Hillingdon Grid for Learning Internet Web Filtering Policy

Size: px
Start display at page:

Download "Hillingdon Grid for Learning Internet Web Filtering Policy"

Transcription

1 Hillingdon Grid for Learning Internet Web Filtering Policy Definitions Policy a policy is a collection of allowed categories of website and groups of keywords that is applied to one or more workstations and dictates which websites can viewed. Category a category describes the nature of a website based upon the contents of that site. A small number of categories describe their effect upon access to particular sites School Blocked, for example. Site a physical site which is utilising the HGfL filtering systems. For example, a school, library or adult education centre. LA level filtering - the default filtering system where Local Authority (LA) level filtering policies are applied to all sites by the LA. Local level filtering allows the construction and application of policies at a local Site level. LA level filtering policies these are policies which have been formulated at LA level and which are applied to sites by default. Local level filtering policies these are policies which have been created at Site level and applied to individual workstations and/or groups of workstations based upon the IP addresses/active Directory Organisational Units (OUs). Keyword a string of characters which, when matched against a URL, will block that website. Note: Keywords obey the conventions of Regular Expression syntax but should be used with great caution as it is easy to inadvertently block innoce nt sites through the imprecise definition of keywords. Keyword Set a named collection of keywords that can be applied to a policy. More than one keyword set may be added to a policy. LA Level restricted categories these are categories which the LA has decided should always be either blocked or unblocked across the LA regardless of local Site filtering polices. Web filter manager where a Site has opted to control Local level filtering a Web filter Manager is the person responsible on that Site for administering the Local level filtering element of the system. User a computer user who wishes to access the internet.

2 General Overview of Hillingdon Grid for Learning Filtering The Hillingdon Grid for Learning Internet Web Filtering Policy has been developed to help educational establishments ensure the safety of their Users while using the internet, whilst at the same time retaining the flexibility required for effective administration, teaching and learning. It is important to continue to supervise, monitor, police and educate Users since as with any software solution the filtering of an Internet connection alone cannot guarantee the absolute safety of Users. No filtering system is 100% effective. Filtering is, however, a necessary first step to ensure the Site has taken all reasonable steps to protect Users while accessing the internet. As a result each Site should use this Policy document in conjunction with the Sites own Acceptable Use Policy to provide safe, but productive access to the internet. The Hillingdon web filtering strategy incorporates the use of a filtering solution which is described below. Hillingdon Grid for Learning s web filtering solution involves all outgoing internet traffic being scanned automatically for content. The websites requested queries are then classified into categories based on their content. These categories are then either allowed through or blocked if they are deemed inappropriate, depending on the policy/policies being applied. Search Engines To facilitate filtering on image search thumbnails browsers are limited to Google and Bing. By default Safe Searching is forced on Google, YouTube and Bing. And as a fail -safe Google HTTPS searching is blocked. Non-HTTP Traffic Non-HTTP traffic is filtered by IP address and non-http traffic to unknown IP addresses is blocked.

3 Filtering Policies 1. Default LA level filtering Policies Unless Sites choose otherwise the appropriate policy will be applied automatically to the Sites IP range. - office staff will have the Administration policy applied to their network. - students/public facing computers will have the Curriculum/Public policy applied to their network. 2. Optional LA level filtering Policies Additional LA level filtering policies can be made available to meet the specific needs of individual Sites. Note: these policies have to be in line with Local Authority s data compliance/data Protection policy in the majority of instances. Most of these policies would be minor variants upon the standard default policies designed to allow or restrict access to one or two additional categories. The Admin policy is the best example of an optional policy: In order to have Optional LA Level filter policies applied to one or more workstations in a Site, the request must be submitted through an ed request from a Web filter manager at the Site. 3. Local level filtering Sites now have the choice to elect to make use of the Local level filtering option which allows local management through an interface provided. If this option/override is exercised then authorised users may create and apply policies at Site level. This allows access to categories of websites or specific website addresses (URLs) that are not considered suitable to be allowed under the LA level filtering policies, they may however have educational/learning/administrative merit in certain circumstances. Note: Sites choosing to take up this option/override should realise that the risks of exposure to inappropriate content by Users of the Site network are higher when Users are permitted to access sites which would not be permitted under the LA level filtering policies. As a result, Sites implementing these options will need to ensure that correspondingly high levels of User supervision are used when and where the internet is being accessed. To take up this option/override authorisation from an appropriate level is required (for example, a Head Teacher or Head of Service) to complete the Web filtering manager nomination form found at the end of this document and faxed back to HGfL. Some website categories will continue to be blocked at a LA level. These are defined as LA Level restricted block categories and these are identified later in this document.

