Purpose of School Security Cameras

Size: px
Start display at page:

Download "Purpose of School Security Cameras"

Transcription

1 Purpose of School Security Cameras Maintain Secure Schools, Buses and Facilities: A. Protect Students, Staff and Visitors Security cameras are invaluable tools that help enhance the safety of our students, staff and visitors in our District buildings and facilities. B. Deter crime in our District facilities and on District property Security cameras can serve as a visual deterrent to bullying, vandalism, unauthorized access and criminal activity; such as assaults, theft and break-ins. Activities and behavior of persons in these places are monitored. Security cameras, along with good lighting, can prevent and deter criminal activity on our school and facility parking lots. C. Help in investigations Archived surveillance footage can be used to identify individuals who have committed crimes or breached School District policies.

2 Administrative Procedure Schools and Facilities: Security Cameras PROCEDURES: 1. Installation and/or placement of Security Cameras in District Schools, School Buses and Facilities, must be reviewed by the District General Counsel and pre-approved by the Chief Operational Officer. 2. Every effort should be made to post signs on School District Property and Buses stating: WARNING - This School District Property is under 24 hour video surveillance Any offender maybe subject to disciplinary action and/or criminal reporting. 3. Only School District Administrators designated by the Superintendent as having supervisory responsibilities over the facilities, vehicles or persons involved, shall have access to the images captured by Security Camera monitoring or recording. 4. All camera recordings will be preserved for a minimum of 30 days, contingent upon preservation software. 5. All personnel with access to School District Security Cameras should be trained in the effective, legal, and ethical use of the equipment through a training program offered by the Security and Environmental Management Department and Technology Department and approved by the District General Counsel. 6. Security Camera Monitoring, Recording and Image Review must be in a manner consistent with all District Policies and Procedures and State and Federal laws. 7. When an incident is reported, the Principal or their designee should be notified immediately. 8. If the incident of interest is believed to be captured on video, the Principal will coordinate the review of the video, utilizing only authorized persons. 9. All information and/or observations made in the use of School District Security Cameras are considered confidential, and can only be used for official School District business and as allowable by federal and state law, such as Family Education Rights to Privacy Act (FERPA).

3 Administrative Procedure Schools and Facilities: Security Cameras - continued RETENTION AND RELEASE OF INFORMATION: 1. When a video is recorded, it should be retained for a period of at least 30 days, contingent upon preservation software, unless it is part of an ongoing School District or Law Enforcement investigation. Information that directly affects an investigation will be kept for a period of time determined by the Principal, Department Director, District General Counsel or the requesting Law Enforcement Agency. 2. When an incident is determined to be captured on video and is needed to be retained, a record log (see slide 4) will be kept with the retained portion of the video. The log will include, accounting for the date and time of the incident, a description of the incident, the identity of the persons captured on the video and involved in the incident, the date and time reviewed and the identity of those who participated in the review. The retained video will be maintained in a secure location, with a log reflecting date, time and identity of persons who access it. Any questions regarding the retention of these images should be directed to the District General Counsel. 3. All requests for the release of information and results obtained through Security Camera Monitoring or Recording must be submitted to the District General Counsel for approval prior to release. Personnel are prohibited from using or disseminating information acquired from School District security cameras, except for official purposes and only with District General Counsel approval. Improper release of information that is confidential potentially exposes the District to liability.

4 Surveillance Video Review Log Today s Date School/Facility Date and time of the incident Description of the incident: Identity of the persons captured in the video and involved in the incident: Date and time of review: Identity of those who participated in the review: Results of review: Location of retained video (Is this a secure location?):

5 Legal and Ethical Issues: Legal and Ethics Training Recorded images will be archived in a secure location for a specific predetermined period of time (for a minimum of 30 days, contingent upon preservation software) by the School District, and will be accessible to authorized staff on an as needed basis only. Upon expiration of the predetermined time period for storage, all recorded images will be destroyed except if they are being used as part of an ongoing investigation of criminal or School District policy violations. The alteration of previously recorded images is strictly prohibited. Information obtained from the Security Cameras shall be used exclusively for legal and enforcement related matters; including disciplinary matters. Information obtained through the use of Security Cameras may be released to persons or entities outside the School District (such as law enforcement) only when compelled by lawful means, such as a subpoena, or when approved either by the District General Counsel or by the Chief Operational Officer, and in accordance with School District Policy.

