Computer Services Policy
|
|
- Anis Mathews
- 8 years ago
- Views:
Transcription
1 Al Musanna College of Technology Computer Services Policy Purpose and Needs Analysis 1. To ensure the safety and security of high-tech equipment. 2. To ensure the requirements of staff and students are met. Scope of Application This policy applies to staff and students at. Staff and students must abide by the procedures of the policy. The maintenance of the equipment used in the computer laboratories is done annually by private companies on a contract basis. Policy Statement The college is concerned with the safety, security and maintenance of equipment provided in the computer laboratories. It provides general guidelines for using the computer laboratory. Security and safety measures are followed by staff and students to prevent the misusage of equipment in the computer laboratory. Maintenance involves repair, replacement and restoration of equipment. Procedures 1. User Accounts, Internet and , Printing Services Responsibility: Head of Section 1
2 1.1 User Accounts Staff and student of the college must obtain an account from the Computer Services Section and must sign the User Computer Lab Contract form. Account will be active for the duration of the person's tenure with the college. Accounts may be suspended for violations of computer laboratory usage policies. Before an account of the user is suspended, a warning is given by the Head of the Centre and the respective head of center/department is informed. In certain circumstances, an account may be suspended without a warning. Accounts have few resource limitations placed on them and misuse can be prevented by the general guidelines as follows: Only authorized users may use the laboratories. An authorized user is either a student or a staff Users must not share his/her login ID and password with any other user Users must not alter files on computers or network drives, other than the files they created themselves Users are not allowed to load software onto computers or network drives or change the settings of any hardware and software in any way i.e desktop backgrounds, screen resolution etc Any viruses, hardware or software errors must be reported to concerned Laboratory Technician or Help Desk Access to the Network Laboratory, Project Laboratory is limited to students who are registered for a related course, offered in that laboratory. While in the Network Laboratory, students are only allowed to perform official networking course related activities Sending of broadcast messages is not allowed. All real time interactive applications which include but are not limited to, instant messengers, chat rooms, online games and multi-user domains are strictly prohibited. 2
3 1.1.8 Use space on network disk responsibly. Students are expected to keep their usage under the assigned disk quota (this will be assigned by the Computer Services Section) for any special project which requires big space and arrangement for the project space is given. 1.2 Internet and Internet access is available to all registered users. The following applies to Internet Usage: Authentication is handled automatically, using login ID and password. Login ID and password must be kept secret and must not be given to other users In the Network Laboratory, Internet usage will be restricted to Network course related study no or any other unrelated access will be allowed Users must avoid forwarding spam mail and chain mails. 1.3 Printing Services The following applies to printer usage: In the campus, laser printers are provided for registered students. The printers are located in laboratories where students can print from a designated printers (network/shared) Never press cancel on the printers. This cancels the print jobs of other students, which is a waste of their printing efforts If the printer displays Offline, press the big green button to get it back online. 3
4 1.3.4 Use of paper other than recommended like colored printed paper is strictly prohibited as it may damage the printers Printing pages are continuously monitored by the assigned Laboratory Technician Large print jobs is schedule for off hours. The maximum number of pages allowed for printing is 10 pages or otherwise authorized by the Academic Staff. Class notes should be printed and made available by concerned staff. Maintenance, Security and Safety 1.4 Maintenance All authorized users of computer laboratories must sign the User Computer Lab Contract agreement before utilizing all its resources No user may tamper with, move or remove equipment from any laboratory If any problem is noticed with a piece of equipment or the rooms in general, report it to the staff-in-charge immediately Each laboratory is assigned to a Laboratory Technician to ensure proper functioning of the equipment and laboratories College equipment must not be used for hacking or other illegal practices Concerned staff who encounter problems with these resources should report the problem using the College Interactive Portal s Help Desk or submit a Complaint/Repair/Service Order form (Form No. ETC-01) addressed to the Educational Technology Centre Once received by the Technician, the report goes on queue along with other requests and priority is given on the basis of urgency. 4