4 The current web filtering categories are detailed below, followed by information about which categories are currently available through the standard filtering policies and which can be made available through the Local level filtering option. Key: Category Always Blocked at LA level Local Policy Category blocked but available to staff for override (on application to HGfL) Y N Category Allowed Category Blocked Admin Administrative staff member based in Site or computer owned by Site for administrative purpose. (Mainly on IP range xx.xx) Curric Students, teaching staff based in schools or computer s owned by school for teaching/learning purpose. (Mainly on IP range xx.xx) Staff Administrative staff based in non-school Site. (Mainly on IP range xx.xx) Public Member of public visiting school or non-school Site surfing net on personal device or installed for similar purpose not accessing local servers. (Mainly on IP range xx.xx) Category Name ADULT Cat. # Category Short Description access-denied 67 Site pages that Deny Access or are unauthorized to access. Usually authentication pages, not whole sites. adult 4 Adult Products, Services, Situations of humor adult.art 100 Adult art adult.bodyart 101 Body art, tattoos, body piercings adult.games 102 Adult games adult.language 70 Strong language alcohol 42 Production, promotion and sale of alcoholic beverages drugs 8 Sites promoting illicit and illegal drug use gambling 12 Gambling, casinos, betting, lottery and playfor-cash/sweepstakes offensive 126 Websites considered to be offensive to both adults and children porn 21 Pornography related sites porn.illicit 94 Porn sites involving children Admin Curric Staff Public

5 suspicious 31 violence 32 FORUMS, CHAT, Recently discovered sites with suspicious words or phrases Sites promoting violence and anarchy forums 11 Unmoderated Personal Expression forums.blogs 71 Webblogs forums.dating 118 Dating websites such as friendfinder.com, eharmony.com, match.com, etc. forums.im 61 Instant messaging forums.mail 19 sites forums.newsgroups 38 Newsgroups, usenet and subscription newsletters forums.p2p 60 Peer to peer sites forums.personals 39 Personal web pages and personal ads forums.social_networking 117 Social networking and related websites such as myspace.com, facebook.com, orkut.com SECURITY parked 113 Pay per click hosting web sites that park expired domains security 72 Security risks security.nettools 116 Net tools, remote admin tools, internet server and client applications security.proxy 28 Web proxy servers and open SMTP relays ADVERTISING ads 3 shopping.spam 78 spam 55 BUSINESS AND WORK Ad servers and advertising companies Shopping websites that use spam for marketing Sources of spam mail that does not involve porn, gambling, or drugs automobile 37 Automobiles and motorcycles business 6 Business business.construction 115 Construction, building, plumbing, home improvement business.finance 10 Banking, stock markets, insurance, and financial news business.jobs 18 Employment search, offerings and support business.manufacturing 119 Manufacturing, industrial, and shipping companies business.real_estate 73 Real estate, homes, offices computers 57 Computers & Internet computers.consumer_electronics 128 Consumer electronics - TVs, cell phones, MP3