6 Legal and Ethical Issues (contin:): Audio recordings are prohibited. Tampering with tapes or other confidential information is prohibited. Security cameras may not be used in areas of the District Schools or facilities, where there is a reasonable expectation of privacy such as the following: Bathrooms Shower areas Locker and changing rooms Medical areas/clinics Security camera usage or the obtaining of images and information from such usage shall not be used for private purposes. Monitoring individuals based on protected status under law or for purposes of harassing conduct based on sexual orientation, is prohibited.

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating

More information

ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose

ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related

More information

Camera Use. Policy Statement and Purpose. Table of Contents

Camera Use. Policy Statement and Purpose. Table of Contents Camera Use Policy Type: Administrative Responsible Office: VCU Police Department Initial Policy Approved: 12/04/2015 Current Revision Approved: New Policy Statement and Purpose VCU is committed to enhancing

More information

Surveillance Equipment

Surveillance Equipment University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of

More information

Title of the Policy: Surveillance Policy

Title of the Policy: Surveillance Policy Title of the Policy: Surveillance Policy Functional Area: University Police Applies To: All Faculty and Staff Policy Reference(s): Number: Version 1.0 Date First Issued: March 15, 2016 Date Last Reviewed:

More information

MODESTO CITY SCHOOLS Administrative Regulation

MODESTO CITY SCHOOLS Administrative Regulation MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized

More information

Connecticut General Statutes, 10-221 Boards of Education to prescribe rules

Connecticut General Statutes, 10-221 Boards of Education to prescribe rules 5131.2 The Board of Education recognizes the need to maintain appropriate conduct on school buses. Accordingly, the Board of Education authorizes the installation of video cameras which produce both video

More information

Policy on Public and School Bus Closed Circuit Television Systems (CCTV)

Policy on Public and School Bus Closed Circuit Television Systems (CCTV) DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version

More information

4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS

4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS 4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS Computers, computer networks, Internet access, and E-mail are effective and important technological resources in today's

More information

CROMWELL PUBLIC SCHOOLS. Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised:

CROMWELL PUBLIC SCHOOLS. Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised: CROMWELL PUBLIC SCHOOLS 4118.5 BOARD OF EDUCATION POLICY Personnel Certified and Non-Certified Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised: POLICY REGARDING

More information

University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version

University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version V.D. Closed Circuit Television Monitoring and Recording of Public Areas for Safety and Security Purposes (Source:

More information

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same POLICY TEMPLATE Video Surveillance Category: Approval: Responsibility: Date: Operations PVP VP Finance and Administration Date initially approved: November 5, 2013 Date of last revision: same Definitions:

More information

TOLLAND PUBLIC SCHOOLS Tolland, Connecticut

TOLLAND PUBLIC SCHOOLS Tolland, Connecticut TOLLAND PUBLIC SCHOOLS Tolland, Connecticut ADMINISTRATIVE REGULATION REGARDING: Employee Use of the District s Computer Systems Number: 4110 Administrative Approved: 2/28/01 Revised: 4/26/06 Revised:

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Community Lifestyle Support Inc.

Community Lifestyle Support Inc. HUMAN SERVICES QUALITY FRAMEWORK STANDARDS DOCUMENT REFERENCE: Q:/6 WORKPLACE SURVEILLANCE POLICY DATE REVIEWED: August 2014 NEXT REVIEW DATE: August 2015 AUTHORISATION: Management Committee STANDARD REFERENCE:

More information

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students. POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive

More information

NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises)

NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises) NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises) A. NMSU Entities requesting security cameras will be required to follow the procedures outlined below. 1. Justification

More information

CCTV Cameras Policy. Policy Guidelines

CCTV Cameras Policy. Policy Guidelines CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes

More information

Student & Staff Access and Use of Networked Information Resources and Communications

Student & Staff Access and Use of Networked Information Resources and Communications Page 1 of 6 These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive and effective digital citizenship among students and staff. Digital

More information

Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications

Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.

