1 Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers, by members of staff, is governed at all times by this Acceptable Use Policy. Please ensure you understand your responsibilities under this policy, and direct any questions or concerns to the IT Network Manager in the first instance. All members of staff have a responsibility to use the school s computer system in a professional, lawful, and ethical manner. Deliberate abuse of the school s computer system may result in disciplinary action (including possible termination), and civil and/or criminal liability. Please note that use of the school network is intended to be as permissive and flexible as possible under current UK legislation as well as local authority and DCSF guidelines. This policy is not intended to arbitrarily limit the ways in which you can use the system, but to ensure compliance with the legal responsibilities of the school and staff, to safeguard the reputation of the school, and to ensure the safety of all users. Please respect these guidelines, many of which are in place for your protection. This Acceptable Use Policy is aimed at encouraging responsible behaviour and good practice 1. Policy Statement 1.1. Dene Community School of Technology reserves the right to amend this Acceptable Use Policy, at anytime, without notice. Once amended the revised policy will be circulated to all staff via . It is your responsibility to ensure that you are up to date with such changes This Acceptable Use Policy replaces and supersedes all previous versions A copy of this document can be found on the school intranet site. 2. Network Access 2.1. All members of staff will have the opportunity to take part in the Introduction to ICT training. The training is designed to ensure correct usage of ICT equipment and network resources on site. The training will also focus on safe use of electronic resources such as the internet and to ensure compliance with this document The school reserves the right to remotely monitor user activity. The school also reserves the right to monitor all network traffic either manually or through automated software, to ensure policy compliance and to aid in resolving any issues Users should not allow any other person access to any equipment/device logged in under their own user account, unless as part of authorised work Allowing another person to use your login for any other reason is a severe breach of this Acceptable Use Policy and contravenes legislation It is imperative that members of staff protect their password(s) and computer(s) at all times. Staff must log off or lock their workstation/laptop if they are to leave it unattended for any length of time Passwords must never be divulged to anyone at anytime If it is suspected that a password has been compromised it must be changed immediately It is prohibited to copy any software or inappropriate material on to any network resource Access to the school network is only granted to school workstations/laptops. All third party workstation/laptops will need to be approved by the IT Development & Support Team before being connected to the school network The use of network resources is a privilege and inappropriate use will result in that privilege being withdrawn and other action, as appropriate taken By storing or creating any personal documents or files on the school computer system, you grant the school a non-exclusive, universal, perpetual, irrevocable, and royalty-free license to use, copy, and distribute those documents or files in any way the school sees fit.
2 3. Home Directories and Security 3.1. Each member of staff will have access to a Home Directory located on the Staff File server Staff must ensure that they do not exceed the predefined storage limit for their individual Home Directory. The current storage limit is set to 5GB (5120MB) The school reserves the right to delete any inappropriate materials found within staff Home Directories during any routine or random checks Staff must always check all files brought in on removable media (such as CDs, USB Flash Drives, and Floppy Disks etc) with the Antivirus software installed on site Removable media should only be used if it is found to be free of any virus. All incidents of infection through a Virus, Trojan or Spyware should be reported to the ICT Support and Development Team Members of staff must not store any sensitive or personal information about staff or students on any portable storage system (such as a USB memory stick, CD/DVD, portable hard disk, or personal computer) unless that storage system is encrypted and approved for such use by the school If there is a genuine reason to store any school related sensitive or personal information on a portable storage system the device must be encrypted to prohibit unauthorised access should the device be lost or stolen. In such cases members of staff must contact the ICT Support and Development Team to either be provided with an encrypted USB device or to encrypt an existing storage system. 4. Electronic mail ( ) 4.1. All members of staff will be provided with services from the school Microsoft Exchange server Members of staff are responsible for all the s they send and for any contacts made Caution should be exercised when sending confidential information via The transmission of confidential information via to unauthorised persons is strictly prohibited The use of for personal purposes is permitted but must be reasonable While Dene Community School of Technology respects the privacy of staff, where there is reason for concern, the school reserves the right to monitor and intercept communication Members of staff should only open attachments to s if they have come from someone they know and trust. Attachments can contain viruses and other programs that could destroy files and software on the computer being used as well as files and data on network servers Users who receive unsolicited mail should inform the ICT Support and Development Team who will attempt to filter/block any future s Members of staff must not send chain or unsolicited commercial (also known as SPAM) Any communication made must not bring the school into disrepute; this includes anything libellous, defamatory or criminal. 5. Social Networking Sites and Online Forums 5.1. Staff must take care when using social networking websites and online forums even when such use occurs in their own time using their own computer You must not allow pupils to access personal information you post on a social networking site or any online forums Members of staff must not add a pupil to their list of friends You should avoid contacting any pupil privately via a social networking website or Instant Messenger even for school related purposes Staff should also take care when posting to any public website that their comments do not harm their professional standing or the reputation of the school Unless authorised to do so, you must not post content on websites that may appear as if you are speaking for the school You should not post any material online that can be clearly linked to the school that may damage the school s reputation.
