E-Safety and Computer Security Rules
|
|
|
- August Peters
- 10 years ago
- Views:
Transcription
1 E-Safety and Computer Security Rules Process / Signatures Portfolio Team Portfolio Team Lead Principal Chair of Governors Behaviour Safety & Ethos Mrs K Mitford Dr J V Edwards Mrs K Mitford Presented 2 June 2014 Date Agreed 02 June 2014 Date Ratified 11 June 2014 Date Ratified 11 June 2014 Date Policy date / updated: May 2014 Review date: May
2 E-safety and computer security rules summary This booklet is designed as a summary of the Academy e-safety policies and data protection policy for all staff and the wider academy community. 2
3 Contents Page 3 What is e-safety? Page 3 E-safety in teaching what to watch out for Page 4 E-safety what expertise do I need? Page 5 E-safety in personal life Page 6 Protecting logon details Page 6 Protecting information Page 7 Protecting computer equipment Page 7 - Avoiding computer virus Page 8 Using Page 9 Appendix one (Acceptable use policy for staff) Other Academy policies for reference: Data protection policy E-safety policy Acceptable use policy for staff Social media guidelines These documents are available on the academy intranet. 3
4 What is e-safety? Ofsted defines e-safety as: The school s ability to protect and educate pupils and staff in their use of technology and to have the appropriate mechanisms to intervene and support any incident where appropriate. Three particular e-safety risks for inspections are: Being exposed to illegal, inappropriate or harmful material, being subjected to harmful online interaction with other users, and personal online behaviour that increases the likelihood of, or causes, harm. Teachers need to be able to ensure that: All groups of pupils feel safe at school, understand very clearly what constitutes unsafe situations and are highly aware of how to keep themselves and others safe. E-safety is particularly relevant to ICT and PSHE, but it also permeates any subject or activity which makes use of the internet. Why staff members should be concerned about e-safety All teachers have a duty of care to the pupils they teach. Teachers act in loco parentis and are legally responsible for all aspects of pupil safety, including online safety, whilst in school. Any activity involving internet use needs to be carefully planned and assessed for risk to minimise the possibility of an e-safety incident. E-safety in teaching what to watch out for Teachers need to be aware of the latest trends in children s use of the internet particularly in relation to our school and the children you teach. For example, which social networking platforms and blogging/questions/sharing websites are popular in your school? Local trends might not match national trends. In one school Facebook usage might be prevalent, in another Twitter might be predominant. Tumblr might dominate in one setting while ask.fm might be a craze elsewhere. Knowing what your children are using helps ensure your pastoral advice and e-safety planning can be pre-emptive. Knowing what could happen makes it easier to know how to prevent it happening. Teachers knowledge of e-safety should not just be limited to prevention strategies. If a child points out inappropriate, bullying or illegal content, teachers should be aware of the procedures to report and remove the offending content. Firstly, this requires the teacher to be completely familiar with the academy s policy with regard to reporting incidents. Teachers need to be aware who to contact and how to preserve evidence, if required. Teachers, acting in loco parentis, also need to be aware of how a school can request removal of content, especially with social media websites such as Facebook. 4
5 E-safety What expertise do I need? Teachers need to become experts in offering age-appropriate advice and guidance to their classes, and parents, with regard to: Unwanted internet contact: Preventing online grooming and teaching pupils how to report instances and remove any damaging content. Cyber bullying - how to avoid, prevent, and deal with instances of cyber bullying, and how to report and remove offensive material created as a result of cyber bullying. Inappropriate internet content: How to avoid, report and delete content which may be: pornographic, illegal, obscene, violent or likely to incite racial or religious hatred. How to avoid and report content which encourages illegal or dangerous activity by pupils, or is simply age-inappropriate. How to set a good example with regard to downloading software safely, avoiding viruses, adhering to copyright law and knowing whether information is reliable and valid or not. Privacy: How to ensure social networking content stays private and doesn t end up in search results years later. How to ensure passwords are strong, password-protected information, such as banking details or parental online shopping details remain safe. How to prevent and deal with junk mail and spam, and also how to spot internet scams and phishing s and messages. Understanding how websites store and track data which might be used for valid marketing reasons, or abused to create spam or facilitate identity theft. Mobile phones and devices: Understanding how difficult it is to remove tracking data from mobile phones and how important it is to safeguard privacy on mobile devices more so than on laptops or PCs. To be aware of high-cost premium-rate services, and the more general costs involved in operating a mobile device. Understanding how mobile chat services such as Skype or Apple Facetime work, snapchat, what information is stored and logged, and why there is no such thing as anonymous chat. 5
