciplinary action and dismissal from the College. Your agreement to stick to the rules in this policy When you sign your Student Learner Agreement, you also sign your agreement to keep to the rules within this policy. Questions about this policy Any questions about this policy should be directed to IT Services at this address: itservices@bradfordcollege.ac.uk Reporting of issues If you suspect that someone else is breaking the rules, you must share your concerns (in confidence if necessary) with your Tutor who will make sure that this is investigated. 3. What the College does to protect you and why We do lots to help you to stick to the rules and we do lots more in the background to protect you from threats that might arise from the unprotected internet. Here are just a few of the things that we do: Internet We block thousands of known bad sites and we update the list of these as soon as updates are released. BUT a College is a bigger world than school and we don t create our own version of the internet as many schools do because some of our courses need Updated November Authorised by ILT Board 3

4 to see a wide variety of material. So we do set out some rules for you to keep to and these are good guidelines for internet use for life. Personal Details We don t publish your personal details and we don t allow our staff to save these on DVDs etc. We keep your personal data safe. Secure Backed Up Storage We offer you a private storage area at Microsoft s Live@EDU and if you use specialist software you may also have storage on our servers. We back our servers up each night onto tapes that are stored in fire-safes around the campus and Microsoft back up their Live@Edu servers. You are however expected to back up your own Live@Edu essential data on a daily basis. If you save your important data files to your Live@Edu or College private storage (in the case of specialist files), you can have peace of mind that if your laptop crashes, your data is safe. You should never save data to your laptop or home PC or any College laptop. Netbook or PC, as we are responsible only for the backed up areas we offer you cannot help you if data saved elsewhere is lost. Be safe, sorry. College You have a College account with Live@Edu as soon as you enrol. You can forward your private to this account and can use it for as long as you are with us. The College will use this account to update you with essential information. Anti-virus software Software that detects and deals with viruses is on every College computer and server and this software is continuously updated. Secure Software Images College Learner PCs are supplied with a software set that is secured and that you cannot alter. That makes sure you keep to many of the rules about installing software onto our systems but read the Do s and Don ts to make sure you re within the rules where your data storage area and your USB stick is concerned. Courses that use network tools etc. The use of network tools and changes to networks is not allowed on the College network, which we need to keep stable for everyone. If your course needs you to use network tools, monitoring devices or work that supplies wiring systems and control systems. These networks will be provided separately so that you might safely stretch and challenge yourself without upsetting anyone else. Secure Wireless Network own equipment You can borrow a College Laptop or Netbook, or you can bring in your own mobile device to use on our wireless network. This network is very secure, gives you all the internet and learning system access you need, but doesn t allow data to pass onto our other internal networks. This protects our systems from any viruses that might be lurking in your personal equipment, that you may not even know about. For this reason you are not allowed to use your own equipment on the wired network no-one is allowed to do that. Only permitted, vetted equipment with the College s protection systems on board are allowed that far in. Updated November Authorised by ILT Board 4

5 Software Monitoring Monitoring software checks all PCs and reports on any software that shouldn t be there or has changed. So if anything slips through a virus hole that no-one has fixed yet, we still get to know about it in time to act. This also applies to downloaded films, music etc. Downloading Be careful at home, as well as at College. Everything that is out there isn t free, and some that is free for home use certainly isn t free for use in College because we re classed as a business and the rules are different. You, or your legal guardian can be prosecuted for software theft which is what an illegal download is called in law. Plagiarism Monitoring Plagiarism means copying the work of others and presenting it as your own. So if you copy a chunk of information from the Internet and cut and paste it into your assignment, that is plagiarism and so is re-typing text from a book. We have a tool that helps tutors to find parts of your work that are copied. The tool recognises and matches text against what s out there on the Internet so if you do this, expect your tutor to have a chat with you about how you should use material for research, how you should let it help your thinking to develop, how you should express that in your words and when you should quote and reference the work of others as backup. Induction and Training At the start of your course you will be shown how to access the College systems and how to use them safely. You will have opportunity to ask questions about this policy. People to help you If anything happens that you are unhappy about a mobile phone text and anything at all there are lots of people that you can turn to for advice. Your Tutor will always help; staff in your Learning Resource Centre will point you in the right direction; our IT Service Desk on will advise you. Our Security staff will advise you. The College also has specially trained staff to deal with issues that may arise and you can be sure of expert attention and of always being taken seriously. So don t worry on your own. 4. What you must do to protect yourself Protect your personal details Everyone out there is a stranger until you know them and have checked them out. Don t give your name, age, address, phone number, credit card details or bank account details or a photo of yourself (or anyone else) to any stranger on the Internet. Protect your money Remember that some s can sound pretty convincing and can promise you fast money, fast returns. Others will send you threats that your bank account has been accessed. Some will offer you goods in exchange for details. If you receive Scam s like this, delete them and don t reply. If you re in doubt ask someone else to take a look but don t give those details. Check how up to date you are by taking the online test at this link: Updated November Authorised by ILT Board 5