More information

Code No.: PS 708 03/09. Video Surveillance Procedures

Code No.: PS 708 03/09. Video Surveillance Procedures Video Surveillance Procedures CONTENTS: Definition of Terms Purchase, Installation, and Maintenance of Surveillance Cameras and Equipment Location for Use/Operation of Surveillance Cameras Access and Use

More information

POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS

POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS Computers, computer networks, electronic devices, Internet access, and e-mail are effective and important

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

13.19 ETHICS REPORTING POLICY AND PROCEDURE

13.19 ETHICS REPORTING POLICY AND PROCEDURE 13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment

More information

Mobile Audio/Video Recorder Policy

Mobile Audio/Video Recorder Policy Mobile Audio/Video Recorder Policy 446.1 PURPOSE AND SCOPE The Fort Collins Police Services has equipped selected vehicles and officers with a Mobile Audio/Video Recording (MAV) system and also allows

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy I. Introduction Each employee, student or non-student user of Greenville County Schools (GCS) information system is expected to be familiar with and follow the expectations and requirements

More information

LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO

LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles

More information

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology

More information

Westmoreland Intermediate Unit Internet Acceptable Use Policy

Westmoreland Intermediate Unit Internet Acceptable Use Policy Westmoreland Intermediate Unit Internet Acceptable Use Policy Overview: The Westmoreland Intermediate Unit provides Internet access to administrators, teachers, and students in the school districts of

More information

How To Use A Community And Surveillance Camera

How To Use A Community And Surveillance Camera 12.538 SURVEILLANCE CAMERAS AND COMMUNITY CAMERAS Reference: Procedure 12.715 - Property and Evidence: Accountability, Processing, Storage, and Release Definitions: Surveillance cameras are used to monitor

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

Lawlink NSW: Guide to the Workplace Video Surveillance Act

Lawlink NSW: Guide to the Workplace Video Surveillance Act Guide to the Workplace Video Surveillance Act A Guide to the Workplace Video Surveillance Act 1998 (NSW) Privacy NSW February 2002 CONTENTS The Workplace Video Surveillance Act 1998 Coverage of the Act

More information

A Practical Approach to Video Surveillance Technology San Diego Metropolitan Transit System

A Practical Approach to Video Surveillance Technology San Diego Metropolitan Transit System A Practical Approach to Video Surveillance Technology San Diego Metropolitan Transit System Karen Landers San Diego Metropolitan Transit System 1255 Imperial Avenue, Suite 1000 San Diego, CA 92101 (619)

More information

ATA College 10180-10200 Linn Station Road Suite Louisville, Kentucky 40223 (502) 371-8330 Consumer Disclosure Information

ATA College 10180-10200 Linn Station Road Suite Louisville, Kentucky 40223 (502) 371-8330 Consumer Disclosure Information ATA College 10180-10200 Linn Station Road Suite Louisville, Kentucky 40223 (502) 371-8330 Consumer Disclosure Information Accreditation & Licensure Net Price Calculator Transfer & Bypass Credit Policy

More information

Stanford University Video Surveillance System Guidelines

Stanford University Video Surveillance System Guidelines Stanford University Video Surveillance System Guidelines Effective Date: May 1, 2014 Stanford University / Video Surveillance System Guidelines Page 1 Video Surveillance System Guidelines Statement All

More information

STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION

STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION Access to modern information technology is essential to the state university mission

More information

ESI Incident Response Procedures 1

ESI Incident Response Procedures 1 ESI Incident Response Procedures 1 Core Document Approval Date, USNH Legal Counsel: 2/12/2010 Core Document Approval Date, UNH CIO: Pending Objectives 1. Understand which policies, procedures and laws

More information

STUDENT BULLYING PREVENTION AND INTERVENTION

STUDENT BULLYING PREVENTION AND INTERVENTION 0115 STUDENT BULLYING PREVENTION AND INTERVENTION The Board of Education is committed to providing an educational and working environment that promotes respect, dignity and equality. The Board recognizes

