Purpose of School Security Cameras
|
|
- Jack Walsh
- 7 years ago
- Views:
Transcription
1 Purpose of School Security Cameras Maintain Secure Schools, Buses and Facilities: A. Protect Students, Staff and Visitors Security cameras are invaluable tools that help enhance the safety of our students, staff and visitors in our District buildings and facilities. B. Deter crime in our District facilities and on District property Security cameras can serve as a visual deterrent to bullying, vandalism, unauthorized access and criminal activity; such as assaults, theft and break-ins. Activities and behavior of persons in these places are monitored. Security cameras, along with good lighting, can prevent and deter criminal activity on our school and facility parking lots. C. Help in investigations Archived surveillance footage can be used to identify individuals who have committed crimes or breached School District policies.
2 Administrative Procedure Schools and Facilities: Security Cameras PROCEDURES: 1. Installation and/or placement of Security Cameras in District Schools, School Buses and Facilities, must be reviewed by the District General Counsel and pre-approved by the Chief Operational Officer. 2. Every effort should be made to post signs on School District Property and Buses stating: WARNING - This School District Property is under 24 hour video surveillance Any offender maybe subject to disciplinary action and/or criminal reporting. 3. Only School District Administrators designated by the Superintendent as having supervisory responsibilities over the facilities, vehicles or persons involved, shall have access to the images captured by Security Camera monitoring or recording. 4. All camera recordings will be preserved for a minimum of 30 days, contingent upon preservation software. 5. All personnel with access to School District Security Cameras should be trained in the effective, legal, and ethical use of the equipment through a training program offered by the Security and Environmental Management Department and Technology Department and approved by the District General Counsel. 6. Security Camera Monitoring, Recording and Image Review must be in a manner consistent with all District Policies and Procedures and State and Federal laws. 7. When an incident is reported, the Principal or their designee should be notified immediately. 8. If the incident of interest is believed to be captured on video, the Principal will coordinate the review of the video, utilizing only authorized persons. 9. All information and/or observations made in the use of School District Security Cameras are considered confidential, and can only be used for official School District business and as allowable by federal and state law, such as Family Education Rights to Privacy Act (FERPA).
3 Administrative Procedure Schools and Facilities: Security Cameras - continued RETENTION AND RELEASE OF INFORMATION: 1. When a video is recorded, it should be retained for a period of at least 30 days, contingent upon preservation software, unless it is part of an ongoing School District or Law Enforcement investigation. Information that directly affects an investigation will be kept for a period of time determined by the Principal, Department Director, District General Counsel or the requesting Law Enforcement Agency. 2. When an incident is determined to be captured on video and is needed to be retained, a record log (see slide 4) will be kept with the retained portion of the video. The log will include, accounting for the date and time of the incident, a description of the incident, the identity of the persons captured on the video and involved in the incident, the date and time reviewed and the identity of those who participated in the review. The retained video will be maintained in a secure location, with a log reflecting date, time and identity of persons who access it. Any questions regarding the retention of these images should be directed to the District General Counsel. 3. All requests for the release of information and results obtained through Security Camera Monitoring or Recording must be submitted to the District General Counsel for approval prior to release. Personnel are prohibited from using or disseminating information acquired from School District security cameras, except for official purposes and only with District General Counsel approval. Improper release of information that is confidential potentially exposes the District to liability.
4 Surveillance Video Review Log Today s Date School/Facility Date and time of the incident Description of the incident: Identity of the persons captured in the video and involved in the incident: Date and time of review: Identity of those who participated in the review: Results of review: Location of retained video (Is this a secure location?):
5 Legal and Ethical Issues: Legal and Ethics Training Recorded images will be archived in a secure location for a specific predetermined period of time (for a minimum of 30 days, contingent upon preservation software) by the School District, and will be accessible to authorized staff on an as needed basis only. Upon expiration of the predetermined time period for storage, all recorded images will be destroyed except if they are being used as part of an ongoing investigation of criminal or School District policy violations. The alteration of previously recorded images is strictly prohibited. Information obtained from the Security Cameras shall be used exclusively for legal and enforcement related matters; including disciplinary matters. Information obtained through the use of Security Cameras may be released to persons or entities outside the School District (such as law enforcement) only when compelled by lawful means, such as a subpoena, or when approved either by the District General Counsel or by the Chief Operational Officer, and in accordance with School District Policy.