6 If you buy anything online, make sure that the company advertises contact details and a phone number and that it has good reviews. Any payment by credit cared should take you to a secure site for entry of details. If you don t know what one of these looks like, then ask someone to check for you before you enter anything. Protect your reputation - social networking sites The College accepts that you will use and enjoy social networking sites such as Facebook and will use these for social purposes in your own time. Although we are not responsible for these sites and cannot control them, we offer you the following advice. Be careful who you allow into your Facebook or similar sites. Make sure your privacy details are set. Think before you post up text and photos. You might remove them the next day but one of your friends might have already downloaded them and sent them on And what you would share with a friend could send a very different signal to people who don t know you. It s your reputation look after it. Be careful what you say about others social networking Don t use your Facebook etc to say things that you can t back up about people, places or organisations. Remember you re publishing those statements you make. You don t want them to come back and bite you and this is an area that could result in legal action in the future. Check the published policies of the site and enjoy the sites in your own time for social networking (not anti-social activities). Check out College Social Network Sites Your tutor may invite you to join a social network site to communicate with other students on your course. The College cannot be responsible for Social Network Sites outside its own network and does provide a secure VLE (Moodle) for you to use for your main course activity. We accept that social networking sites offer some added value and offer you the following advice if you use them. Make sure that you stick to the rules for acceptable behaviour and that you understand who will see what you publish on this site. You should not use these sites to vent negative feeling against other learners, staff or the College. Remember that what you say can be seen by others and you will be held accountable for it. Use the proper procedures if you want to complain about something. Protect your login When you enrol, you will be given a login ID (your student enrolment number) and a formula for your first password. You will make this password personal when you first login and you will be asked to change the password every term. It is really important that you protect your login. Remember that actions taken in your name are logged as your actions. So here are a few do s and don ts: Do: Use your login every time you use a College workstation never use anyone else s. For example if the person before you hasn t logged off, don t just start to work (because that s in their name). Take time to logoff and login as you. Always logout when you ve finished work. You don t want to be responsible for what the next person might do (in your name!) Change your password if you suspect that someone has learned it by watching you type it in. You can change your password in advance of the termly change. Just ask how at your Learning Resource Centre, or ring the Learner Service Desk on (Option 1) Updated November Authorised by ILT Board 6

7 Don t Ever give your login and password to anyone else inside or outside College. Ever write your login and password down. Just remember it it s much safer. use it sensibly Keep your messages to the point, get into the habit of using a greeting (It ll be a good habit in later life), use a subject heading and don t ramble. Don t use to sound off about people or shout at people take time to cool down. Once it s sent, there s a record out there and you said it. Always put your name to your s. Never send an that tries to hide behind an anonymous name and if you do, ask yourself whether you are breaking the rules of this policy and perhaps a few more rules, like the law and remember if the content isn t nice, it will be reported and you will be found out. Don t forward chain s to thousands of people (they just fill up their storage) and keep an eye out for those scams that will ask you for personal details. Don t fall for those. Flag up any websites that you hit on by mistake Sometimes you may open a site that isn t on our blocked list, but that has fairly unacceptable content. This is likely to be because of a word you put in your search engine and the result won t always be what you expected. We know that mistakes are made. If this does happen to you, close down the site and just mention to your tutor or your Learning Resource Centre staff that you made a mistake and what came up wasn t what you expected. At least then, if this is picked up against your name, we ll have a report to say what actually happened. We ll also have the chance to check whether this site should be in our blocked lists. Check with your tutor if course work needs you to access sites that could be seen as unacceptable Some course work will require research into areas that fall within the unacceptable category E.g. a Social Work course might ask you to research the use of drugs. In such cases, your tutor will advance inform the IT Services Manager, so that your access to these areas are logged with us. If you are at all uncomfortable about the areas that you need to access and how these might be at odds with this policy, please seek assurance from your tutor. 5. The Rules What you mustn t do We ve split these into Content (things you look at, download, publish, communicate) and Activities (things you do). Unacceptable Content You must not seek, view, download, publish, transmit or communicate content that is threatening, Updated November Authorised by ILT Board 7