More information

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

Surveillance Camera Calgary North - One Executive Place Calgary, Alberta

Surveillance Camera Calgary North - One Executive Place Calgary, Alberta Calgary North - One Executive Place Calgary, Alberta FINAL REPORT November 2007 Submitted by: Alberta Employment, Immigration Calgary North - One Executive Place Canada Alberta Service Centre In consultation

More information

OIPC GUIDELINES FOR THE USE OF VIDEO SURVEILLANCE SYSTEMS IN SCHOOLS

OIPC GUIDELINES FOR THE USE OF VIDEO SURVEILLANCE SYSTEMS IN SCHOOLS OIPC GUIDELINES FOR THE USE OF VIDEO SURVEILLANCE SYSTEMS IN SCHOOLS February 13, 2013 TABLE OF CONTENTS Page Introduction... 1 Applicability of Guidelines... 2 ATIPPA... 3 Definitions... 5 Collection

More information

Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools

Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of

More information

EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS

EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

Security Camera Questions and Answers 11/28/11

Security Camera Questions and Answers 11/28/11 Security Camera Questions and Answers 11/28/11 1. Can someone FOIL request the videos? No. They are not public records as the meet the student records (FERPA) and health and safety exception of FOIL. 2.

More information

APPENDIX C. HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative)

APPENDIX C. HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative) APPENDIX C HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative) This section of the Code of Conduct has been adapted from the Greenfield Public

More information

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...

More information

POLICY 5111 ANTI-BULLYING/HARASSMENT/HATE

POLICY 5111 ANTI-BULLYING/HARASSMENT/HATE POLICY 5111 Purpose/Introduction: The Kenosha Unified School District strives to provide a safe, secure and respectful learning environment for all students in school buildings, on school grounds, in school

More information

One-to-One Technology Initiative Table of Contents

One-to-One Technology Initiative Table of Contents One-to-One Technology Initiative Table of Contents 1. Acceptable Use... 2-4 General Staff Responsibilities Parent and Guardian Responsibilities User Responsibilities Consequences 2. ipad Identification

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

Corporate Policy and Procedure

Corporate Policy and Procedure Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install

More information

COBAR SHIRE COUNCIL FILE:P5-90

COBAR SHIRE COUNCIL FILE:P5-90 COBAR SHIRE COUNCIL WORKPLACE SURVEILLANCE POLICY FILE:P5-90 Table of Contents POLICY STATEMENT... 3 INTRODUCTION 3 POLICY RESPONSIBILITIES 4 DEFINITIONS.. 5 REASONS AND REQUIREMENTS FOR SURVEILLANCE...

More information

RIVERVIEW SCHOOL DISTRICT

RIVERVIEW SCHOOL DISTRICT No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK

More information

POLICY FOR SCHOOL RESOURCE OFFICERS Resolution 07 5-18 School Committee Approval May 22, 2007

POLICY FOR SCHOOL RESOURCE OFFICERS Resolution 07 5-18 School Committee Approval May 22, 2007 POLICY FOR SCHOOL RESOURCE OFFICERS Resolution 07 5-18 School Committee Approval May 22, 2007 SUMMARY This Policy will state the purposes of the School Resource Officer (SRO) Program, and give specific

More information

Virginia Commonwealth University Police Department

Virginia Commonwealth University Police Department Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media

More information

Anchor Bay Schools Software Policy

Anchor Bay Schools Software Policy Anchor Bay Schools Software Policy Table of Contents 1. Statement of Ethics... Page 1 2. Purchasing and Acquisition... Page 1 3. Registration... Page 1 4. Installation of Software... Page 2 5. Individual

More information

Kalispell Social Media Use Policy

Kalispell Social Media Use Policy This policy approved by Council as an amendment to the City of Kalispell Personnel Handbook on April 20, 2015 (Resolution 5716). Purpose The purpose of this policy is to guide city employees in the proper,