6 players, etc. computers, filehosting 127 Image, filehosting, shareware, freeware websites ham 56 Legitimate sources of law 68 Law firms, courts, and legal matters microsoft 51 Microsoft and related sites EDUCATION education 9 Education and reference sites education.arts 47 Art, art history, architecture, graphic design,and illustration education.games 74 Educational games for kids education.history 99 History education.literature 48 Literature, libraries, writers education.media 129 Educational streaming media resources education.music 50 Music education, history, instruments, marching, and museums education.science 44 Science and technology education.sex 80 High school level sex education websites education.social_sciences 75 Social sciences FAMILY LIFE family 95 Family life, cooking,gardening, home improvement family.food 76 Restaurants, grocery stores, recipes family.health 43 Health care family.religion 58 Religion & Spirituality photography 132 Photography KIDS AND TEENS kids_and_teens 46 Kid safe web sites kids_and_teens.chat 69 Monitored chat websites suitable for kids MISCELLANEOUS errors 7 Content database errors waiting to be purged expired 105 Domains whose registration has expired general 14 General interest plagarism 112 Websites that sell term papers, research papers and other ways to help students cheat RECREATION audio-video 5 Sources of MP3s, mpegs, and streaming entertainment 45 Movies, television, radio, and celebrities entertainment.radio_and_tv 131 Radio and TV stations games 13 Games, anime, cartoons, wallpapers and screen savers

7 hobby 83 Hobbies, crafts, collecting humor 40 Humor, puzzles, and brain-teasers music 49 Bands and artists, concerts, DJs, lyrics, songwriting, and record labels shopping 29 Shopping sites shopping.auctions 81 Auctions shopping.office_supplies 104 Major office supply websites sports 30 Sports sites sports.fantasy 82 Fantasy football, baseball, soccer, etc. sports.martial_arts 98 Martial arts sports.youth 84 High schools sports teams and youth sports leagues travel 36 Hotels, resorts, cruises, transportation and vacation offerings REFERENCE directory 34 Directories and portals about specialized topics news 20 News, Magazines, TV News Stations and Radio News stations Search* 85 Major search engines SOCIETY government 15 Federal, state, local and international government society 79 Culture, issues, ethnicity, people society.crime 97 Crime and the justice system society.politics 96 Politics, political activism, political issues world 59 Sites about regions and languages of the world world.cn 107 World websites - Chinese world.de 86 World websites - German world.es 87 World websites - Spanish world.fr 88 World websites - French world.it 89 World websites - Italian world.jp 90 World websites - Japanese world.kr 108 World websites - Korean world.nl 91 World websites - Netherlands world.pl 106 World websites - Polish world.pt 92 World websites - Portuguese world.ru 93 World websites - Russian Rating G-Rated 120 G-Rated PG-Rated 121 PG-Rated R-Rated 122 R-Rated S-Rated 124 S-Rated X-Rated 123 X-Rated

8 HGfL Web Filter Manager Nomination Form Please nominate the member of staff who will act as the Web Filter Manager for your Site. This may be the person who is responsible for running your Site s local area network and could be the person already identified as the nominated contact for your Site. Please FAX the completed form to HGfL Service Desk: The person s details will be entered in HGfL s support database and he/she will then be able to change the Web Filtering settings for your Site. If you choose to take up this option you must understand that the risks of exposure to inappropriate content or abuse of the schools network are higher than when accessing web sites normally filtered by the Hillingdon standard filter policies and you must be willing to accept responsibility and liability for any inappropriate use. Name: Position: address: Daytime telephone number: Evening telephone number: Mobile telephone number: To be signed by appropriate authority I authorise the above named person to act on behalf of the Site in all matters pertaining to the Sites Web Filtering service and I accept responsibility and liability for the consequences of any inappropriate use of the internet or abuse of the Site network by Site Users (including visitors). Site name: Head of service/headteachers name: address: Daytime telephone number: Signed: Date:

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY INTERNET AND EMAIL POLICY 1. Internet and Email General Policy 1.1. The school has software and systems in place, which can monitor and record all Internet and all email activities. You should be aware

More information

Bucksgfl Internet Web Filtering Policy

Bucksgfl Internet Web Filtering Policy Bucksgfl Internet Web Filtering Introduction The requirement to ensure that children and young people are able to use the internet and related communications technologies appropriately and safely is addressed

More information

Stoke-on-Trent Grid for Learning Internet Web Filtering Policy

Stoke-on-Trent Grid for Learning Internet Web Filtering Policy Stoke-on-Trent Grid for Learning Internet Web Filtering Policy Definitions Policy a policy is a collection of allowed categories of web site and groups of keywords that is applied to one or more workstations