5 1.4.8 If a component is available, it is immediately replaced, if not, a request is forwarded to the Assistant Dean for Administrative and Financial Affairs Upon completion, the requesting staff fills out a completion form and is forwarded to the Educational Technology Centre In general, maintenance is done within the college, but if it is still under warranty the request is forwarded to the company who supplied the equipment Laboratory facilities must not be used to damage or gain unauthorized access to the information, files, or property of another person or organization No food or drink is allowed inside of the laboratories or near any of the equipment Smoking is not allowed inside laboratories. 1.5 Safety and Security of Equipment The following applies to Safety and Security of Equipments: All authorized users must take proper care while working in the computer laboratories. They are advised to handle the electrical sockets, switches and other equipments carefully to prevent themselves from electrical shocks and other relevant hazards Incident such as shocks from certain equipment/device within the computer laboratory, it must inform to the assigned laboratory staff Laboratory facilities must not be used to bypass campus network security system or any other computer security system Temperature of heaters and air conditioners must be properly set in order to maintain appropriate room temperature for users and machines User account must be kept secret to avoid the misuse of the account by another person. 5
6 1.5.6 Equipment must not be monopolized. If the user is going away from the machine for more than 15 minutes, User must log out before leaving, for security of their account, and to ensure that others are able to use the laboratory resources Equipment must not be tampered. Computer laboratories are monitored by security cameras installed in every laboratory and are recording 24 hours everyday to ensure safeguarding procedures. 1.6 Misuse of Computer (Adopted from West Shore Community College Computer Lab 1 ) If there is any violation of the above procedures, the following offenses will be referred for possible disciplinary action as per College-By-Laws: Intentional damage to college software, equipment or data Misuse of laboratory facilities that results (or could result) in damage to college software, equipment, or data Use of laboratory facilities to bypass the campus network security system or any other computer security system Use of laboratory facilities to damage or gain unauthorized access to the information files, or property of another person or organization Theft, including but not limited to, the illegal copying of software or data Use of college equipment and/or network for any illegal purpose Refusal to obey laboratory authority, including instructors, and other agents acting in the performance of their duties. In case of any offense/action, network access will be suspended and disciplinary action will be applied. References: 1. West Shore Community College Computer Lab 6
7 7
8 RMO File/Document Number Policy Custodian RMO Head of Educational Technology Center Responsible Officer Computer Services Section Endorsed by: Approved by Policy Development Committee College Council Related Documents and Policies Quality Sub-Manual for Computer Laboratories Maintenance Policy Related Legislation College-By-Laws Superseded Policies Date Effective November 8, 2009 Next review date November 8, 2011 Contact for queries about the Policy ADAF and ETC 8
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
More informationSTATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION
STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION Access to modern information technology is essential to the state university mission
More informationUniversity of Maryland Baltimore Information Technology Acceptable Use Policy
The UMB School of Nursing follows and adheres to the UMB Campus Information Technology Acceptable Use Policy. The UMSON further defines Authorized User to also include any person who receives a password
More informationPURPOSE To establish standards for the use of College networks and computer accounts.