6 Legal and Ethical Issues (contin:): Audio recordings are prohibited. Tampering with tapes or other confidential information is prohibited. Security cameras may not be used in areas of the District Schools or facilities, where there is a reasonable expectation of privacy such as the following: Bathrooms Shower areas Locker and changing rooms Medical areas/clinics Security camera usage or the obtaining of images and information from such usage shall not be used for private purposes. Monitoring individuals based on protected status under law or for purposes of harassing conduct based on sexual orientation, is prohibited.
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
More informationST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related
More informationCamera Use. Policy Statement and Purpose. Table of Contents
Camera Use Policy Type: Administrative Responsible Office: VCU Police Department Initial Policy Approved: 12/04/2015 Current Revision Approved: New Policy Statement and Purpose VCU is committed to enhancing
More informationSurveillance Equipment
University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of
More informationTitle of the Policy: Surveillance Policy
Title of the Policy: Surveillance Policy Functional Area: University Police Applies To: All Faculty and Staff Policy Reference(s): Number: Version 1.0 Date First Issued: March 15, 2016 Date Last Reviewed:
More informationMODESTO CITY SCHOOLS Administrative Regulation
MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized
More informationConnecticut General Statutes, 10-221 Boards of Education to prescribe rules
5131.2 The Board of Education recognizes the need to maintain appropriate conduct on school buses. Accordingly, the Board of Education authorizes the installation of video cameras which produce both video
More informationPolicy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
More information4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS
4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS Computers, computer networks, Internet access, and E-mail are effective and important technological resources in today's
More informationCROMWELL PUBLIC SCHOOLS. Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised:
CROMWELL PUBLIC SCHOOLS 4118.5 BOARD OF EDUCATION POLICY Personnel Certified and Non-Certified Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised: POLICY REGARDING
More informationUniversity of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version V.D. Closed Circuit Television Monitoring and Recording of Public Areas for Safety and Security Purposes (Source:
More informationPOLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same
POLICY TEMPLATE Video Surveillance Category: Approval: Responsibility: Date: Operations PVP VP Finance and Administration Date initially approved: November 5, 2013 Date of last revision: same Definitions:
More informationTOLLAND PUBLIC SCHOOLS Tolland, Connecticut
TOLLAND PUBLIC SCHOOLS Tolland, Connecticut ADMINISTRATIVE REGULATION REGARDING: Employee Use of the District s Computer Systems Number: 4110 Administrative Approved: 2/28/01 Revised: 4/26/06 Revised:
More informationMedford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
More informationCommunity Lifestyle Support Inc.
HUMAN SERVICES QUALITY FRAMEWORK STANDARDS DOCUMENT REFERENCE: Q:/6 WORKPLACE SURVEILLANCE POLICY DATE REVIEWED: August 2014 NEXT REVIEW DATE: August 2015 AUTHORISATION: Management Committee STANDARD REFERENCE:
More information2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
More informationNMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises)
NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises) A. NMSU Entities requesting security cameras will be required to follow the procedures outlined below. 1. Justification
More informationCCTV Cameras Policy. Policy Guidelines
CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes
More informationStudent & Staff Access and Use of Networked Information Resources and Communications
Page 1 of 6 These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive and effective digital citizenship among students and staff. Digital
More informationClear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
More informationCode No.: PS 708 03/09. Video Surveillance Procedures
Video Surveillance Procedures CONTENTS: Definition of Terms Purchase, Installation, and Maintenance of Surveillance Cameras and Equipment Location for Use/Operation of Surveillance Cameras Access and Use
More informationPOLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS
POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS Computers, computer networks, electronic devices, Internet access, and e-mail are effective and important
More informationHIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
More information13.19 ETHICS REPORTING POLICY AND PROCEDURE
13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment
More informationMobile Audio/Video Recorder Policy
Mobile Audio/Video Recorder Policy 446.1 PURPOSE AND SCOPE The Fort Collins Police Services has equipped selected vehicles and officers with a Mobile Audio/Video Recording (MAV) system and also allows
More informationAcceptable Use Policy
Acceptable Use Policy I. Introduction Each employee, student or non-student user of Greenville County Schools (GCS) information system is expected to be familiar with and follow the expectations and requirements
More informationLONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles
More information51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
More informationWestmoreland Intermediate Unit Internet Acceptable Use Policy
Westmoreland Intermediate Unit Internet Acceptable Use Policy Overview: The Westmoreland Intermediate Unit provides Internet access to administrators, teachers, and students in the school districts of
More informationHow To Use A Community And Surveillance Camera
12.538 SURVEILLANCE CAMERAS AND COMMUNITY CAMERAS Reference: Procedure 12.715 - Property and Evidence: Accountability, Processing, Storage, and Release Definitions: Surveillance cameras are used to monitor
More informationStandard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
More informationLawlink NSW: Guide to the Workplace Video Surveillance Act
Guide to the Workplace Video Surveillance Act A Guide to the Workplace Video Surveillance Act 1998 (NSW) Privacy NSW February 2002 CONTENTS The Workplace Video Surveillance Act 1998 Coverage of the Act
More informationA Practical Approach to Video Surveillance Technology San Diego Metropolitan Transit System
A Practical Approach to Video Surveillance Technology San Diego Metropolitan Transit System Karen Landers San Diego Metropolitan Transit System 1255 Imperial Avenue, Suite 1000 San Diego, CA 92101 (619)
More informationATA College 10180-10200 Linn Station Road Suite Louisville, Kentucky 40223 (502) 371-8330 Consumer Disclosure Information
ATA College 10180-10200 Linn Station Road Suite Louisville, Kentucky 40223 (502) 371-8330 Consumer Disclosure Information Accreditation & Licensure Net Price Calculator Transfer & Bypass Credit Policy
More informationStanford University Video Surveillance System Guidelines
Stanford University Video Surveillance System Guidelines Effective Date: May 1, 2014 Stanford University / Video Surveillance System Guidelines Page 1 Video Surveillance System Guidelines Statement All
More informationSTATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION
STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION Access to modern information technology is essential to the state university mission
More informationESI Incident Response Procedures 1
ESI Incident Response Procedures 1 Core Document Approval Date, USNH Legal Counsel: 2/12/2010 Core Document Approval Date, UNH CIO: Pending Objectives 1. Understand which policies, procedures and laws
More informationSTUDENT BULLYING PREVENTION AND INTERVENTION
0115 STUDENT BULLYING PREVENTION AND INTERVENTION The Board of Education is committed to providing an educational and working environment that promotes respect, dignity and equality. The Board recognizes
More informationPROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationSurveillance Camera Calgary North - One Executive Place Calgary, Alberta
Calgary North - One Executive Place Calgary, Alberta FINAL REPORT November 2007 Submitted by: Alberta Employment, Immigration Calgary North - One Executive Place Canada Alberta Service Centre In consultation
More informationOIPC GUIDELINES FOR THE USE OF VIDEO SURVEILLANCE SYSTEMS IN SCHOOLS
OIPC GUIDELINES FOR THE USE OF VIDEO SURVEILLANCE SYSTEMS IN SCHOOLS February 13, 2013 TABLE OF CONTENTS Page Introduction... 1 Applicability of Guidelines... 2 ATIPPA... 3 Definitions... 5 Collection
More informationInformation and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools
Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of
More informationEXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,
More informationInformation Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
More informationSecurity Camera Questions and Answers 11/28/11
Security Camera Questions and Answers 11/28/11 1. Can someone FOIL request the videos? No. They are not public records as the meet the student records (FERPA) and health and safety exception of FOIL. 2.