8 offensive; abusive; libellous; (says bad things about another person which will harm their reputation) harassing; pornographic; sexist; racist unlicensed for use on business premises (not provided by the College for your use) and/or which relates to: terrorism; cults; dating; controlled drugs; gambling; criminal skills (including software hacking); social chat, jokes or chain mail that is not related to your course social groups; personal business (such as any private work that you do) the encouragement of violence, or unlawful conduct. Unacceptable Activities You must not: attempt to hack the College or other systems simulate other users (pretend to be them, or use their login) use anonymous access (where you cannot be identified) write or introduce viruses/ programs designed to cause harm introduce unauthorised equipment (modems, active equipment, monitors) which will alter the way in which traffic flows, will cause damage to performance and will put data at risk waste resources or introduce insecurities tamper with workstation addresses, settings or software Updated November Authorised by ILT Board 8

9 use College IT facilities purely for private, social or personal business use within timetabled study time use College IT Facilities to advertise material that may provoke or offend others such as political extremism or religious materials; use the College s systems to attack other systems, sites, organisations or individuals, use the College s systems to transmit personal data (details about other people that you do not have permission to pass on) use the College s systems to access and re-publish material that is copyright (owned by others) as if it is your own work create and transmit bulk that could be construed as Spam (unwanted, junk ) send s or phone messages which are abusive, harassing or include unacceptable content, swearing and threatening language download software without College permission or introduce software for which you hold a personal home license without first checking with the College whether the software may be legally used on business premises download or use games or access games over the network, other than software installed and approved for learning purposes; download copyright information for storage, re-transmission or re-use (this includes but is not limited to copyright images, text, data, music and video); advertise the or location of yourself or any other person, without permission of that person subscribe any other person to any online facilities without that person s consent publish example or fictitious material about courses or the College that may be confused with the real published College materials. 6. Personal Use Personal Use of IT Facilities The College is prepared to accept limited personal use of the IT Facilities, outside timetabled class time. This might include research, personal finance, family appointments/communication, social networking etc. Personal Mobile Telephones Personal calls should be made and received only in personal time.personal mobile telephone calls must not be taken or made during timetabled class time In exceptional circumstances, such as home emergencies, you should talk to your tutor who will then understand why you need to keep your mobile on during class. The College is not responsible for the mobile networks on which mobile phones operate and cannot intercept or block calls. We offer you advice as follows. Do not use your mobile phone to abuse others or to send anonymous texts or voice mail. If you receive messages or voice mail that upsets you, ask your tutor or any member of staff for support as there are trained staff within College who will offer you support and are responsible for your safe-guarding. Technically, however, the College is not responsible for activity that occurs on mobile networks but will report incidents on to the telecommunications providers. Updated November Authorised by ILT Board 9

10 Use of Skype (internet calls) is not open to learners within College as calls to non-skype users would be charged to the College as call costs. However, Skype is used to communicate with prospective international students and there may be situations where you are on placement or working at a distance when you will be asked to use a Skype service to maintain contact with the College. In this case, you will be given details and an authorisation form to sign. 7. Review of this policy This policy will be reviewed annually by the IT Services Manager and approved by the College Executive Directors. 8. Related documents Student Learning Agreement Virtual Environment Policy Anti-Bullying & Harassment Policy Child Protection Policy Updated November Authorised by ILT Board 10

Digital Safety and Digital Citizenship

Digital Safety and Digital Citizenship Digital Safety and Digital Citizenship A Guide for Students The laptop has been given to you as a tool for learning. Use it for that. While doing so, here are some important rules for keeping yourself

More information

Communication and Usage of Internet and Policy

Communication and Usage of Internet and  Policy Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority

More information

STUDENT ICT ACCEPTABLE USE POLICY

STUDENT ICT ACCEPTABLE USE POLICY The Olive School, Blackburn This policy is in line with the Mission Statement of the School To promote a culture of educational excellence, from within a caring and secure Islamic environment enriched

More information

PUPIL ICT ACCEPTABLE USE POLICY

PUPIL ICT ACCEPTABLE USE POLICY PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status

More information

E RADAR. All Rights Reserved. Acceptable Use Policy

E RADAR. All Rights Reserved.  Acceptable Use Policy Email Acceptable Use Policy For further help, please contact support@eradar.eu Item Number LD 0002 Author E RADAR LIMITED Disclaimer This template is provided with the understanding that the publisher

More information

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY Introduction The college offer an extensive range of IT systems across campuses and online for course related activities and drop-in purposes. This policy applies

More information

Anti-Cyber Bullying Policy.

Anti-Cyber Bullying Policy. Anti-Cyber Bullying Policy. Bullying, in any form, is an issue that we all take very seriously at Bredon School. We accept that victims can become depressed and suicidal, and even take their own lives.