IT 01 Classification: Responsible Authority: Executive Sponsor: Approval Authority: Date First Approved: 1998.03.02 Date Last Reviewed: 2011.11.23 Mandatory Review Date: 2016.11.23 Acceptable Use of Computer
More informationInternet Permission and Networking Agreements For Minors
PARENT PERMISSION LETTER REGARDING INTERNET USE AGREEMENT Please read this document carefully before signing the attached permission form. (Name of the Computer Center) believes the Internet offers vast,
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationLOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
More informationBROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
More informationMISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
More informationValmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
More informationSaint Martin s Catholic Academy
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
More informationChicago State University Computer Usage Policy
Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services
More information[Acceptable Use Policy]
South College Computer Code of Ethics [Acceptable Use Policy] Introduction Freedom of expression and an open environment to pursue scholarly inquiry and for sharing of information are encouraged, supported,
More informationValmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
More informationCOMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
More informationTechnology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
More informationNetwork and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
More information3.28F LICENSED PERSONNEL EMPLOYEE INTERNET USE AGREEMENT
3.28F LICENSED PERSONNEL EMPLOYEE INTERNET USE AGREEMENT Acceptable Use Policy: Staff The Benton School District provides technology to support teaching, enhance learning, and improve productivity. This
More informationUNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
More informationAUBnet (email) Accounts Policies
(email) s Policies Reference: CNS-P-Acct Revision: B Supersedes: Purpose: Source: CNS-P-EMAIL-A This policy and related policies provide the framework in which all accounts and email and intranet are provided
More informationTomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
More informationFAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
More information3. Electronic Mail (E-mail)
- Title of Agency - Internet Acceptable Use Policy The Following Internet Acceptable Use Policy Applies to the (AGENCY NAME) Staff 1. Introduction The (AGENCY NAME) provides its staff and (other entity(s)
More informationHamlin School District Student Computer Handbook
Hamlin School District Student Computer Handbook 2014-2015 INTRODUCTION All 9 th -12 th grade students will be issued computers for use as part of their educational curriculum. The purpose of these computers
More informationNORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS
NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS Code No. 605.6E1(B) I am the parent or guardian of the student named
More informationAcceptable Use Policy - Staff
Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education
More informationAcceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
More informationThe College ofBergen Online - Acceptable Use and Disposal
Acceptable Use of Information Technology Policy Bergen Community College reserves the right to monitor its information technology resources and telecommunications network to protect the integrity of its
More informationEMPLOYEE COMPUTER USE POLICY
EMPLOYEE COMPUTER USE POLICY SECTION ONE PURPOSE A. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, Navigator Pointe Academy makes available
More informationTEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015
TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015 Tekamah-Herman Community Schools is proud to offer our High School Students Apple MacBook Air computers for use at school
More informationPulaski Technical College
Pulaski Technical College Internet and E-Mail Acceptable Use Policy 1. Introduction Pulaski Technical College provides faculty and staff with technology resources and a local area network with access to
More information- Do not leave open email/network applications unattended. Log off of a computer when it is in an unsecured area and out of your sight.
STAFF PROCEDURES FOR ACCEPTABLE USE OF EMAIL/NETWORK AND INTERNET The primary purpose of Sycamore Community Schools email/network system is to provide resources to enhance and support educational instruction
More informationResponsible Computer Use Policy for Students
Responsible Computer Use Policy for Students Introduction By using the Sheldon College Network and ICT Services students agree to accept the terms and conditions outlined in this document. This policy
More informationBox Hill Senior Secondary College/MYSC
Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication
More informationThe Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
More informationCOMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
More informationDEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE
2 of 10 2.5 Failure to comply with this policy, in whole or in part, if grounds for disciplinary actions, up to and including discharge. ADMINISTRATIVE CONTROL 3.1 The CIO Bureau s Information Technology
More informationPierce County Policy on Computer Use and Information Systems
Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail
More informationComputer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
More informationEthical and Responsible Use of EagleNet 03/26/14 AMW
Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of
More informationDescriptor Code: EFE-P
ADMINISTRATIVE PROCEDURE Descriptor Term: ACCEPTABLE USE OF ELECTRONIC TRANSMISSION CAPABILITIES Descriptor Code: EFE-P Date Issued: October 30, 2003 Date Changed June 26, 2008 September 30, 2009 1. Network
More informationReynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students AUP Sections 1. Acceptable Use 2. Privileges 3. Internet Access 4. Procedures & Caveats 5. Netiquette
More informationBoard Adopted Policy
Board Adopted Policy Policy Title Information Technology Systems Usage Effective Date:03/14/2012 Board Approval Date: 6/19/2014 Review Cycle: three (3) years I. Application: Authority wide. II. Intent:
More informationSPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081
SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081 POLICY: COMPUTER/INTERNET ACCEPTABLE USE POLICY AGREEMENT Overview Access to information is fundamental to citizenship and the foundation for further
More informationCC. TECHNOLOGY ACCEPTABLE USE POLICY. 1. Purpose
CC. TECHNOLOGY ACCEPTABLE USE POLICY 1. Purpose a. The Children s Internet Protection Act (CIPA), 47 U.S.C. 254(h)(5), and South Dakota Consolidated Statues Section 22-24-55 require public schools to implement
More informationMedford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
More informationFaculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy
Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized
More informationAdministrative Procedures Manual. Management Information Services
I-23.10 Management Information Services The College owns and operates a local area network (LAN) that connects the College's computing hardware and services. Computing hardware refers to any device that
More informationThe District's Electronic Communications System - A Review
ROBINSON INDEPENDENT SCHOOL DISTRICT ACCEPTABLE USE POLICY (AUP) The Superintendent or designee will oversee the District's electronic communications system. The District's system will be used only for
More informationInformation Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
More informationPOLICY 4526. Adopted by Board of Education: 4/20/05
POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,
More informationNAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures. (March 2012)
NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures (March 2012) Contents Ownership... 3 Privately-owned devices... 4 Optional peripherals... 4 Warranty & Insurance... 4 Stolen or Lost Laptops...