More informationAPPENDIX C. HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative)
APPENDIX C HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative) This section of the Code of Conduct has been adapted from the Greenfield Public
More informationHealth Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
More informationPOLICY 5111 ANTI-BULLYING/HARASSMENT/HATE
POLICY 5111 Purpose/Introduction: The Kenosha Unified School District strives to provide a safe, secure and respectful learning environment for all students in school buildings, on school grounds, in school
More informationOne-to-One Technology Initiative Table of Contents
One-to-One Technology Initiative Table of Contents 1. Acceptable Use... 2-4 General Staff Responsibilities Parent and Guardian Responsibilities User Responsibilities Consequences 2. ipad Identification
More informationSOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
More informationTECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
More informationPINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
More informationCorporate Policy and Procedure
Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install
More informationCOBAR SHIRE COUNCIL FILE:P5-90
COBAR SHIRE COUNCIL WORKPLACE SURVEILLANCE POLICY FILE:P5-90 Table of Contents POLICY STATEMENT... 3 INTRODUCTION 3 POLICY RESPONSIBILITIES 4 DEFINITIONS.. 5 REASONS AND REQUIREMENTS FOR SURVEILLANCE...
More informationRIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
More informationPOLICY FOR SCHOOL RESOURCE OFFICERS Resolution 07 5-18 School Committee Approval May 22, 2007
POLICY FOR SCHOOL RESOURCE OFFICERS Resolution 07 5-18 School Committee Approval May 22, 2007 SUMMARY This Policy will state the purposes of the School Resource Officer (SRO) Program, and give specific
More informationVirginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
More informationAnchor Bay Schools Software Policy
Anchor Bay Schools Software Policy Table of Contents 1. Statement of Ethics... Page 1 2. Purchasing and Acquisition... Page 1 3. Registration... Page 1 4. Installation of Software... Page 2 5. Individual
More informationKalispell Social Media Use Policy
This policy approved by Council as an amendment to the City of Kalispell Personnel Handbook on April 20, 2015 (Resolution 5716). Purpose The purpose of this policy is to guide city employees in the proper,
More informationHIGH SCHOOL FOR RECORDING ARTS
Adopted Revised High School for Recording Arts Bullying Prohibition Policy 1. Purpose Students have the right to be safe and free from threatening situations on school property and at school activities
More informationDescriptor Code: EFE-P
ADMINISTRATIVE PROCEDURE Descriptor Term: ACCEPTABLE USE OF ELECTRONIC TRANSMISSION CAPABILITIES Descriptor Code: EFE-P Date Issued: October 30, 2003 Date Changed June 26, 2008 September 30, 2009 1. Network
More information4600 EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS
4600 EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS Computers, computer networks, Internet access, and e-mail are effective and important technological resources in today's educational environment. The
More informationINTERNET COMPUTER USAGE Access to Electronic Media. Internet safety measures shall be maintained that effectively address the following:
File: IJND INTERNET COMPUTER USAGE Access to Electronic Media The Committee supports the right of students, employees, and community members to have reasonable access to various types of online information
More informationSURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
More informationIntroduction. General Use
Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use
More informationQueensland Taxi Security Camera Program Changes
Queensland Taxi Security Camera Program Changes Frequently Asked Questions GENERAL INFORMATION 1. What is the taxi security camera program? It is a program administered by the Department of Transport and
More informationUniversity of Essex Automatic Number Plate Recognition (ANPR) Policy
& Standards for ANPR Operation at The University of Essex (Colchester Campus) Index 1. Introduction 1.1 System Description 1.2 Purpose of the System 1.3 Operating Principles 1.4 To Whom this Document Applies
More informationInformation Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D
Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D 1. PURPOSE SWC owns and operates a variety of computing systems which are provided for the use of the Sisseton Wahpeton
More informationRowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
More information1. What acts and behavior constitute sexual harassment, including the fact that sexual harassment could occur between people of the same gender.
STUDENTS CORONA-NORCO UNIFIED SCHOOL DISTRICT 5475 STUDENT RECORDS/RIGHTS RESOLUTION OF STUDENT GRIEVANCES PROHIBITION OF SEXUAL HARASSMENT The Governing Board is committed to maintaining an educational
More informationwelcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building
More informationFINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
More informationOHIO TECHNICAL CENTER AT VANTAGE CAMPUS SAFETY AND SECURITY
CAMPUS SAFETY POLICIES OHIO TECHNICAL CENTER AT VANTAGE CAMPUS SAFETY AND SECURITY Campus policies regarding the reporting of criminal actions and emergencies: Vantage students and employees will report
More informationSAS TRUSTEE CORPORATION ( STC )
SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...