More information

DCSZ Student AUP Policy

DCSZ Student AUP Policy Dulwich College Suzhou DCSZ Student AUP Policy This Policy is underpinned by our School Guiding Statement (No.2) The College provides a safe, secure and stimulating environment Policy Code G1.1.2 Effective

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through

More information

Computer Use and File Sharing Policy

Computer Use and File Sharing Policy Computer Use and File Sharing Policy Williamson College recognizes the value of computer and other electronic resources to improve student learning and enhance the administration and operation of its school.

More information

s, Texts and Social Media: What Physicians Need to Know

s, Texts and Social Media: What Physicians Need to Know Emails, Texts and Social Media: What Physicians Need to Know 1 Today s Learning Objectives By the end of today s program, you will be able to : Identify the risks to patients privacy which email, text

More information

This Policy applies to all staff and other authorised users in St Therese School.

This Policy applies to all staff and other authorised users in St Therese School. St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way

More information

Acceptable Usage Policy (Student)

Acceptable Usage Policy (Student) Acceptable Usage Policy (Student) Author Arthur Bogacki Date 18/10/2017 Version 1.1 (content sourced and consolidated from existing Email and Electronic Communication, and User Code of Practice policies.)

More information

The John Fisher School ICT Policy

The John Fisher School ICT Policy The John Fisher School ICT Policy Responsible: Governors Resources Committee Review Date: May 2018 The need for a policy All The John Fisher School s information communication technology (ICT) facilities

More information

REPORTING INFORMATION SECURITY INCIDENTS

REPORTING INFORMATION SECURITY INCIDENTS INFORMATION SECURITY POLICY REPORTING INFORMATION SECURITY INCIDENTS ISO 27002 13.1.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-13.1.1 Version No: 1.0 Date: 1 st

More information

So, you re child wants to sign up for Myspace...

So, you re child wants to sign up for Myspace... So, you re child wants to sign up for Myspace... Social networking is a brilliant concept that has sadly been tainted by several nefarious individuals. The term simply means a website that allows its users

More information

Netiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi

Netiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi Netiquette IT Engineering II IT Engineering II Instructor: Ali B. Hashemi 1 1 Netiquette "Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette covers both common courtesy

More information

ONLINE SAFETY. Messaging, , Vlogging and Sexting

ONLINE SAFETY. Messaging,  , Vlogging and Sexting ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.

More information

COMPUTER ACCEPTABLE USE POLICY - STUDENTS (summary)

COMPUTER ACCEPTABLE USE POLICY - STUDENTS (summary) COMPUTER ACCEPTABLE USE POLICY - STUDENTS (summary) This agreement includes all computers, laptops, smartphones and other electronic equipment in College as well as College s Firefly VLE and College-sponsored

More information

Cyber Smarts Using Social Media Wisely

Cyber Smarts Using Social Media Wisely Cyber Smarts Using Social Media Wisely Posted on March 24, 2016 by Shridevi Stock Photo You have access to the world s largest museum, art gallery, library and social group ever created. You also have

More information

It pays to stop and think

It pays to stop and think It pays to stop and think Protect yourself from financial fraud Together we thrive 2 In the first six months of 2018, over 34,000 people were scammed out of 145.4m At HSBC, we work hard to keep our customers

More information

Safford Middle School Acceptable Use Policy

Safford Middle School Acceptable Use Policy Safford Middle School Acceptable Use Policy 2010-2011 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources

More information

Computer and Internet Use Policy

Computer and Internet Use Policy Computer and Internet Use Policy Author Simon Allan Date Written Autumn 2015 Review Date Autumn 2018 Date Ratified by the Governing Body Autumn 2015 Computer and Internet Use Policy Outline/Overview This

More information

ICT Acceptable Use Policy for Students

ICT Acceptable Use Policy for Students ICT Acceptable Use Policy for Students a 52 Eurobin Avenue, Manly NSW 2095 t +61 2 9977 5144 f +61 2 9976 2753 cricos 03290E e administration@stellamaris.nsw.edu.au w www.stellamaris.nsw.edu.au abn 88

More information

Reading School: ICT User Agreement Return Form (AUP)

Reading School: ICT User Agreement Return Form (AUP) Reading School: ICT User Agreement Return Form (AUP) For clarity, please use block capitals Student First Name Student Last Name Year started at Reading School?.. Tutor + Group Current Year Group House

More information

Facebook Basics (for individuals)

Facebook Basics (for individuals) P a g e 1 Facebook Basics (for individuals) ABOUT THIS CLASS This class is designed to give a basic introduction into Facebook Basics. Throughout the class, we will progress from learning how to create

More information

Financial scams. What to look for and how to avoid them.

Financial scams. What to look for and how to avoid them. Financial scams What to look for and how to avoid them. Keep your money secure We take the security and wellbeing of our customers very seriously. So we ve created this guide to highlight the most common

More information

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010 INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig

More information

Online Scams. Ready to get started? Click on the green button to continue.