More information

Internet Use Monitoring

Internet Use Monitoring Internet Use Monitoring Discussion with Commonwealth of Virginia Information Security Council Cameron Caffee, VDOT IT Audit Manager Jim Austin, VDOT Deputy ISO June 16, 2008 VDOT Internet Monitoring Background

More information

Hitwise Mobile Client Release FAQ February 2013

Hitwise Mobile Client Release FAQ February 2013 Hitwise Mobile Client Release FAQ February 2013 About Hitwise Mobile Mobile is one of the most dynamic aspects of the Internet today. Understanding the way consumers use the Internet from mobile devices

More information

2. Provide the name and annual cost of the content filtering software. Smoothwall Web Filter c. 2,100 pa

2. Provide the name and annual cost of the content filtering software. Smoothwall Web Filter c. 2,100 pa 1. Do you employ the use of content filtering software on the PCs based in your libraries which are connected to the internet and intended for use by the users of your library? Yes If answer to 1. is yes,

More information

SecurePoP Web Content Screening

SecurePoP Web Content Screening Seite 1 von 5 Introduction The following is a brief description of all Control List categories, including the subcategories. 1. Abortion Advocacy Sites with neutral or balanced discussion of the issues

More information

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460. Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security

More information

CyberPatrol SiteSURV Web Filtering User Manual

CyberPatrol SiteSURV Web Filtering User Manual CyberPatrol SiteSURV Web Filtering User Manual Page 1 Table of Contents Table of Contents Overview... 3 Product Diagram... 3 How it Works... 3 Managing Internet Access... 4 Activating Your Account... 5

More information

Domains belonging to a domain name registration service or a holder of domain names of unused websites.

Domains belonging to a domain name registration service or a holder of domain names of unused websites. Olfeo s list of categories International database Secure / Optimize / Analyze Internet usage Legal Risk Theme Category Description Security Risk Child/Teenage Pornography Counterfeiting and Copyright Infringement

More information

White Paper: Protecting Your Family on the Internet

White Paper: Protecting Your Family on the Internet Internet Protection Tools... When You Want To Be Sure. White Paper: Protecting Your Family on the Internet ContentWatch World Headquarters 2369 West Orton Circle Salt Lake City, UT 84119 USA Tel: 801.977.7777

More information

United States Department of the Interior

United States Department of the Interior United States Department of the Interior BUREAU OF LAND MANAGEMENT California State Office 2800 Cottage Way, Suite W1834 Sacramento, CA 95825 www.ca.blm.gov February 3, 2003 In Reply Refer To: 1280(P)

More information

LCC xdsl Usage Policy

LCC xdsl Usage Policy LCC xdsl Usage Policy 1. Introduction For the Internet to operate in a manner that satisfies the majority of its users, all users need to observe some rules and etiquette governing their use of it. These

More information

Internet Content Filter Exemption Request Form

Internet Content Filter Exemption Request Form Internet Content Filter Exemption Request Form Version 2.0 This form maybe updated at anytime (without notice) to ensure changes to the HSE Internet Content Filter Standard and/or business practices are

More information

USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com

USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com 06-06-2008 1 2 CONTENTS 1. INTRODUCTION... 6 2. INSTALLATION STEPS... 7 3. SET-UP... 10 3.1. Filter status: Activating/ Deactivating...10

More information

F-Secure Mobile Security. Android

F-Secure Mobile Security. Android F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from

More information

DriveLock Websecurity

DriveLock Websecurity Whitepaper DriveLock Websecurity Cloud-based internet security CenterTools Software GmbH 2015 Contents 1 DRIVELOCK WEBSECURITY... 2 1.1 WEBSECURITY CLOUDBASIERTE INTERNETSICHERHEIT... 2 1.2 KONFIGURATION

More information

Competitive insights to power your online marketing

Competitive insights to power your online marketing Competitive insights to power your online marketing About Experian Hitwise Experian Hitwise is the leading global online competitive intelligence service, helping clients protect and grow market share