More informationEthical and Responsible Use of EagleNet 03/26/14 AMW
Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of
More informationAPPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES
APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,
More informationBLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
More informationFORT WORTH POLICE DEPARTMENT Officer-Worn Digital Recording Devices Standard Operating Procedure
FORT WORTH POLICE DEPARTMENT Officer-Worn Digital Recording Devices Standard Operating Procedure Original December 16, 2013 Revised March 7, 2014 SCOPE Officer-worn digital recording devices are an effective
More informationMARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
More informationIowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and
More informationFRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY
FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY Effective August 24, 2004 Overview: The Fresno County Employees Retirement Association (FCERA) provides access to the Internet
More informationOIPC Guidelines for Video Surveillance by Public Bodies in Newfoundland and Labrador, June 2015 ATIPPA, 2015 Criminal Code of Canada
PURPOSE: To enhance protection for employees and visitors, strengthen security of infrastructure/town facilities and assist law enforcement agencies with investigations. AUTHORITY: OIPC Guidelines for
More informationCollege of the Canyons Web Site Development Guidelines
College of the Canyons Web Site Development Guidelines These guidelines define the requirements and recommendations of web sites that are hosted on the College of the Canyons web server. These guidelines
More informationLINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
More informationAcalanes Union HSD Board Policy Sexual Harassment
Acalanes Union HSD Board Policy Sexual Harassment BP 5145.7 Students The Governing Board is committed to maintaining a safe school environment that is free from harassment and discrimination. The Board
More informationHow To Resolve A Complaint Of Discrimination In The United States
ANN ARBOR PUBLIC SCHOOLS TITLE IX GRIEVANCE PROCEDURES PURPOSE: The purpose of these procedures is to secure, at the lowest possible level, prompt and equitable resolutions of complaints based on sex discrimination,
More informationCity of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
More informationVIDEO SURVEILLANCE GUIDELINES
VIDEO SURVEILLANCE GUIDELINES Introduction Surveillance of public spaces has increased rapidly over recent years. This growth is largely attributed to the significant advances in surveillance technology
More informationLONG ISLAND UNIVERSITY RECORDS RETENTION POLICY
LONG ISLAND UNIVERSITY RECORDS RETENTION POLICY Statement of Policy Long Island University requires the retention of University records for specific periods of time, regardless of format, taking into account
More informationChicago State University Computer Usage Policy
Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services
More informationPreparing to Serve: Online Training Modules
Preparing to Serve: Online Training Modules MASSEN, A. AND KOWALEWSKI, B. (EDS.) COPYRIGHT 2010. WEBER STATE UNIVERSITY PREPARING TO SERVE: ONLINE TRAINING MODULES PROFESSIONALISM CULTURAL SENSITIVITY
More informationCOLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY
1 The COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) a consortium of the Colusa County Office of Education (CCOE) with Colusa Unified School District, Maxwell Unified School District, Williams Unified School
More informationK-20 Network Acceptable Use Guidelines/Internet Safety Requirements
Page 1 of 5 K-20 Network Acceptable Use Guidelines/Internet Safety Requirements These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive
More informationLOS ANGELES UNIFIED SCHOOL DISTRICT Policy Bulletin
TITLE: NUMBER: ISSUER: Incident System Tracking Accountability Report (ISTAR) BUL-5269.2 Michelle King, Senior Deputy Superintendent School Operations Earl R. Perkins, Assistant Superintendent School Operations
More informationComputing and Network Use Policy
Computing and Network Use Policy Category: University Area Date Established: Responsible Office: Office of the Chief Information Officer Date Last Revised: - 3/26/2007 Responsible Executive: CIO Date Posted
More informationWORKPLACE VIOLENCE POLICY
WORKPLACE VIOLENCE POLICY SUNY Canton is committed to providing a safe work environment for all employees that is free from intimidation, threats, and violent acts. The college will respond promptly to
More informationSUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
More informationCal Poly Information Security Program
Policy History Date October 5, 2012 October 5, 2010 October 19, 2004 July 8, 2004 May 11, 2004 January May 2004 December 8, 2003 Action Modified Separation or Change of Employment section to address data
More informationGuidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4
Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User
More information