6 E-safety in teachers personal life ensuring your web habits at home don t impact on your reputation at school. Avoid using a school laptop or your school internet access for personal reasons. Why? Because it will reflect your internet usage, whether appropriate or inappropriate, in subtle and often difficult to control ways. For example, browsing habits are stored in cookies, traffic data, logs and profile archives. Due to the security settings applied to school laptops and school network accounts, won t have the facility to delete cookies, or browse without cookies. Trackable data is used on every social media site, every search engine and many websites for advertising and demographic data. So if you browsed for washing machine price comparisons on your school laptop at the weekend, it s highly likely Google will serve adverts for washing machines in your history lesson on Monday. Similarly if you searched for holidays, jobs or beauty treatments, they will appear as adverts too. If inappropriate content was searched for that might appear. Similarly, suggested searches, pop-ups, search engine auto-complete fields and targeted news can also prove embarrassing when it reflects out-of-classroom internet habits. The way to avoid this is simple don t use a work account for personal browsing. The teacher s use of the internet has to set a good example to the pupils 6
7 Introduction Computer Security guidance Please remember: You can only use the academy s systems if you have been authorised to do so and you re no longer authorised when you leave the academy. We may monitor how you use the academy s systems to ensure compliance with all policies. If you break the rules, we ll treat it as a disciplinary matter and in some cases this may be gross misconduct resulting in dismissal. Protecting your logon details. You ll have at least one logon ID and a secret password to access the computer system. The purpose of the logon ID is to identify you as the owner of a computer account and your password proves you re entitled to use it. What must I do? Keep passwords secret Make sure your passwords are at least 6 characters long longer the better. Change your password regularly every month is best. Change your password immediately if you think someone has discovered it. What must I not do? Use a password that is easy to guess, write down a password and leave it where it might be seen. Never let pupils use your account. Protecting information There are some special rules about protecting information that you need to know, including your responsibilities under the Data Protection Act What must I do? Take all responsible precautions to protect academy information from theft, loss, damage or unauthorised use. Password protect documents that are leaving the academy electronically that contain data on students or staff. Never disclose academy information to anyone who isn t authorised to know it. Lock away confidential documents and computer media before leaving your workplace or stored securely at home. Paper copies of classified information must be shredded if it requires secure disposal Take care when printing out confidential documents. Collect printouts immediately. All electronic files containing classified information for pupils must be password protected. This really only applies when storing pupil data on a USB pen as at other times you will have a password for accessing the school system. Ensure that wherever possible your display screen cannot be viewed by persons not authorised to see the information. 7
8 Rooms/offices with wall displays showing classified information must be secure from the general public. Please be mindful of this when meeting pupils or parents. Mobile devices must be password protected if used for school purposes such as retrieving s. What I must not do? Do not leave your computer logged on when you have left the workstation, as data can be directly accessed without password control. Protecting computer equipment We expect you to be careful with academy computer equipment, not only because of the cost of repair or replacement the information it contains is often far more valuable. What I must do? Take all reasonable precautions to protect equipment against theft, loss or damage. Secure mobile equipment when you aren t using it, including laptops and storage media. Preferably lock it out of sight in a drawer or cupboard. Report any loss or theft of academy equipment via the ICT helpdesk and report it to the academy business manager. What I must not do? Leave equipment unattended at anytime unless it is properly secured or locked away. Install software or hardware on your equipment, or make unauthorised changes. Store non-business related material (including personal photos, your own music, video files etc) on academy laptops or the academy network. Avoiding computer virus What must I do? Contact ICT support immediately if you think your computer might have a virus infection. Until ICT support have cleared it, don t let anyone use and don t switch it off unless told to do so. Contact ICT support immediately if the anti-virus software isn t updated or working properly. Use your anti-virus software to scan portable media for viruses before copying any files from them. What must I not do? Connect unauthorised equipment to the academy network as there is a high risk of transferring viruses. Tamper with anti-virus software, or any security measures on your equipment. Load software onto academy equipment unless it has been authorised by ICT support. 8