Online Scams. Ready to get started? Click on the green button to continue. Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs,

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

Each member of the St. Margaret s Community has the privilege to access Google Apps  provided by the school s network NETWORK APPROPRIATE USE AGREEMENT 2018-2019 We are pleased to offer students of St. Margaret s School access to our computer network for electronic mail and the Internet. To gain access to e-mail and the

More information

The Table Privacy Policy Last revised on August 22, 2012

The Table Privacy Policy Last revised on August 22, 2012 The Table Privacy Policy Last revised on August 22, 2012 The Table, an online venue through which your organization and its members/employees can connect to better fulfill its mission respects and is committed

More information

Circle Link 1 "Know Before You Go" Web Literacy Tips:

Circle Link 1   Know Before You Go Web Literacy Tips: 5 th Grade Scavenger Hunt Content Circle Link 1 http://pbskids.org/privacy/literacytips.html "Know Before You Go" Web Literacy Tips: You know not to talk to strangers on the street but what about on the

More information

Lambton Primary School

Lambton Primary School Lambton Primary School Advice to pupils on Cyber Bullying For pupils If you re being bullied by phone or the internet Remember, bullying is never your fault. It can be stopped, and it can usually be traced.

More information

Peaceful Pill Forum Rules

Peaceful Pill Forum Rules Peaceful Pill Forum Rules The Exit Peaceful Pill Forums are a private Forum for the purpose of discussing the content of and asking questions in regard to The Peaceful Pill ehandbook. While we encourage

More information

St Edmund Arrowsmith Catholic Centre for Learning

St Edmund Arrowsmith Catholic Centre for Learning St Edmund Arrowsmith Catholic Centre for Learning Mobile Device Policy (Students) September 2016 This Policy was adopted and ratified by the Full Governing Body of SEA. C.F.L. at the meeting held on Signed...

More information

Bring in several pieces of junk mail that have been opened and spread the mail around the classroom.

Bring in several pieces of junk mail that have been opened and spread the mail around the classroom. LESSON PLAN You ve Won a Prize! GRADES 3-5 UNIT 2 Essential Question What is spam, and what can you do about it? Lesson Overview Students learn what spam is, the forms it takes, and then identify strategies

More information

Student E-Safety Induction

Student E-Safety Induction Central College Nottingham Student E-Safety Induction Academic Year 2015-16 Training & Learning Technologies September 2015 E-Safety It is important to the College that all students know how to stay safe

More information

UCL Policy on Electronic Mail ( )

UCL Policy on Electronic Mail ( ) LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD

More information

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

Netiquette. IT Engineering II Instructor: Ali B. Hashemi

Netiquette. IT Engineering II Instructor: Ali B. Hashemi Netiquette IT Engineering II Instructor: Ali B. Hashemi 1 1 Ethics in Networking!? 2 2 Netiquette Etiquette: the formal rules for polite behaviour in society or in a particular group. Netiquette is network

More information

Brochure for Information Security

Brochure for Information Security 福山大学 Application of Tools for Information Security for a fulfilling Life at University Brochure for Information Security Raising the Quality of Learning Fukuyama University Information Service Promoting

More information

ICT Acceptable Use Policy

ICT Acceptable Use Policy ICT Acceptable Use Policy Version 3.2 Important: This document can only be considered valid when viewed on the VLE. If this document has been printed or saved to another location, you must check that the

More information

Policy Use of Information and Communications Technology (ICT) Resources

Policy Use of Information and Communications Technology (ICT) Resources Policy Use of Information and Communications Technology (ICT) Resources Background This policy is necessary in order to: Provide all Hereworth members (Board, staff, boys and volunteers) with clear parameters

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

The purpose of this guidance is: To provide a comprehensive understanding to complying with the universities Acceptable Use Policy.

The purpose of this guidance is: To provide a comprehensive understanding to complying with the universities Acceptable Use Policy. Policy Acceptable Use Guidance 1 Introduction This guidance compliments the University of East London s Acceptable Use Policy. It puts into perspective specific situations that will help you provide a

More information

BRING YOUR OWN DEVICE (BYOD) POLICY

BRING YOUR OWN DEVICE (BYOD) POLICY BRING YOUR OWN DEVICE (BYOD) POLICY U:Public\Policies & Procedures\Approved Policies\BYOD Policy.doc Authorised by: Principal Approved by School Council: 16/8/17 Date Created: 08/09/15 Last Updated: 4/8/17

More information

Newcomer Finances Toolkit. Fraud. Worksheets

Newcomer Finances Toolkit. Fraud. Worksheets Newcomer Finances Toolkit Fraud Worksheets Ottawa Community Loan Fund Fonds d emprunt Communautaire d Ottawa 22 O Meara St., Causeway Work Centre, Ottawa, ON K1Y 4N6 Tel: 613-594-3535 Fax: 613-594-8118