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

EHLANZENI DISTRICT MUNICIPALITY PROXY FILTERING AND INTERNET ACCESS POLICY FOR 2012

EHLANZENI DISTRICT MUNICIPALITY PROXY FILTERING AND INTERNET ACCESS POLICY FOR 2012 EHLANZENI DISTRICT MUNICIPALITY PROXY FILTERING AND INTERNET ACCESS POLICY FOR 2012 1. OBJECT OF THE POLICY The purpose of this policy is to define standards for systems that monitor and limit web use

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

Olfeo's list of categories

Olfeo's list of categories Olfeo's list of categories Contents Legal Risk... 3 Security Risk... 5 Adult Content... 6 Risk of Unauthorized Disclosure... 7 Bandwidth... 8 Leisure and Social Activities...9 Education... 11 Consumer

More information

ACCEPTABLE USAGE PLOICY

ACCEPTABLE USAGE PLOICY ACCEPTABLE USAGE PLOICY Business Terms - February 2012 ACCEPTABLE USAGE POLICY Business Terms Version February 2012 Acceptable Usage Policy Feb12.Docx 1 Contents 1. INTRODUCTION... 3 2. PURPOSE... 3 3.

More information

West Sussex Schools and Academies Internet Filtering Policy

West Sussex Schools and Academies Internet Filtering Policy Schools and Academies Internet Filtering Policy Schools and Academies Internet Filtering Policy Contents Page 1.1 General Overview of Filtering 1 1.2 WebScreen Categories 2-8 1.3 School / Academy Policies

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

Why Websense Enterprise Beats SurfControl Web Filter VS

Why Websense Enterprise Beats SurfControl Web Filter VS Why Websense Enterprise Beats SurfControl Web Filter VS Websense A Proven Enterprise Solution Founded in 1994, Websense is the world s leading Web filtering provider and is the preferred vendor of the

More information

White Paper. Internet Monitoring Versus Web Filtering

White Paper. Internet Monitoring Versus Web Filtering SpectorSoft Corporation 1555 Indian River Blvd. Vero Beach, FL 32960 1.888.598.2788 toll-free 1.772.770.5670 sales and support www.spector360.com Table of Contents 3 Surfing Non-work Related Web Sites

More information

Internet Monitoring Versus Web Filtering

Internet Monitoring Versus Web Filtering Internet Monitoring Versus Web Filtering SpectorSoft Corporation 1555 Indian River Blvd. Bldg. B-210 Vero Beach, FL 32960 1-772-770-5670 phone 1-772-770-3442 fax info@spectorsoft.com www.spectorsoft.com

More information

Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms of Service is mandatory for Hosting signing up or using our services.

Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms of Service is mandatory for Hosting signing up or using our services. WEB HOSTING AGREEMENT AND TERMS OF SERVICE Shortcut Solutions, llc. --June 2007-- Acceptable Use Policy and Web Hosting Terms of Service Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms

More information

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses White Paper How to Effectively Provide Safe and Productive Web Environment for Today's Businesses Table of Content The Importance of Safe and Productive Web Environment... 1 The dangers of unrestricted

More information

Employee PC and Server Activity Monitoring Solution

Employee PC and Server Activity Monitoring Solution Employee PC and Server Activity Monitoring Solution Employee PC and Server Activity Monitoring Ever dreamed of a software tool to track your network activity in real time? Ever thought of how useful it

More information

McAfee Web Gateway Categories and Filtering Policy Settings for Student and Staff Filters Great Neck Public Schools Revised 12/3/13

McAfee Web Gateway Categories and Filtering Policy Settings for Student and Staff Filters Great Neck Public Schools Revised 12/3/13 McAfee Web Gateway Categories and Filtering Policy Settings for Student and Staff Filters Great Neck Public Schools Revised 12/3/13 Key: Plain Text = Allowed Categories; Italics = Blocked Categories; Bold

More information

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

The Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP")