More informationMassachusetts College of Pharmacy and Health Sciences Information Services Acceptable Use Policy
Massachusetts College of Pharmacy and Health Sciences Information Services Acceptable Use Policy Due to the ever-increasing need for integrated technology and data sharing, and because of legal and ethical
More informationRESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET
Administrative Procedure 140 Background RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET This Administrative Procedure is to guide users in the proper use of technology within the Division. The goal of the
More informationNORTH SHORE SCHOOL DISTRICT COMPUTER NETWORK ACCEPTABLE USE POLICY. Please read the following before signing the attached legally binding contract.
NORTH SHORE SCHOOL DISTRICT COMPUTER NETWORK ACCEPTABLE USE POLICY Please read the following before signing the attached legally binding contract. Introduction Internet access is now available to students,
More informationComputers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or
Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or desktop for their use while in training. If a recruit
More informationGinnie Mae Enterprise Portal (GMEP) User Registration for Custodian ONLY
Ginnie Mae Enterprise Portal (GMEP) User Registration for Custodian ONLY Instructions (1) Complete the information in the boxes below please print. (2) Select the requested roles(s). (3) Read the User
More informationThe Fulham Boys School ipad Acceptable Use Policy, Procedures and Information
The Fulham Boys School ipad Acceptable Use Policy, Procedures and Information Except where specifically stated otherwise, the policies, procedures and information within this document apply to all ipads
More informationParent Owned Device Program
Parent Owned Device Program Faith Excellence Community Compassion Purpose Introduction of the Parent Owned Device Program supports our vision to provide excellence in student centered learning in a global
More informationIdentifier: IT-001 Revision Date: 10/1/2015 Effective Date: 10/18/2012 Approved by: BOR Approved on date: 10/18/2012
Information Technology Policy Acceptable Use Identifier: IT-001 Revision Date: 10/1/2015 Effective Date: 10/18/2012 Approved by: BOR Approved on date: 10/18/2012 Table of Contents 1. Introduction... 2
More informationCity of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
More informationLighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15)
Lighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15) Student Name Date Responsible Use Agreement (in four parts) Part 1: Responsible Internet and Network Use Part 2: Responsible
More informationResponsible Use of Technology and Information Resources
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
More informationBLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
More informationEMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards
EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data
More informationAcceptable Use Policy
Acceptable Use Policy I. Introduction Each employee, student or non-student user of Greenville County Schools (GCS) information system is expected to be familiar with and follow the expectations and requirements
More informationRocklin Unified School District Employee Authorized Network, Internet Usage, and E-Mail Privacy Agreement
Rocklin Unified School District Employee Authorized Network, Internet Usage, and E-Mail Privacy Agreement Please read this document carefully before signing: A. Upon employment all individuals permitted
More informationPOLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
More informationSchool of Electrical Engineering and Computer Science Computing Policies
School of Electrical Engineering and Computer Science Computing Policies Introduction The policies described in this document govern the use and administration of the computing facilities within the School
More informationHow To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
More information51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
More informationStandard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
More informationSussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009
Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009 Access to Electronic Media and other Technologies Terms and Conditions REASONS FOR PROVIDING ELECTRONIC
More informationUSE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
More informationDresden International School Computer and IT Use Policy
Dresden International School Computer and IT Use Policy Overview This document specifies the important ground rules that students must follow when using computers, IT services and IT equipment provided
More informationComputing and Network Use Policy
