Dene Community School of Technology Staff Acceptable Use Policy

Size: px
Start display at page:

Download "Dene Community School of Technology Staff Acceptable Use Policy"

Transcription

1 Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers, by members of staff, is governed at all times by this Acceptable Use Policy. Please ensure you understand your responsibilities under this policy, and direct any questions or concerns to the IT Network Manager in the first instance. All members of staff have a responsibility to use the school s computer system in a professional, lawful, and ethical manner. Deliberate abuse of the school s computer system may result in disciplinary action (including possible termination), and civil and/or criminal liability. Please note that use of the school network is intended to be as permissive and flexible as possible under current UK legislation as well as local authority and DCSF guidelines. This policy is not intended to arbitrarily limit the ways in which you can use the system, but to ensure compliance with the legal responsibilities of the school and staff, to safeguard the reputation of the school, and to ensure the safety of all users. Please respect these guidelines, many of which are in place for your protection. This Acceptable Use Policy is aimed at encouraging responsible behaviour and good practice 1. Policy Statement 1.1. Dene Community School of Technology reserves the right to amend this Acceptable Use Policy, at anytime, without notice. Once amended the revised policy will be circulated to all staff via . It is your responsibility to ensure that you are up to date with such changes This Acceptable Use Policy replaces and supersedes all previous versions A copy of this document can be found on the school intranet site. 2. Network Access 2.1. All members of staff will have the opportunity to take part in the Introduction to ICT training. The training is designed to ensure correct usage of ICT equipment and network resources on site. The training will also focus on safe use of electronic resources such as the internet and to ensure compliance with this document The school reserves the right to remotely monitor user activity. The school also reserves the right to monitor all network traffic either manually or through automated software, to ensure policy compliance and to aid in resolving any issues Users should not allow any other person access to any equipment/device logged in under their own user account, unless as part of authorised work Allowing another person to use your login for any other reason is a severe breach of this Acceptable Use Policy and contravenes legislation It is imperative that members of staff protect their password(s) and computer(s) at all times. Staff must log off or lock their workstation/laptop if they are to leave it unattended for any length of time Passwords must never be divulged to anyone at anytime If it is suspected that a password has been compromised it must be changed immediately It is prohibited to copy any software or inappropriate material on to any network resource Access to the school network is only granted to school workstations/laptops. All third party workstation/laptops will need to be approved by the IT Development & Support Team before being connected to the school network The use of network resources is a privilege and inappropriate use will result in that privilege being withdrawn and other action, as appropriate taken By storing or creating any personal documents or files on the school computer system, you grant the school a non-exclusive, universal, perpetual, irrevocable, and royalty-free license to use, copy, and distribute those documents or files in any way the school sees fit.

2 3. Home Directories and Security 3.1. Each member of staff will have access to a Home Directory located on the Staff File server Staff must ensure that they do not exceed the predefined storage limit for their individual Home Directory. The current storage limit is set to 5GB (5120MB) The school reserves the right to delete any inappropriate materials found within staff Home Directories during any routine or random checks Staff must always check all files brought in on removable media (such as CDs, USB Flash Drives, and Floppy Disks etc) with the Antivirus software installed on site Removable media should only be used if it is found to be free of any virus. All incidents of infection through a Virus, Trojan or Spyware should be reported to the ICT Support and Development Team Members of staff must not store any sensitive or personal information about staff or students on any portable storage system (such as a USB memory stick, CD/DVD, portable hard disk, or personal computer) unless that storage system is encrypted and approved for such use by the school If there is a genuine reason to store any school related sensitive or personal information on a portable storage system the device must be encrypted to prohibit unauthorised access should the device be lost or stolen. In such cases members of staff must contact the ICT Support and Development Team to either be provided with an encrypted USB device or to encrypt an existing storage system. 4. Electronic mail ( ) 4.1. All members of staff will be provided with services from the school Microsoft Exchange server Members of staff are responsible for all the s they send and for any contacts made Caution should be exercised when sending confidential information via The transmission of confidential information via to unauthorised persons is strictly prohibited The use of for personal purposes is permitted but must be reasonable While Dene Community School of Technology respects the privacy of staff, where there is reason for concern, the school reserves the right to monitor and intercept communication Members of staff should only open attachments to s if they have come from someone they know and trust. Attachments can contain viruses and other programs that could destroy files and software on the computer being used as well as files and data on network servers Users who receive unsolicited mail should inform the ICT Support and Development Team who will attempt to filter/block any future s Members of staff must not send chain or unsolicited commercial (also known as SPAM) Any communication made must not bring the school into disrepute; this includes anything libellous, defamatory or criminal. 5. Social Networking Sites and Online Forums 5.1. Staff must take care when using social networking websites and online forums even when such use occurs in their own time using their own computer You must not allow pupils to access personal information you post on a social networking site or any online forums Members of staff must not add a pupil to their list of friends You should avoid contacting any pupil privately via a social networking website or Instant Messenger even for school related purposes Staff should also take care when posting to any public website that their comments do not harm their professional standing or the reputation of the school Unless authorised to do so, you must not post content on websites that may appear as if you are speaking for the school You should not post any material online that can be clearly linked to the school that may damage the school s reputation.