More information

LEGAL ADVICE ON THE USE OF MOBILE PHONES, PROTABLE COMPUTER GAMES, TAPE RECORDERS AND CAMERAS IN SCHOOL

LEGAL ADVICE ON THE USE OF MOBILE PHONES, PROTABLE COMPUTER GAMES, TAPE RECORDERS AND CAMERAS IN SCHOOL LEGAL ADVICE ON THE USE OF MOBILE PHONES, PROTABLE COMPUTER GAMES, TAPE RECORDERS AND CAMERAS IN SCHOOL DIOCESE OF WAGGA WAGGA Policy Number 02/10 Policy Name Legal advice on the use of Mobile Phones,

More information

MODEL COMPLAINTS SYSTEM AND POLICY THE OMBUDSMAN'S GUIDE TO DEVELOPING A COMPLAINT HANDLING SYSTEM

MODEL COMPLAINTS SYSTEM AND POLICY THE OMBUDSMAN'S GUIDE TO DEVELOPING A COMPLAINT HANDLING SYSTEM MODEL COMPLAINTS SYSTEM AND POLICY THE OMBUDSMAN'S GUIDE TO DEVELOPING A COMPLAINT HANDLING SYSTEM Published by the Office of the Ombudsman 18 Lower Leeson Street Dublin 2 Telephone: 01 639 5600 Lo-call:

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

Grand Avenue Primary and Nursery School ICT Data management. Contents

Grand Avenue Primary and Nursery School ICT Data management. Contents Grand Avenue Primary and Nursery School ICT Data management Contents 1. Acceptable Use Statement 2. Transfer and Offsite Use of Sensitive Data 3. E-safety 4. Declaration Introduction These three policy

More information

NETIQUETTE GUIDE FOR ONLINE LEARNING GADSDEN STATE COMMUNITY COLLEGE TEACHING & LEARNING CENTER

NETIQUETTE GUIDE FOR ONLINE LEARNING GADSDEN STATE COMMUNITY COLLEGE TEACHING & LEARNING CENTER NETIQUETTE GUIDE FOR ONLINE LEARNING GADSDEN STATE COMMUNITY COLLEGE TEACHING & LEARNING CENTER WHAT IS NETTIQUETTE? According to the BBC s WebWise Team (2012), the word netiquette is a combination of

More information

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy?

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy? Unit 9 Tech savvy? Lesson A Tech support 1 I have no idea why... A Unscramble the questions. 1. which battery / Do you know / should / buy / I? Do you know which battery I should buy? 2. they / where /

More information

Joseph Swan Academy ICT, Internet and Acceptable Use Policy (Incorporating electronic and online safety and mobile device use)

Joseph Swan Academy ICT, Internet and Acceptable Use Policy (Incorporating electronic and online safety and mobile device use) Joseph Swan Academy ICT, Internet and Acceptable Use Policy (Incorporating electronic and online safety and mobile device use) 2017 2018 To be reviewed September 2018 1 Contents Page Introduction 3 ICT

More information

Organising . page 1 of 8. bbc.co.uk/webwise/accredited-courses/level-one/using- /lessons/your- s/organising-

Organising  . page 1 of 8. bbc.co.uk/webwise/accredited-courses/level-one/using- /lessons/your- s/organising- Organising email Reading emails When someone sends you an email it gets delivered to your inbox, which is where all your emails are stored. Naturally the first thing you ll want to do is read it. In your

More information

If you re on campus and logged in to the university network, then you ll be automatically logged in to MyUCLan too when you open Internet Explorer.

If you re on campus and logged in to the university network, then you ll be automatically logged in to MyUCLan too when you open Internet Explorer. HOW TO USE MYUCLAN CONTENTS Login help... 1 I don t have a username and password... 2 I've forgotten/need to change my password... 2 I m getting an error message..... 2 My login problem isn't listed...