The Armstrong Chamberlin Web Hosting Acceptable Use Policy (AUP) The Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP") Your services may be suspended or terminated for violation of this AUP in accordance with Armstrong Chamberlin s Web Hosting Terms of

More information

RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET

RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET Administrative Procedure 140 Background RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET This Administrative Procedure is to guide users in the proper use of technology within the Division. The goal of the

More information

Internet Safety for Kids and Adults

Internet Safety for Kids and Adults Net@office Net@office differs from Proxy in two significant areas: features & configurability. Net@office has advanced features like web page caching, site filtering, privacy options, traffic logging and

More information

McAfee Web Reporter Turning volumes of data into actionable intelligence

McAfee Web Reporter Turning volumes of data into actionable intelligence McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access

More information

Internet: Copying & Downloading

Internet: Copying & Downloading INFORM ATION SHEET G056v 09 May 2015 Internet: Copying & Downloading This information sheet is for people who want to copy or download material from the Internet or swap and share files online. The purpose

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions. Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

TERMS OF REFERENCE DEVELOPMENT, MAINTENANCE, ONLINE MARKETING AND PROMOTIONS OF THE PHILIPPINE DEPARTMENT OF TOURISM WEBSITE

TERMS OF REFERENCE DEVELOPMENT, MAINTENANCE, ONLINE MARKETING AND PROMOTIONS OF THE PHILIPPINE DEPARTMENT OF TOURISM WEBSITE TERMS OF REFERENCE PROJECT: OBJECTIVES: DEVELOPMENT, MAINTENANCE, ONLINE MARKETING AND PROMOTIONS OF THE PHILIPPINE DEPARTMENT OF TOURISM WEBSITE To establish an interactive website designed to promote

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information

U.S. Bank Secure Email Quick Start Guide

U.S. Bank Secure Email Quick Start Guide Welcome to U.S. Bank s Secure Email Service! US Bank has partnered with Cisco to leverage their secure email solution, Cisco Registered Envelope Service (CRES). This guide will show you the steps for opening

More information

Home Network Security Services

Home Network Security Services Home Network Security Services Version 1.1 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. The Trend Micro Home Network

More information

Chapter 3 Restricting Access From Your Network

Chapter 3 Restricting Access From Your Network Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax Dual Band Wireless-N Router WNDR3300 to protect your network.

More information

BOARD OF EDUCATION Cherry Hill, New Jersey

BOARD OF EDUCATION Cherry Hill, New Jersey BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to

More information

Comparing Architectures For Internet Content Filtering Solutions

Comparing Architectures For Internet Content Filtering Solutions Comparing Architectures For Internet Content Filtering Solutions Innovative website caching and rating architecture delivers an affordable, enterprise-class filtering solution for businesses, schools,

More information

Why your own server space? Why should you set it up?

Why your own server space? Why should you set it up? Lab 5 servers Why your own server space? Why should you set it up? -Control factors -Demystifying how things get on the internet -Project from start to finish What is the Difference Between a Digital Art

More information

Access Control Rules: URL Filtering

Access Control Rules: URL Filtering The following topics describe how to configure URL filtering for your Firepower System: URL Filtering and Access Control, page 1 Reputation-Based URL Filtering, page 2 Manual URL Filtering, page 5 Limitations

More information

OPTENET PC Web Filter. Version 10.09

OPTENET PC Web Filter. Version 10.09 OPTENET PC Web Filter Version 10.09 COPYRIGHT No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any

More information

Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009

Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009 Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy

More information

Internet Content Filter Standard Version 2.0

Internet Content Filter Standard Version 2.0 Version 2.0 Please check the HSE intranet for the most up to date version of this standard http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/ 1.0 Purpose

More information

Creating a managed service using the SWGfL Filtering software

Creating a managed service using the SWGfL Filtering software Creating a managed service using the SWGfL Filtering software Contents Overview... 2 How the filtering software works... 3 Logging on... 4 Web Access Policy... 5 Editing your school list... 6 Creating

More information

Web Hosting from. The WATER Foundation 9121 County Road 23 Brainerd, MN 56401 Toll Free: 800-944-3764 (p) 218.764.2321 (f) 218.764.