3 6. ICT Equipment and Suites 6.1 Staff should not move or authorise any person to move any ICT Equipment located within any ICT Suites unless as part of authorised work/repair. 6.2 Staff may not pass on any ICT Equipment to any other person. It must first be passed back to the ICT Support and Development Team so that it can be reissued. 6.3 Any equipment issued to staff remains the property of the school and must be returned upon request. The issued equipment must also be available for inspection at all reasonable times. 6.4 If a laptop is provided to members of staff it is expected that it should be brought to school on a daily basis. 6.5 Upon termination of employment at the school all equipment must be returned. 6.6 Staff are responsible for all equipment issued to them and must take reasonable precautions to protect such equipment. 6.7 Staff are responsible for all equipment and use of workstations and laptops by students during their lessons. Individual departments will be billed for any associated damage. 6.8 All shared lapsafes must be signed for before being used. The keys to the two shared lapsafes will be located in the ICT Support and Development office. 6.9 Staff must make sure that after use all laptops stored within lapsafes are connected to their individual power pack so that they can be charged ready for use again Staff must ensure that all lapsafes are locked after use and the key returned to the ICT Support and Development office Staff must ensure that students do not consume any food or drink whilst working on any ICT equipment Staff must ensure that ICT Suites are locked upon leaving the room. Students should not be allowed access to keys to ICT Suites at any time No students may be allowed to use ICT Suites without suitable supervision by a member of staff Students are only allowed to use workstations/laptops that have been configured to run under the Ranger for Networks software. Under no circumstances must a student be allowed to log on to a workstation/laptop issued to a member of staff. Allowing a student to do so constitutes a breach of this Acceptable Use Policy Before purchasing any hardware or software members of staff should consult a member of the IT Support & Development Team to check compatibility, license compliance and discuss any other implications that the purchase may have. 7. Electrical Equipment 7.1 Any mains-operated personal computer or electrical equipment used on site, for any use, is subject to a Portable Appliance Test (PAT) by site maintenance staff or the local authority. 7.2 Members of staff must not connect any electrical equipment that has not been tested. 8. Reporting Problems 8.1 Members of staff should report any problems that need the attention of the ICT Support and Development Team as soon as is feasible. Problems that seriously hinder your job or teaching and require immediate attention should be reported by telephone. All other problem must be reported via the online Help Desk that all members of staff have access to. 8.2 Data loss should be reported to the ICT Support and Development Team as soon as possible. The longer a data loss problem goes unreported, the less the chances of the data being recovered.
4 9. Internet Access Dene Community School of Technology 9.1 Dene Community School of Technology will only provide access to the Internet on receipt of a signed Acceptable Use Policy. 9.2 The use of the internet for personal purposes is permitted but must be limited to before/after school, during designated break periods and lunch time only. 9.3 All Internet access is logged for the purposes of maintaining standards of security and acceptable use. 9.4 Attempts to access inappropriate websites, websites which attempt to bypass filtering systems or personal use of the internet outside of the designated times constitutes a breach of this Acceptable Use Policy. 9.5 Inappropriate websites referred to in 9.4 include, but are not limited to any site which contains: Pornographic Material (of either a legal or illegal nature); Material which incites hatred or discrimination; Material which promotes illegal activity; Material which is in breach of the Copyright Designs and Patents Act 1998; Material which is degrading to persons or groups of persons; 9.6 Staff are required to report any website that they become aware of, which is not filtered, that is deemed inappropriate as per the criteria stated within While the school respects the privacy of its staff, where there is reason for concern, the school reserves the right to perform a detailed audit of all network activity. 9.8 Reason for concern referred to in 9.7 include, but are not limited to the following: A complaint made by a student A complaint made by a visitor to the school A complaint made by a parent/carer 9.9 A detailed audit of network activity can only be requested by a member of the Senior Management Team. The request must be made in writing and must be accompanied by documentary evidence supporting the reason for the request The audit itself can only be generated by the Network Manager. Whilst the report is being generated a member of the Senior Management Team and an elected member of staff must be present The school will keep an accurate and up to date record of all generated reports. Each time a detailed audit of network activity is created the Network Activity Audit Log must be completed and signed by the Network Manager, member of Senior Management Team and the elected member of staff While Dene Community School of Technology uses sophisticated filtering technology and takes all precautious to ensure that users only access appropriate material, it is not possible to guarantee that unsuitable material will be inaccessible. The school cannot accept liability for the material accessed, or any consequences of such access. 10. Additional Systems 10.1 Members of staff may have access to additional systems which include, but are not limited to: SIMS, Finance Software, the Durham Learning Gateway, Exam Software, the Durham Schools Extranet and Attendance Software These systems require additional passwords. It is the responsibility of the member of staff to ensure that their password has basic complexity to it and that their password is only known by them. A password with basic complexity is one that is at least 6 characters in length, which uses a combination of upper, and lower case letters, numbers and symbols.