More information

Guide to your Northumbria Student

Guide to your Northumbria Student Guide to your Northumbria Student Email The Student Email System at Northumbria provides 25GB of space for all students. How to access On Campus: Access email from the Start menu on the Student Desktop

More information

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon Data Protection and Information Security Webinar Presented by Emma Hawksworth Slater and Gordon 1 3 ways to participate Ask questions link below this presentation Answer the polls link below this presentation

More information

A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST

A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST WHAT IS BULLYING? Bullying is repeated aggression, verbal, psychological or physical conduct by an individual or a group against others. Bullying is always

More information

Internet, , and Computer Usage Policy

Internet,  , and Computer Usage Policy Important disclaimer: The policy available on this page is only an example and is furnished merely as an illustration of its category. It is not meant to be taken and used without consultation with a licensed

More information

1:1 NETBOOK COMPUTER PROGRAM. Netbook Agreement 2012

1:1 NETBOOK COMPUTER PROGRAM. Netbook Agreement 2012 1:1 NETBOOK COMPUTER PROGRAM Netbook Agreement 2012 BELLBRIDGE 1:1 NETBOOK LEASE INCLUSIONS Bellbridge is able to offer the package below to students for 24/7 access, requiring payment of: $60 per term

More information

Getting started with social media and comping

Getting started with social media and comping Getting started with social media and comping Promotors are taking a leap further into the digital age, and we are finding that more and more competitions are migrating to Facebook and Twitter. If you

More information

Staff AUP (Acceptable Use Policy)

Staff AUP (Acceptable Use Policy) Guidance review Date April 2014 Date of next Review April 2016 Who reviewed this Guidance? Deputy Headteacher Guidance: Staff AUP (Acceptable Use Policy) Rights Responsibilities How does the school protect

More information

Guidance for images (photographic and video) intended for publicity purposes

Guidance for images (photographic and video) intended for publicity purposes Guidance for images (photographic and video) intended for publicity purposes This guidance relates to the permissions required for use of personal data in the form of photographic and video images, to

More information

Staying Safe on the Internet. Mark Schulman

Staying Safe on the Internet. Mark Schulman Staying Safe on the Internet Mark Schulman 1 Your Presenter Mark Schulman IT professional for almost 40 years No affiliation with any product 2 What We ll Talk About Passwords Email Safety Staying Safe

More information

Top 5 Tips To Take A Stand Against Telephone Scams

Top 5 Tips To Take A Stand Against Telephone Scams Scammers often use the telephone as a method to gain personal details and con people out of their life savings. Avoid being one of them, protect yourself. Top 5 Tips To Take A Stand Against Telephone Scams

More information

Policy General Policy GP20

Policy General Policy GP20 Email Policy General Policy GP20 Applies to All employees Committee for Approval Quality and Governance Committee Date of Approval September 2012 Review Date June 2014 Name of Lead Manager Head of Technology

More information

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY Wyandotte Municipal Services may modify this Acceptable Use Policy at any time without notifying its users. For this reason, Wyandotte Services High Speed

More information

PCA Staff guide: Information Security Code of Practice (ISCoP)

PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Information Risk and Privacy Version 2015.1.0 December 2014 PCA Information Risk and Privacy Page 1 Introduction Prudential Corporation

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

Cyber Security Guide. For Politicians and Political Parties

Cyber Security Guide. For Politicians and Political Parties Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process

More information

PS 176 Removable Media Policy

PS 176 Removable Media Policy PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

USE POLICY. iprimus.com.au

USE POLICY. iprimus.com.au ACCEPTABLE USE POLICY iprimus.com.au iprimus ACCEPTABLE USE POLICY 1. ABOUT THIS POLICY This document is the iprimus Acceptable Use Policy (Policy). In this Policy you and your mean the Customer; and iprimus,

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law. Thank you for your interest in e-safety, and for teaching safe and responsible Internet use to your students. Educators are invited to access and download i-safe curriculum AT NO CHARGE under the following

More information

USING EVENTBRITE. A Guide for CLAPA Staff & Volunteers

USING EVENTBRITE. A Guide for CLAPA Staff & Volunteers USING EVENTBRITE A Guide for CLAPA Staff & Volunteers Please Note: This guide is long and quite detailed to ensure it covers any questions you might have. It is split up into sections so you can refer

More information

PTLGateway Acceptable Use Policy

PTLGateway Acceptable Use Policy 1 PTLGateway Acceptable Use Policy Last Updated Date: 02 March 2018 Acceptable Use Policy Your use of our Services must fall within our Acceptable Usage Policy. Contents Key details... 1 COVERAGE OF THIS

More information

FERPA & Student Data Communication Systems

FERPA & Student Data Communication Systems FERPA & Student Data Ellevation is subject to the Family Educational Rights and Privacy Act (FERPA) as operating under the "school official" exception, wherein student directory and PII (Personal Identifying

More information

ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014

ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014 ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014 Agenda 1. Cyberwellness Talk 2. How to Login to LMS Cyberwellness Talk 1. Internet & Gaming Addiction 2. Netiquette

More information

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment; USAGE POLICIES Any terms in capitals not defined in these Usage Policies will have the same meaning as in your Contract. These Usage Policies apply to you and anybody you allow to use NOW Broadband and

More information

Social Media. Best practice template and general guidance leaflet

Social Media. Best practice template and general guidance leaflet Social Media Best practice template and general guidance leaflet This leaflet is produced by members of and on behalf of the Marketing, PR and Communications Committee Rotary District 1220, United Kingdom.