More information

HIGH SCHOOL FOR RECORDING ARTS

HIGH SCHOOL FOR RECORDING ARTS Adopted Revised High School for Recording Arts Bullying Prohibition Policy 1. Purpose Students have the right to be safe and free from threatening situations on school property and at school activities

More information

Descriptor Code: EFE-P

Descriptor Code: EFE-P ADMINISTRATIVE PROCEDURE Descriptor Term: ACCEPTABLE USE OF ELECTRONIC TRANSMISSION CAPABILITIES Descriptor Code: EFE-P Date Issued: October 30, 2003 Date Changed June 26, 2008 September 30, 2009 1. Network

More information

4600 EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS

4600 EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS 4600 EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS Computers, computer networks, Internet access, and e-mail are effective and important technological resources in today's educational environment. The

More information

INTERNET COMPUTER USAGE Access to Electronic Media. Internet safety measures shall be maintained that effectively address the following:

INTERNET COMPUTER USAGE Access to Electronic Media. Internet safety measures shall be maintained that effectively address the following: File: IJND INTERNET COMPUTER USAGE Access to Electronic Media The Committee supports the right of students, employees, and community members to have reasonable access to various types of online information

More information

SURVEILLANCE AND PRIVACY

SURVEILLANCE AND PRIVACY info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act

More information

Introduction. General Use

Introduction. General Use Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use

More information

Queensland Taxi Security Camera Program Changes

Queensland Taxi Security Camera Program Changes Queensland Taxi Security Camera Program Changes Frequently Asked Questions GENERAL INFORMATION 1. What is the taxi security camera program? It is a program administered by the Department of Transport and

More information

University of Essex Automatic Number Plate Recognition (ANPR) Policy

University of Essex Automatic Number Plate Recognition (ANPR) Policy & Standards for ANPR Operation at The University of Essex (Colchester Campus) Index 1. Introduction 1.1 System Description 1.2 Purpose of the System 1.3 Operating Principles 1.4 To Whom this Document Applies

More information

Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D

Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D 1. PURPOSE SWC owns and operates a variety of computing systems which are provided for the use of the Sisseton Wahpeton

More information

Rowan University Data Governance Policy

Rowan University Data Governance Policy Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data

More information

1. What acts and behavior constitute sexual harassment, including the fact that sexual harassment could occur between people of the same gender.

1. What acts and behavior constitute sexual harassment, including the fact that sexual harassment could occur between people of the same gender. STUDENTS CORONA-NORCO UNIFIED SCHOOL DISTRICT 5475 STUDENT RECORDS/RIGHTS RESOLUTION OF STUDENT GRIEVANCES PROHIBITION OF SEXUAL HARASSMENT The Governing Board is committed to maintaining an educational

More information

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

OHIO TECHNICAL CENTER AT VANTAGE CAMPUS SAFETY AND SECURITY

OHIO TECHNICAL CENTER AT VANTAGE CAMPUS SAFETY AND SECURITY CAMPUS SAFETY POLICIES OHIO TECHNICAL CENTER AT VANTAGE CAMPUS SAFETY AND SECURITY Campus policies regarding the reporting of criminal actions and emergencies: Vantage students and employees will report

More information

SAS TRUSTEE CORPORATION ( STC )

SAS TRUSTEE CORPORATION ( STC ) SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...

More information

Ethical and Responsible Use of EagleNet 03/26/14 AMW

Ethical and Responsible Use of EagleNet 03/26/14 AMW Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY - 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,

More information

FORT WORTH POLICE DEPARTMENT Officer-Worn Digital Recording Devices Standard Operating Procedure

FORT WORTH POLICE DEPARTMENT Officer-Worn Digital Recording Devices Standard Operating Procedure FORT WORTH POLICE DEPARTMENT Officer-Worn Digital Recording Devices Standard Operating Procedure Original December 16, 2013 Revised March 7, 2014 SCOPE Officer-worn digital recording devices are an effective

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and

More information

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY Effective August 24, 2004 Overview: The Fresno County Employees Retirement Association (FCERA) provides access to the Internet

More information

OIPC Guidelines for Video Surveillance by Public Bodies in Newfoundland and Labrador, June 2015 ATIPPA, 2015 Criminal Code of Canada