3 6. ICT Equipment and Suites 6.1 Staff should not move or authorise any person to move any ICT Equipment located within any ICT Suites unless as part of authorised work/repair. 6.2 Staff may not pass on any ICT Equipment to any other person. It must first be passed back to the ICT Support and Development Team so that it can be reissued. 6.3 Any equipment issued to staff remains the property of the school and must be returned upon request. The issued equipment must also be available for inspection at all reasonable times. 6.4 If a laptop is provided to members of staff it is expected that it should be brought to school on a daily basis. 6.5 Upon termination of employment at the school all equipment must be returned. 6.6 Staff are responsible for all equipment issued to them and must take reasonable precautions to protect such equipment. 6.7 Staff are responsible for all equipment and use of workstations and laptops by students during their lessons. Individual departments will be billed for any associated damage. 6.8 All shared lapsafes must be signed for before being used. The keys to the two shared lapsafes will be located in the ICT Support and Development office. 6.9 Staff must make sure that after use all laptops stored within lapsafes are connected to their individual power pack so that they can be charged ready for use again Staff must ensure that all lapsafes are locked after use and the key returned to the ICT Support and Development office Staff must ensure that students do not consume any food or drink whilst working on any ICT equipment Staff must ensure that ICT Suites are locked upon leaving the room. Students should not be allowed access to keys to ICT Suites at any time No students may be allowed to use ICT Suites without suitable supervision by a member of staff Students are only allowed to use workstations/laptops that have been configured to run under the Ranger for Networks software. Under no circumstances must a student be allowed to log on to a workstation/laptop issued to a member of staff. Allowing a student to do so constitutes a breach of this Acceptable Use Policy Before purchasing any hardware or software members of staff should consult a member of the IT Support & Development Team to check compatibility, license compliance and discuss any other implications that the purchase may have. 7. Electrical Equipment 7.1 Any mains-operated personal computer or electrical equipment used on site, for any use, is subject to a Portable Appliance Test (PAT) by site maintenance staff or the local authority. 7.2 Members of staff must not connect any electrical equipment that has not been tested. 8. Reporting Problems 8.1 Members of staff should report any problems that need the attention of the ICT Support and Development Team as soon as is feasible. Problems that seriously hinder your job or teaching and require immediate attention should be reported by telephone. All other problem must be reported via the online Help Desk that all members of staff have access to. 8.2 Data loss should be reported to the ICT Support and Development Team as soon as possible. The longer a data loss problem goes unreported, the less the chances of the data being recovered.

4 9. Internet Access Dene Community School of Technology 9.1 Dene Community School of Technology will only provide access to the Internet on receipt of a signed Acceptable Use Policy. 9.2 The use of the internet for personal purposes is permitted but must be limited to before/after school, during designated break periods and lunch time only. 9.3 All Internet access is logged for the purposes of maintaining standards of security and acceptable use. 9.4 Attempts to access inappropriate websites, websites which attempt to bypass filtering systems or personal use of the internet outside of the designated times constitutes a breach of this Acceptable Use Policy. 9.5 Inappropriate websites referred to in 9.4 include, but are not limited to any site which contains: Pornographic Material (of either a legal or illegal nature); Material which incites hatred or discrimination; Material which promotes illegal activity; Material which is in breach of the Copyright Designs and Patents Act 1998; Material which is degrading to persons or groups of persons; 9.6 Staff are required to report any website that they become aware of, which is not filtered, that is deemed inappropriate as per the criteria stated within While the school respects the privacy of its staff, where there is reason for concern, the school reserves the right to perform a detailed audit of all network activity. 9.8 Reason for concern referred to in 9.7 include, but are not limited to the following: A complaint made by a student A complaint made by a visitor to the school A complaint made by a parent/carer 9.9 A detailed audit of network activity can only be requested by a member of the Senior Management Team. The request must be made in writing and must be accompanied by documentary evidence supporting the reason for the request The audit itself can only be generated by the Network Manager. Whilst the report is being generated a member of the Senior Management Team and an elected member of staff must be present The school will keep an accurate and up to date record of all generated reports. Each time a detailed audit of network activity is created the Network Activity Audit Log must be completed and signed by the Network Manager, member of Senior Management Team and the elected member of staff While Dene Community School of Technology uses sophisticated filtering technology and takes all precautious to ensure that users only access appropriate material, it is not possible to guarantee that unsuitable material will be inaccessible. The school cannot accept liability for the material accessed, or any consequences of such access. 10. Additional Systems 10.1 Members of staff may have access to additional systems which include, but are not limited to: SIMS, Finance Software, the Durham Learning Gateway, Exam Software, the Durham Schools Extranet and Attendance Software These systems require additional passwords. It is the responsibility of the member of staff to ensure that their password has basic complexity to it and that their password is only known by them. A password with basic complexity is one that is at least 6 characters in length, which uses a combination of upper, and lower case letters, numbers and symbols.