Web Hosting from. The WATER Foundation 9121 County Road 23 Brainerd, MN 56401 Toll Free: 800-944-3764 (p) 218.764.2321 (f) 218.764. Web Hosting from The WATER Foundation 9121 County Road 23 Brainerd, MN 56401 Toll Free: 800-944-3764 (p) 218.764.2321 (f) 218.764.3582 Does your message need to be heard? Need a web site? Let The WATER

More information

Microsoft IT Academy E-Learning Central Getting Started Guide

Microsoft IT Academy E-Learning Central Getting Started Guide Microsoft IT Academy E-Learning Central Getting Started Guide This guide provides an overview of the Microsoft IT Academy E-Learning Central site for Administrators, Instructors and Students 1 Table of

More information

Chapter 6: ScanMail emanager

Chapter 6: ScanMail emanager Chapter 6: ScanMail emanager Chapter 6: ScanMail emanager Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the purpose of ScanMail emanager

More information

Symantec Hosted Mail Security Getting Started Guide

Symantec Hosted Mail Security Getting Started Guide Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

How To Manage Your Spam On Graymail On Pc Or Macodeo.Com

How To Manage Your Spam On Graymail On Pc Or Macodeo.Com User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

Safe Internet Services - Categories of Content

Safe Internet Services - Categories of Content Safe Internet Service Filtering Categories Table of Contents Category Definitions 3 1.1. Overview 3 1.2. Categories 3 1.2.1. Adult 3 1.2.2. Adult Image 3 1.2.3. Advertising 3 1.2.4. Adware 3 1.2.5. Alcohol

More information

How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business)

How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business) Hosted Exchange +SharePoint: Communication and Collaboration This is the next generation of affordable, reliable messaging and portal solutions with Microsoft Exchange 2010 and Microsoft SharePoint 2010.

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate.

The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Quick Start Guide 2 The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Going online for youngsters is fun, creative and exciting but it

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing

More information

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA Computers and Media: P2P and Business Models CSCI 1200 JAREK SZLICHTA CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA 1 Agenda difference between client-server and peer-to-peer technology business models used

More information

Talk-101 User Guides Web Content Filter Administration

Talk-101 User Guides Web Content Filter Administration Talk-101 User Guides Web Content Filter Administration Contents Contents... 2 Accessing the Control Panel... 3 Proxy User Management... 4 Adding a new Proxy User... 5 Modifying an existing Proxy User...

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

INDIANA HIGH SCHOOL ATHLETIC ASSOCIATION, INC. 2008-09 Rules for Television, Radio, Cable and Internet Broadcasting

INDIANA HIGH SCHOOL ATHLETIC ASSOCIATION, INC. 2008-09 Rules for Television, Radio, Cable and Internet Broadcasting INDIANA HIGH SCHOOL ATHLETIC ASSOCIATION, INC. 2008-09 Rules for Television, Radio, Cable and Internet Broadcasting Please note: Broadcast Applications for all sports are also available on line at www.ihsaa.org.

More information

U.S. Chemical Safety and Hazard Investigation Board

U.S. Chemical Safety and Hazard Investigation Board BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1

More information

Chapter 7. The Internet and World Wide Web. What You Will Learn... Computers Are Your Future. The Internet. What You Will Learn...

Chapter 7. The Internet and World Wide Web. What You Will Learn... Computers Are Your Future. The Internet. What You Will Learn... What You Will Learn... Computers Are Your Future Chapter 7 How the Internet works Methods for accessing the Internet The Internet and the World Wide Web Hypertext Web browsers and Web servers The Internet

More information

Employee Internet Usage February 15, 2007

Employee Internet Usage February 15, 2007 Employee Internet Usage February 15, 2007 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing Office

More information

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used? TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

Comprehensive Internet filtering for networks of all types and sizes

Comprehensive Internet filtering for networks of all types and sizes Comprehensive Internet filtering for networks of all types and sizes COMPREHENSIVE INTERNET FILTERING UserGate Web Filter is a gateway solution for controlling Internet use on all devices on a local network,

