1 ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day operations and longer term planning objectives. St Michael s College policy is to take any measures it considers necessary to ensure that all aspects of the system are fully protected. POLICY APPLICATION The Information and Communication Technology (ICT) Policy and Procedure applies to all staff and students. It is designed to protect individual data, corporate data, programmes, hardware and the network as a resource for the entire organisation. The following procedure and guidance sets out the rules and behaviours expected from all staff and students who manage and use the systems. PROCEDURE Overall ICT security is the responsibility of the Business Manager reporting to the Principal The computers and network/internet facilities given to staff and students are to assist them in performance of their work. Staff and students are permitted access only to those parts of the computer system which they need in order to do their normal duties or studies. Levels of access will be decided by the Business Manager in consultation with the Principal. New permanent staff and all students will be questioned on their computer experience and will be given a copy of the ICT Policy and Procedure at their induction. Temporary staff will be checked in as much detail as possible before they are allowed access to the computer system. All such agency staff will be given a copy of the ICT Policy and Procedure. All staff and students will be trained in the use of St Michael s College computer resources as and when study or job requirements dictate. Access to the computer resources will only be gained through the use of a personal password. Such passwords must not be given to any other person and must be changed regularly. Passwords will only be issued on receipt of a signed Acknowledgement of ICT Policy and Procedure. Those members of staff or students who have access to personal sensitive data must not divulge such information to a third party other than where directed by the Principal or the Police. All software used on St Michael s College computers must be authorised by the Business Manager. Under no circumstances may any other software be installed. Staff and students should not have an expectation of privacy in anything created, stored, sent or received via the computer facilities. Without prior notice the Principal may review any material created, stored, sent or received on St Michael s College network through the internet, through or any individual computer. No game playing is permitted on College computers. Computer storage devices from external sources must be checked for viruses before use. Files saved to external storage devices internally are the responsibility of the staff member who must store them in a secure place.
2 MISUSE Misuse of St Michael s College computer resources is a serious disciplinary offence. The following are examples of misuse: fraud and theft; system sabotage; introduction of viruses; use of unauthorised software; use of system for game playing; excessive use of facilities for private purposes; breaches of the Data Protection Act; sending abusive, rude or defamatory messages via ; hacking; breach of the policy and procedure. This list is not exhaustive. Depending upon the circumstances of each case, misuse of the computer system is likely to be considered gross misconduct punishable by dismissal. Misuse amounting to criminal activity may be reported to the police. All breeches of computer security must be referred to the Business Manager. Any member of staff or student who suspects that a colleague of whatever seniority is abusing the computer system may speak in confidence to the Principal or the Business Manager. Staff and students are given access to the internet and facilities. St Michael s College expects its staff and students to restrict personal use of these facilities to a minimum. Duty of care Staff and students should endeavour to make each electronic communication truthful and accurate. You should use the same care in drafting and other electronic documents as you would for any other written communication. Duty not to waste computer resources Staff and students must not deliberately perform acts that waste computer resources or unfairly monopolise resources to the exclusion of others. These acts include, but are not limited to, sending mass mailings or chain letters, spending excessive amounts of time streaming music or film, printing multiple copies of personal documents, or otherwise creating unnecessary network traffic. Audio, video, and picture files require significant storage space; for personal files, please make use of external storage such as flash drives and memory sticks or online storage (e.g. Flickr or Dropbox). Large file transfers and attachments Staff and students at St Michael s College use the same connections to send and receive e- mail. The time that the line is tied up for is directly in proportion to the size of the plus its attachment. A normal message may be about 1-25kb in size. However, a video clip or picture could be typically 10Mb or more in size and could tie up the line for some minutes, stopping business- from coming in or going out. This is not acceptable. Staff and students who persistently send personal s with large attachments may be disconnected from the facility. Data Protection implications There are Data Protection implications in the electronic transfer of information and files containing personal information. is a quick and convenient way to transfer data, but it is governed by the Data Protection Act in exactly the same way as other computer files.