5 11. Creation, Distribution & Publication of Digital Media 11.1 Members of staff must ensure that parental permission has been obtained before any students are photographed or filmed whilst at school or taking part in a school activity Parental permission must also be obtained before the distribution or publication of any digital media. The distribution and publication of digital media includes but is not limited to: Photos/videos published on the school website Photos/videos published on the school Virtual Learning Environment (VLE) or Intranet site Photos published within the school newsletter or other school correspondence Photos/videos stored on the school network 11.3 Members of staff can check to see if digital media can be distributed or published by viewing the Parental Permission document stored within Staff Secure (I Drive). 12. Data Protection and Freedom of Information 12.1 All information about staff will be dealt with in compliance the Data Protection Act and only given to authorised agencies Under the Freedom of Information Act 2000 all members of staff have the right to request information held on the school system regarding their network activity. Staff wishing to request such information will need to complete the Information Request form which can be found on the school intranet. 13. Legislation 13.1 All network users are bound by current relevant legislation. The applicable laws (as amended) include, but are not limited to: Computer Misuse Act 1990 Copyright Designs and Patents Act 1998 Criminal Justice Act 1988 Defamation Acts 1952 and 1996 Freedom of Information Act 2000 Human Rights Act 1998 Obscene Publications Act 1959 and 1964 Protection of Children Act 1988 Protection from Harassment Act 1997 Public Order Act 1986 Race Relations Amendment Act 2000 Telecommunications Act 1984 Data Protection Acts 1994 and 1998 Sex Discrimination Act 1986 Regulation of Investigatory Powers Act (RIPA) Staff should understand that any attempt to bypass the school, or other network security systems, including the introduction of viruses or applications of a destructive nature could lead to prosecution Where it is believed that a member of staff is in breach of legislation appropriate action will be taken

6 14. Reporting Breaches of this Policy 14.1 All members of staff have a duty to ensure this Acceptable Use Policy is followed. You must immediately inform a member of the ICT Support and Development Team, or the Senior Leadership Team, of any breaches of this policy Members of staff are required to report: Inappropriate content suspected to be stored on the computer system. Websites accessible from within school unsuitable for staff or student consumption; Breaches, or attempted breaches, of computer security. Any instance of bullying or harassment via the school computer system. 15. Sanctions In the event that this Acceptable Use Policy is breached, staff will be subject to sanctions which may include, but are not limited to: Disciplinary procedures; Temporary or permanent restriction of network access; Temporary or permanent revocation of network rights; Restriction to or denial of access to ICT Suites; Investigation under the Regulation of Investigatory Powers Act (RIPA) 2000.

7 Staff Agreement I have read and understood the for Dene Community School of Technology. I understand that should I be found in breach of the Acceptable Use Policy I may be liable to disciplinary procedures and, if appropriate, the Police and local authorities may become involved. I accept that it is my responsibility to be aware of amendments to this Acceptable Use Policy which can be found on the school s Intranet under the School Documents section. By default all members of staff agree to their image or likeness to be used on the school website, school intranet, school VLE or in any promotional material published by the school or associated agencies. If you do not wish to give your consent for you image or likeness to be used please tick the following box [ ]. Staff Name * * USE BLOCK CAPITALS Staff Signature Date DD MM YY School Agreement (To be signed by authorised members of the Senior Management Team only) I acknowledge the above named member of staff has returned a signed Acceptable Use Policy which signifies agreement to all clauses of the Acceptable Use Policy. I therefore grant access to the Internet from the date below and permit access to the school s ICT Resources under the conditions of this Policy. Staff Name * * USE BLOCK CAPITALS Authorised Signature Date DD MM YY

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Berwick Academy Policy on E Safety

Berwick Academy Policy on E Safety Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

HAZELDENE LOWER SCHOOL

HAZELDENE LOWER SCHOOL HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

E- Safety and Digital Photography - College ICT

E- Safety and Digital Photography - College ICT Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Responsible Computer Use Policy for Students

Responsible Computer Use Policy for Students Responsible Computer Use Policy for Students Introduction By using the Sheldon College Network and ICT Services students agree to accept the terms and conditions outlined in this document. This policy

More information

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs

More information

Using Public Computer Services in Somerset Libraries

Using Public Computer Services in Somerset Libraries Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which

More information

ICT Security Policy for Schools

ICT Security Policy for Schools WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of