Computing and Network Use Policy Category: University Area Date Established: Responsible Office: Office of the Chief Information Officer Date Last Revised: - 3/26/2007 Responsible Executive: CIO Date Posted
More informationIT and Network Usage Policy of International Islamic University, Islamabad
IT and Network Usage Policy of International Islamic University, Islamabad POLICY STATEMENT Users of International Islamic University network and computer resources have a responsibility to properly/fairly
More informationBrownsburg Community School Corporation Acceptable Use Policy 2012-2013
Introduction Brownsburg Community School Corporation Acceptable Use Policy 2012-2013 The Brownsburg Community School Corporation (BCSC) recognizes that access to technology in school gives students greater
More informationAcceptable Usage Guidelines. e-governance
Acceptable Usage Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
More informationUSE OF TECHNOLOGY RESOURCES IN INSTRUCTION
I-6400 2012 Arizona School Boards Association IJNDB USE OF TECHNOLOGY RESOURCES IN INSTRUCTION Appropriate use of Electronic Information Services The District may provide electronic information services
More informationDauphin County Technical School
Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,
More informationCity of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
More informationMANAGEMENT TECHNOLOGY CENTER STUDENT GUIDE TO COMPUTING SERVICES
MANAGEMENT TECHNOLOGY CENTER STUDENT GUIDE TO COMPUTING SERVICES This document describes the computing facilities that are available to the students of the Freeman School. Computing labs, access, software,
More informationInformation Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
More informationRICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
More informationChristian Academy of Knoxville Technology Responsible Use Agreement 2015-2016
Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 PURPOSE Christian Academy of Knoxville provides technology resources for the school community with a belief that the educational
More informationResNet Guide. Information & Learning Services. Here to support your study and research
ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,
More informationSUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
More information13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
More informationMEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
More informationHow To Use East Georgia State College Computers And Networks Safely
11.1 Campus Computer and Network Usage Policy "Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers
More informationUpdated January 2016. Hosting and Managed Services Acceptable Use Policy
Updated January 2016 Hosting and Managed Services Acceptable Use Policy Key Comment This policy provides Cologix customers ordering hosting and managed services from Cologix with standards and rules regarding
More informationDCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
More informationMOBILE PHONE & COMPUTER USE POLICY
MOBILE PHONE & COMPUTER USE POLICY epal epal is the online learning hub for the Australian Performing Arts Grammar School. It is a main form of communication between parents, students, staff and administration.
More informationDATA ACCESS POLICY. Attached is a policy statement regarding data access at the New Jersey Institute of Technology.
DATA ACCESS POLICY As NJIT has moved to a distributed data access environment, policy has been established to protect the computer-based institutional data from unauthorized (c.q. other improprietary)
More informationTable of Contents. 1. Specifications of your laptop:
Parent/Student Laptop Manual 2012-2013 Table of Contents 1. Specifications of your laptop: 2. Terms of Use: a. Title b. Loss or Damage c. Repossession d. Use and Maintenance Fees e. Network Use f. Internet
More informationTECHNICAL SUPPORT. and HARDWARE/SOFTWARE/NETWORK MAINTENANCE. for LEARNING RESOURCE CENTER MOBILE AND FIXED CLASSROOM WORKSTATIONS
IT Services Service Level Agreement TECHNICAL SUPPORT and HARDWARE/SOFTWARE/NETWORK MAINTENANCE for LEARNING RESOURCE CENTER MOBILE AND FIXED CLASSROOM WORKSTATIONS IT Services Service Level Agreement:LRC
More informationIowa Park CISD BYOD Policy 2013-2014
Iowa Park CISD BYOD Policy 2013-2014 Table of Contents Table of Contents Table of Contents... 2 Purpose... 3 What is the D in BYOD.... 3 Guidelines... 3 Wireless Information...5 Responsible Use Policy...6
More informationPROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationCOLORADO STATE UNIVERSITY SYSTEM
Board Policy: The purpose of this ipad Usage Policy is to establish guidelines and procedures for staff and Board members of the Colorado State University System (CSUS) to implement the efficient use of
More information