3 Apply the same qualitative judgement to sending information by as you would do by any other means of communication. Altering attribution information Staff and students must not alter the From: line or other attribution-of-origin information in communications. Anonymous or pseudonymous electronic communications are forbidden. Staff and students must identify themselves honestly and accurately when sending or otherwise communicating by . No expectation of privacy You should never consider your electronic communications to be either private or secure. may be stored indefinitely on any number of computers, including that of the recipient. Copies of your messages may be forwarded to others either electronically or on paper. In addition, sent to non-existent or incorrect usernames may be delivered to persons that you never intended. Expectation of a reply is a speedy means of communication and there is an expectation by the sender of a prompt reply far quicker than by conventional mail. Try to respond within a few hours rather than days, even if it is a holding acknowledgement awaiting a fuller reply. Monitoring of computer usage St Michael s College have the right to monitor any and all aspects of its computer system, including, but not limited to, monitoring sites visited by staff and students on the internet, reviewing material downloaded or uploaded by staff and students to the internet, and reviewing sent and received by staff and students. Prohibited activities Material that is fraudulent, harassing, embarrassing, sexually explicit, profane, obscene, intimidating, defamatory or otherwise unlawful or inappropriate must not be sent by or other form of electronic communication (social networking, newsgroups, chat groups), downloaded from the internet, or displayed on or stored on the organisation s computers. Staff and students encountering or receiving this kind of material should immediately report the incident to the Principal or the Business Manager. Our connections to the Internet To ensure security and avoid the spread of viruses, staff and students accessing the internet through a computer attached to the network must do so through the system installed by St Michael s College which uses our approved internet firewall and virus scanning software. This is there for the protection of the network against viruses and unauthorised hacking. Accessing the internet directly by modem is strictly prohibited unless the computer you are using is not connected to the network at the time (e.g. a laptop computer in use outside the office). Virus detection Files obtained from outside sources including files downloaded from the internet, newsgroups, social networking, or other online services; files attached to ; and files provided by customers or vendors, all may contain dangerous computer viruses that could damage the network. This includes files on storage devices such as DVD ROMS or flash
4 drives brought from home or downloaded onto a laptop away from St Michael s College. Staff and students must never use storage devices from non-company sources without first scanning the material with ICT department-approved virus checking software. If you suspect that a virus has been introduced onto the network, notify the Business Manager immediately. Use of encryption software Staff and students must not install or use encryption software on any computer. INTERNET Disclaimer of liability for use of Internet St Michael s College is not responsible for material viewed or downloaded by staff and students from the internet. Staff and students are cautioned that there are pages on the internet that include offensive, sexually explicit, and inappropriate material. Even innocuous search requests may lead to sites with highly offensive content. In addition, having an address on the internet may lead to receipt of unsolicited containing offensive content. Staff and students accessing the internet do so at their own risk. Accessing inappropriate Internet sites Whilst at St Michael s College, staff and students have a duty to conduct themselves in a manner that is appropriate to the culture, aims and objectives of the College. Deliberate accessing of offensive, pornographic or other inappropriate web-sites for personal gratification using the organisation s equipment and internet address is not in keeping with the nature of St Michael s College. Visiting such web-sites leaves a trail that the site owners can trace back to the organisation and the resulting publicity could be highly embarrassing for the College and the Church. Such activities are likely to be considered as gross misconduct. There are occasions when some staff and students may, in the course of their work, require to access otherwise undesirable web-sites. In such cases the member of staff or student involved must clear this in advance with the Principal, who will in turn liaise with the Business Manager. Blocking any inappropriate Internet site The college may use software to identify and block inappropriate or sexually explicit internet sites. However, you may, nonetheless, encounter inappropriate or sexually explicit material while browsing on the internet. If you do, immediately disconnect from the site and report the matter to the Principal or the Business Manager. Illegal copying Staff and students must not illegally copy material protected under copyright law or make that material available to others for copying. You are responsible for complying with copyright law and applicable licences that may apply to software, files, graphics, documents, messages, and other material you wish to download or copy. Violations of this policy will be taken seriously and may result in disciplinary action, including disconnection from the and/or the internet system and, in serious or repeated cases, possible termination of employment.