More information

1:1 NETBOOK COMPUTER PROGRAM. Netbook Agreement 2014

1:1 NETBOOK COMPUTER PROGRAM. Netbook Agreement 2014 1:1 NETBOOK COMPUTER PROGRAM Netbook Agreement 2014 BELLBRIDGE 1:1 NETBOOK LEASE INCLUSIONS Bellbridge 1:1 Netbook package Bellbridge is able to offer the package below to students for 24/7 access, requiring

More information

Sky Social Media Guidelines for Contributors

Sky Social Media Guidelines for Contributors Sky Social Media Guidelines for Contributors Social chatter around TV shows is inevitable and, for the most part, positive. However, contributors are advised that people have a tendency to publish things

More information

BYOD Programme Handbook

BYOD Programme Handbook BYOD Programme Handbook October 2018 Student & Parent Guide IT Helpdesk The IT Helpdesk is the initial point of contact for the IT Department. The IT Helpdesk is located in Mercy 2 and is open Monday

More information

Electronic Device Policy (EDP)

Electronic Device Policy (EDP) Powerstown Educate Together National School Roll No: 20384J Powerstown Road, Tyrrelstown, Dublin 15 Telephone: 01 8272018 Email: info@powerstownet.com www.powerstownet.com Powerstown Educate Together National

More information

The essential guide to creating a School Bring Your Own Device Policy. (BYOD)

The essential guide to creating a School Bring Your Own Device Policy. (BYOD) The essential guide to creating a School Bring Your Own Device Policy. (BYOD) Contents Introduction.... 3 Considerations when creating a BYOD policy.... 3 General Guidelines for use (Acceptable Use Policy)....

More information

Mobile Computing Policy

Mobile Computing Policy Mobile Computing Policy Overview and Scope 1. The purpose of this policy is to ensure that effective measures are in place to protect against the risks of using mobile computing and communication facilities..

More information

STAUNING Credit Application Internet Sales Process with /Voic Templates to Non-Responsive Prospects 2018 Edition

STAUNING Credit Application Internet Sales Process with  /Voic Templates to Non-Responsive Prospects 2018 Edition STAUNING Credit Application Internet Sales Process with Email/Voicemail Templates to Non-Responsive Prospects 2018 Edition Contents 30-DAY CREDIT APPLICATION INTERNET SALES PROCESS... 2 DAY 1 AUTO-RESPONSE

More information

TELEPHONE AND MOBILE USE POLICY

TELEPHONE AND MOBILE USE POLICY TELEPHONE AND MOBILE USE POLICY Date first approved: 9 December 2016 Date of effect: 9 December Date last amended: (refer Version Control Table) Date of Next Review: December 2021 First Approved by: University

More information

Kings Heath Academy Acceptable Use (Staff and Students) Policy and Procedures September 2018

Kings Heath Academy Acceptable Use (Staff and Students) Policy and Procedures September 2018 Kings Heath Academy Acceptable Use (Staff and Students) Policy and Procedures September 2018 Staff responsible: Kim Duff Principal This policy will be reviewed in September 2019 Dfe number: 9282153 Kings

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Acceptable Use Policy

Acceptable Use Policy 1 INTRODUCTION and its subsidiaries ( us, we or our ) have produced this acceptable use policy in order to: Give you a better understanding of what is and is not acceptable when using the internet Encourage

More information

Bridgeport High School 1-to-1 Laptop Program Handbook Fall 2017

Bridgeport High School 1-to-1 Laptop Program Handbook Fall 2017 Bridgeport High School 1-to-1 Laptop Program Handbook Fall 2017 Revised 04/25/2017 Table of Contents 1. COMPUTER SPECIFICATIONS 3 2. ISSUING OF LAPTOPS 3 3. TAKING CARE OF YOUR LAPTOP 3 3.1 General Precautions

More information

PATRIOT CAMPERS PTY LTD PRIVACY POLICY

PATRIOT CAMPERS PTY LTD PRIVACY POLICY PATRIOT CAMPERS PTY LTD PRIVACY POLICY Patriot Campers Pty Ltd and its subsidiaries ( Patriot Campers & Patriot Campers TV & Patriot Supply Co ) recognise that your personal information is important to

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

Masada College Student Bring Your Own Device (BYOD) Policy Guidelines Years 7-12

Masada College Student Bring Your Own Device (BYOD) Policy Guidelines Years 7-12 Masada College Student Bring Your Own Device (BYOD) Policy Guidelines Years 7-12 1. Introduction Masada College supports the bringing of a computing device to school by all students in Years 7-12 for use

More information