More information

TERMS OF USE AGREEMENT

TERMS OF USE AGREEMENT TERMS OF USE AGREEMENT Last Updated: October 20, 2010 PLEASE READ THIS TERMS CAREFULLY BEFORE ACCESSING THE WEBSITE I GENERAL 1) The Web Portal MEGA BRAZIL TV is a part of the MEGA LOPES, LLC family of

More information

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology

More information

Director Test Research: David Walkiewicz

Director Test Research: David Walkiewicz 7th August 2015 created by Markus Selinger Test: Parental control software for Windows and Mac OS X Those who don't want their children to be exposed to early unattended lessons in the birds and the bees

More information

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com.

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com. Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,

More information

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Virus What is a virus? It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It can also be defined as a set of codes written to cause

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

THE GREEK SCHOOL NETWORK: Structure, design principles, and services offered

THE GREEK SCHOOL NETWORK: Structure, design principles, and services offered THE GREEK SCHOOL NETWORK: Structure, design principles, and services offered Nikolaos Xypolitos, Michael Paraskevas, Emmanouel Varvarigos Research Academic Computer Technology Institute, University of

More information

Dauphin County Technical School

Dauphin County Technical School Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,

More information

PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States.

PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States. PRIVACY POLICY This Policy was last changed on March 31, 2015. Kids Sports Entertainment, Inc. d/b/a The Whistle ( Whistle Sports ) and its affiliates operate this website, and any and all Whistle Sports

More information

Email Protection for your account

Email Protection for your account User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

Safe internet: Getting Started Guide

Safe internet: Getting Started Guide Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration

More information

We may collect the following types of information during your visit on our Site:

We may collect the following types of information during your visit on our Site: Privacy Policy This Privacy Policy (the Policy ) governs the use and collection of information that Horizon Broadcasting Group, LLC (collectively, "we," "our" or the "website") obtains from you while you

More information

Geyserville New Tech Academy Student Technology Acceptable Use Policy

Geyserville New Tech Academy Student Technology Acceptable Use Policy Geyserville New Tech Academy Student Technology Acceptable Use Policy Overview. The (GUSD) makes a variety of communications and information technologies available to students through computer/network/internet

More information

Configuring Web (HTTP) and File Transfer (FTP) Traffic

Configuring Web (HTTP) and File Transfer (FTP) Traffic CHAPTER 4 Configuring Web (HTTP) and File Transfer (FTP) Traffic This chapter describes how to make HTTP and FTP traffic configuration updates, and includes the following sections: Default Web and FTP

More information

Worry-Free Business Security 6.0. External FAQ

Worry-Free Business Security 6.0. External FAQ Worry-Free Business Security 6.0 External FAQ May 2009 Page 1 Contents Introducing Worry-Free Business Security...3 What is Worry-Free Business Security?... 3 When is Worry-Free Business Security available?...

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

Configuring Your Gateman Email Server

Configuring Your Gateman Email Server Configuring Your Gateman Email Server Your Gateman Lifestyle Server includes an Email Server that provides users access to email via an email client and via your web browser using your laptop and mobile

More information

LANCOM Techpaper Content Filter

LANCOM Techpaper Content Filter The architecture Content filters can be implemented in a variety of different architectures: 11 Client-based solutions, where filter software is installed directly on a desktop computer, are suitable for

More information

User Guide. Hosted Web Security. Copyright CensorNet Limited, 2007-2012

User Guide. Hosted Web Security. Copyright CensorNet Limited, 2007-2012 User Guide Hosted Web Security Copyright CensorNet Limited, 2007-2012 This document is designed to provide information about the first time configuration and administrator use of the Hosted Web Security

More information

The State of Spam A Monthly Report March 2007. Generated by Symantec Messaging and Web Security

The State of Spam A Monthly Report March 2007. Generated by Symantec Messaging and Web Security The State of Spam A Monthly Report March 2007 Generated by Symantec Messaging and Web Security Monthly Spam Landscape Spam activity in February of 2007 was fairly consistent with trends observed in previous

More information