OIPC Guidelines for Video Surveillance by Public Bodies in Newfoundland and Labrador, June 2015 ATIPPA, 2015 Criminal Code of Canada PURPOSE: To enhance protection for employees and visitors, strengthen security of infrastructure/town facilities and assist law enforcement agencies with investigations. AUTHORITY: OIPC Guidelines for

More information

College of the Canyons Web Site Development Guidelines

College of the Canyons Web Site Development Guidelines College of the Canyons Web Site Development Guidelines These guidelines define the requirements and recommendations of web sites that are hosted on the College of the Canyons web server. These guidelines

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

Acalanes Union HSD Board Policy Sexual Harassment

Acalanes Union HSD Board Policy Sexual Harassment Acalanes Union HSD Board Policy Sexual Harassment BP 5145.7 Students The Governing Board is committed to maintaining a safe school environment that is free from harassment and discrimination. The Board

More information

How To Resolve A Complaint Of Discrimination In The United States

How To Resolve A Complaint Of Discrimination In The United States ANN ARBOR PUBLIC SCHOOLS TITLE IX GRIEVANCE PROCEDURES PURPOSE: The purpose of these procedures is to secure, at the lowest possible level, prompt and equitable resolutions of complaints based on sex discrimination,

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

VIDEO SURVEILLANCE GUIDELINES

VIDEO SURVEILLANCE GUIDELINES VIDEO SURVEILLANCE GUIDELINES Introduction Surveillance of public spaces has increased rapidly over recent years. This growth is largely attributed to the significant advances in surveillance technology

More information

LONG ISLAND UNIVERSITY RECORDS RETENTION POLICY

LONG ISLAND UNIVERSITY RECORDS RETENTION POLICY LONG ISLAND UNIVERSITY RECORDS RETENTION POLICY Statement of Policy Long Island University requires the retention of University records for specific periods of time, regardless of format, taking into account

More information

Chicago State University Computer Usage Policy

Chicago State University Computer Usage Policy Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services

More information

Preparing to Serve: Online Training Modules

Preparing to Serve: Online Training Modules Preparing to Serve: Online Training Modules MASSEN, A. AND KOWALEWSKI, B. (EDS.) COPYRIGHT 2010. WEBER STATE UNIVERSITY PREPARING TO SERVE: ONLINE TRAINING MODULES PROFESSIONALISM CULTURAL SENSITIVITY

More information

COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY

COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY 1 The COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) a consortium of the Colusa County Office of Education (CCOE) with Colusa Unified School District, Maxwell Unified School District, Williams Unified School

More information

K-20 Network Acceptable Use Guidelines/Internet Safety Requirements

K-20 Network Acceptable Use Guidelines/Internet Safety Requirements Page 1 of 5 K-20 Network Acceptable Use Guidelines/Internet Safety Requirements These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT Policy Bulletin

LOS ANGELES UNIFIED SCHOOL DISTRICT Policy Bulletin TITLE: NUMBER: ISSUER: Incident System Tracking Accountability Report (ISTAR) BUL-5269.2 Michelle King, Senior Deputy Superintendent School Operations Earl R. Perkins, Assistant Superintendent School Operations

More information

Computing and Network Use Policy

Computing and Network Use Policy Computing and Network Use Policy Category: University Area Date Established: Responsible Office: Office of the Chief Information Officer Date Last Revised: - 3/26/2007 Responsible Executive: CIO Date Posted

More information

WORKPLACE VIOLENCE POLICY

WORKPLACE VIOLENCE POLICY WORKPLACE VIOLENCE POLICY SUNY Canton is committed to providing a safe work environment for all employees that is free from intimidation, threats, and violent acts. The college will respond promptly to

More information

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing

More information

Cal Poly Information Security Program

Cal Poly Information Security Program Policy History Date October 5, 2012 October 5, 2010 October 19, 2004 July 8, 2004 May 11, 2004 January May 2004 December 8, 2003 Action Modified Separation or Change of Employment section to address data

More information

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4 Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User

More information