9 Using Any you receive from outside the academy may contain viruses hidden in file attachments or web links (URLs) What I must do? A school address must be used for all school business. Follow normal business standards of communication remember has the same legal status as other written communications. Delete any junk mail (spam) messages you receive. Create your own contact groups rather than sending unnecessary mails to all staff. What I must not do? Create wide-distribution s (for example, to addressees throughout the academy) unless this form of communication is vital. Print out messages you receive unless you need a hard copy. Send an that the person who receives it may think is a waste of resources. Give out private home/personal e mail addresses to students or parents. Open an you aren t sure about, even if it seems to be from someone you know viruses create spoof s in order to spread. Use academy to subscribe to non-business mailing lists, such as jokes or sports updates. Guidelines for writing s Numbers of s - People feel overwhelmed by the number of s they receive. Keep the use of to a minimum. Staff ing Pupils Staff must only pupils or parents where there is an Academy need to do so. Where there is a need, always: - Keep the professional and do not disclose personal information. - Keep a copy of all s sent. - Where possible, use blind cc so that others cannot see address. Single Topic and Facts Where ever possible restrict to a single topic, and only record facts and evidence-based opinions. This facilitates better record-keeping. Personal and Business Content - Do not mix personal and business content within the same . Use Pars to staff of a particular pupil. Don t just send out a blanket to everyone. Title - Give s a meaningful title in the Subject field. Re-title an before forwarding if appropriate. Response Where ever possible reply to s as soon as possible if the sender requires a response. (See communications blue print) Read Receipts - Only request read receipts where it is absolutely necessary. Do not set request read receipts as a default. 9
10 Sending an does not guarantee it being received. If an important has been sent to which you have received no reply, then it is recommended that you chase the verbally. Large s - Do not send large s (e.g. mails with large attachments) because they fill up their recipients mailbox 10
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
St Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Policies & Procedures. Moat Community College E-Safety Policy
Moat Community College E-Safety Policy Vision Statement Moat Community College embraces the positive impact and educational benefits that can be achieved through appropriate use of the Internet and associated
How To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
Information Security Code of Conduct
Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security
A Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2
Simon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
St Vincent s Catholic Primary School e-safety Policy
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
DIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
Berwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
School Information Security Policy
School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...
[Name of School] E-safety policy
[Name of School] E-safety policy Adopted: Review date: Note: Blue boxes contain advisory notes which should be read and deleted. These indicate where schools need to make decisions or choices. This policy
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Staying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
Angard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
INTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
Acceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
John of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
Students KS2-3 Acceptable Use Policy
Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions
Sibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
EMERSON PARK ACADEMY
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
Networking and Social Media Policy
Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools
Acceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
EDEXCEL FUNCTIONAL SKILLS ICT. Study Module 8. Using ICT to communicate
EDEXCEL FUNCTIONAL SKILLS ICT Study Module 8 Using ICT to communicate Published by Pearson Education, Edinburgh Gate, Harlow CM20 2JE Pearson Education 2010 All rights reserved. This material may be used
ICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
STUDENT WEBMAIL. User Guide. Realise Your Potential
STUDENT WEBMAIL User Guide Realise Your Potential Email acceptable usage policy & safety tips Email is a wonderful tool for sending and receiving information quickly and securely to tutors, teachers or
Information & Communications Technology Usage Policy Olive AP Academy - Thurrock
Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures
FIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
Acceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
Technology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
4. The Importance of Internet Use in the Primary Curriculum
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
HUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
Related Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities
Category Security Document Name e-safety Procedures Accountable Body Brantridge School Governing Body Reference SY.P2.02 Date Ratified Version 2.1 Last Update March 2015 Related Policies & Documents Document
- Do not leave open email/network applications unattended. Log off of a computer when it is in an unsecured area and out of your sight.
STAFF PROCEDURES FOR ACCEPTABLE USE OF EMAIL/NETWORK AND INTERNET The primary purpose of Sycamore Community Schools email/network system is to provide resources to enhance and support educational instruction
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
Information Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
ICT Acceptable Use Policy
ICT Acceptable Use Policy Document Management Document Disclaimer This document is issued only for the purpose for which it is supplied. Document Owner This document is produced and owned by Staffordshire
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
E- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