5 ACKNOWLEDGEMENT OF ICT POLICY This form is used to acknowledge receipt of, and compliance with, St Michael s College ICT Policy and Procedure. PROCEDURE Complete the following steps: 1. Read the ICT Policy and Procedure 2. Sign and date in the spaces provided below 3. Return this page only to Reception SIGNATURE By signing below, I agree to the following terms: i. I have received and read a copy of the ICT Policy and Procedure and understand the same. ii. I understand and agree that any computers, software, and storage media provided to me by the organisation contain proprietary and confidential information about St Michael's College and its activities, and that this is and remains the property of St Michael's College at all times. iii. I agree that I shall not copy, duplicate (except for backup purposes as part of my job or studies here at St Michael's College), otherwise disclose, or allow anyone else to copy or duplicate any of this information or software. iv. I agree that if I leave St Michael s College for any reason, I shall immediately return the original and copies of any and all software, computer materials, or computer equipment that I may have received from the College that is either in my possession or otherwise directly or indirectly under my control. Staff/Student signature.. Staff/Student name Date STUDENT / STAFF (please circle) If you are a student this form should be countersigned by your group tutor. If you are a member of staff this form should be signed by the Principal or the Business Manager. Countersignature Countersignature name... Job Title (if appropriate)... Date......
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
Information Security Policy The purpose of this Policy is to describe the procedures and processes in place to ensure the secure and safe use of the federation s network and its resources and to protect
Policy Document Information and Communication Technology and E-Safety Acceptable Use Policy Mission Statement The school is committed to the use of ICT across the curriculum and to providing all students
Information and ICT Security Policy Care Excellence Partnership Updated May 2011 Due for review July 2012 Senior Information Risk Owner (SIRO) P. Tilson I:drive/Policies/Information and ICT Security Status
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
Information Technology Policies and Procedures Wakulla County School District March 2014 Table of contents TABLE OF CONTENTS... 1 1.0 OVERVIEW... 2 2.0 PURPOSE... 2 3.0 SCOPE... 2 4.0 ACCEPTABLE USE POLICY...
Poplar Street Primary School ICT Security and Acceptable Use Policy E-Safety policy 2013/14 Working Together Aiming High! 1 Contents 1. Introduction... 3 2. Policy Objectives... 3 3. Application... 3 4.
Internet & Cell Phone Usage Policy The Internet usage Policy applies to all Internet & Cell phone users (individuals working for the company, including permanent full-time and part-time employees, contract
Jefferson County School District Information Technology Policies and Procedures 575 S. Water Street Monticello, FL 32344 (850) 342-0100 www.jeffersonschooldistrict.org June 2014 Table of Contents 1.0 Overview...
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Bringing Your Acceptable Use Policy Up to 2013 Standards Bringing Your Acceptable Use Policy Up to 2013 Standards Organizations of all sizes rely on their employees to be good stewards of company time,
AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1
Data Security Policy Member of Staff Responsible ICT Team Author: Sunil Pindoria Dated 03/02/2015 Date of next review 03/02/2016 Page 1 CONTENTS INTRODUCTION... 3 MONITORING... 4 BREACHES... 5 DATA SECURITY...
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
The Archbishop s Seminary Information Security Policy 1 Contents PURPOSE... 4 SCOPE... 4 POLICY STATEMENTS... 5 INFORMATION SECURITY POLICY... 5 THE SCHOOL S RIGHT TO ACCESS ITS PROPERTY... 5 THE SCHOOL
ST. MARGARET CLITHEROW ROMAN CATHOLIC PRIMARY SCHOOL www.clitherow.herts.sch.uk email@example.com E-SAFETY POLICY Ownership: Curriculum Committee Document Date: October 2012 Review Date: October
Information Systems Acceptable Use Policy (covers ILT/ICT/IS*) You are expected to read, understand & sign this policy as a condition of your use of Wiltshire College systems. This policy is in place to
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
NORTHWEST OHIO COMPUTER ASSOCIATION PROGRAM OF THE NORTHERN BUCKEYE EDUCATION COUNCIL NETWORK MANAGEMENT SECURITY POLICY The Board of Directors and staff of the Northwest Ohio Computer Association Program
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
St. Johns River State College 3.11 Technology 3.11.1 Account Management Computer accounts are the means used to grant access to SJR STATE Information Resources. These accounts provide a means of providing
Location: The Juilliard School Irene Diamond Building Main Office Room: 248 Phone: 212-799-5000 ext. 7121 Email: firstname.lastname@example.org Website: Information Technology Computer Labs There are two computer