More information

E-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy

E-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy E-Safety Policy Reviewed and Adopted: July 2014 Reviewed by: HT/ LTS Next Review: July 2015 Annual Policy 1 1. Introduction Internet is an essential element of life in 21st Century; it is also a part of

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

Acceptable Use Policy (AUP) School Computing

Acceptable Use Policy (AUP) School Computing Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

UTC Cambridge ICT Policy

UTC Cambridge ICT Policy UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

John of Rolleston Primary School

John of Rolleston Primary School John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

POLICIES AND REGULATIONS Policy #78

POLICIES AND REGULATIONS Policy #78 Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage. Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or

More information

e-safety Policy Broadclyst Community Primary School

e-safety Policy Broadclyst Community Primary School e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

How To Behave At A School

How To Behave At A School THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils

CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils Contents 1. Scope 2 2. Use of IT Facilities 2 3. Monitoring of IT Facilities 5 4. Maintenance & Repairs 6 5. Copyright and Licence Agreements

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

How To Use The School Network Safely

How To Use The School Network Safely Policy Document Information and Communication Technology and E-Safety Acceptable Use Policy Mission Statement The school is committed to the use of ICT across the curriculum and to providing all students

More information

St Vincent s Catholic Primary School e-safety Policy

St Vincent s Catholic Primary School e-safety Policy St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

How To Ensure Your School Is Safe Online

How To Ensure Your School Is Safe Online Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of

More information

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including

More information

Roskear Primary & Nursery School. E-Safety Policy

Roskear Primary & Nursery School. E-Safety Policy E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data

More information

Acceptable Use of Information Technology

Acceptable Use of Information Technology Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:

More information

EMPLOYEE COMPUTER USE POLICY

EMPLOYEE COMPUTER USE POLICY EMPLOYEE COMPUTER USE POLICY SECTION ONE PURPOSE A. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, Navigator Pointe Academy makes available

More information

School Information Security Policy

School Information Security Policy School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

COMPUTER USE POLICY City of Proctor

COMPUTER USE POLICY City of Proctor COMPUTER USE POLICY City of Proctor Purpose This policy serves to protect the security and integrity of the city s electronic communication and information systems by educating employees about appropriate

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Sample Employee Network and Internet Usage and Monitoring Policy

Sample Employee Network and Internet Usage and Monitoring Policy CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

1. Name of Document: IT Acceptable Use Policy. 2. Originator: Deputy Principal

1. Name of Document: IT Acceptable Use Policy. 2. Originator: Deputy Principal STRATEGY & POLICY COVER SHEET 1. Name of Document: IT Acceptable Use Policy 2. Originator: Deputy Principal 3. Date of Origination: Version 1 8 th February 2005 4. Academic Board Ratification: 8 th February

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Internet, Email and Computer Use Policy

Internet, Email and Computer Use Policy Policy Reference Number Internet, Email and Computer Use Policy 16 CP Responsible Department Related Policies Corporate & Community Services Code of Conduct for Elected Members, Records Management, Risk

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Simon Langton Grammar School for Boys E-Safety Policy

Simon Langton Grammar School for Boys E-Safety Policy Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,

More information

ICT Acceptable Use Policy. August 2015

ICT Acceptable Use Policy. August 2015 ICT Acceptable Use Policy August 2015 Document title ICT Acceptable Use Policy August 2015 Document author and department Responsible person and department Robbie Walker, Information Security Architect,

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0 SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY

More information

CARRAMAR PUBLIC SCHOOL

CARRAMAR PUBLIC SCHOOL CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures

More information

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.

More information

Nazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures

Nazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures Nazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures 1. Introduction Nazareth Catholic College acknowledges the increasing use of Information and Communication

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.

Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the

More information

ELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1

ELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1 ELECTRONIC MAIL (E-MAIL) September 2014 Version 3.1 Western Health and Social Care Trust Page 0 of 6 E-mail Policy V3.1 Policy Title ELECTRONIC MAIL (E-MAIL) POLICY Policy Reference Number CORP09/006 Original

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

Box Hill Senior Secondary College/MYSC

Box Hill Senior Secondary College/MYSC Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication

More information

E-Safety Policy & Procedures

E-Safety Policy & Procedures E-Safety Policy & Procedures Version Policy Originator: Equality Impact Assessed: Approved by: SMT Date Approved: April 2015 Review Interval: Annually Last Review Date: - Next Review Date: April 2016 Audience:

More information

St Edward s Church of England Academy. E-Safety Policy

St Edward s Church of England Academy. E-Safety Policy St Edward s Church of England Academy E-Safety Policy Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011 West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer

More information

WHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES

WHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES WHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES Approved: December 2014, Full Governing Body Next review due: December 2016 The key aim of the whole school ICT team is to support

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information