5 11. Creation, Distribution & Publication of Digital Media 11.1 Members of staff must ensure that parental permission has been obtained before any students are photographed or filmed whilst at school or taking part in a school activity Parental permission must also be obtained before the distribution or publication of any digital media. The distribution and publication of digital media includes but is not limited to: Photos/videos published on the school website Photos/videos published on the school Virtual Learning Environment (VLE) or Intranet site Photos published within the school newsletter or other school correspondence Photos/videos stored on the school network 11.3 Members of staff can check to see if digital media can be distributed or published by viewing the Parental Permission document stored within Staff Secure (I Drive). 12. Data Protection and Freedom of Information 12.1 All information about staff will be dealt with in compliance the Data Protection Act and only given to authorised agencies Under the Freedom of Information Act 2000 all members of staff have the right to request information held on the school system regarding their network activity. Staff wishing to request such information will need to complete the Information Request form which can be found on the school intranet. 13. Legislation 13.1 All network users are bound by current relevant legislation. The applicable laws (as amended) include, but are not limited to: Computer Misuse Act 1990 Copyright Designs and Patents Act 1998 Criminal Justice Act 1988 Defamation Acts 1952 and 1996 Freedom of Information Act 2000 Human Rights Act 1998 Obscene Publications Act 1959 and 1964 Protection of Children Act 1988 Protection from Harassment Act 1997 Public Order Act 1986 Race Relations Amendment Act 2000 Telecommunications Act 1984 Data Protection Acts 1994 and 1998 Sex Discrimination Act 1986 Regulation of Investigatory Powers Act (RIPA) Staff should understand that any attempt to bypass the school, or other network security systems, including the introduction of viruses or applications of a destructive nature could lead to prosecution Where it is believed that a member of staff is in breach of legislation appropriate action will be taken
6 14. Reporting Breaches of this Policy 14.1 All members of staff have a duty to ensure this Acceptable Use Policy is followed. You must immediately inform a member of the ICT Support and Development Team, or the Senior Leadership Team, of any breaches of this policy Members of staff are required to report: Inappropriate content suspected to be stored on the computer system. Websites accessible from within school unsuitable for staff or student consumption; Breaches, or attempted breaches, of computer security. Any instance of bullying or harassment via the school computer system. 15. Sanctions In the event that this Acceptable Use Policy is breached, staff will be subject to sanctions which may include, but are not limited to: Disciplinary procedures; Temporary or permanent restriction of network access; Temporary or permanent revocation of network rights; Restriction to or denial of access to ICT Suites; Investigation under the Regulation of Investigatory Powers Act (RIPA) 2000.
7 Staff Agreement I have read and understood the for Dene Community School of Technology. I understand that should I be found in breach of the Acceptable Use Policy I may be liable to disciplinary procedures and, if appropriate, the Police and local authorities may become involved. I accept that it is my responsibility to be aware of amendments to this Acceptable Use Policy which can be found on the school s Intranet under the School Documents section. By default all members of staff agree to their image or likeness to be used on the school website, school intranet, school VLE or in any promotional material published by the school or associated agencies. If you do not wish to give your consent for you image or likeness to be used please tick the following box [ ]. Staff Name * * USE BLOCK CAPITALS Staff Signature Date DD MM YY School Agreement (To be signed by authorised members of the Senior Management Team only) I acknowledge the above named member of staff has returned a signed Acceptable Use Policy which signifies agreement to all clauses of the Acceptable Use Policy. I therefore grant access to the Internet from the date below and permit access to the school s ICT Resources under the conditions of this Policy. Staff Name * * USE BLOCK CAPITALS Authorised Signature Date DD MM YY
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Location: The Juilliard School Irene Diamond Building Main Office Room: 248 Phone: 212-799-5000 ext. 7121 Email: firstname.lastname@example.org Website: Information Technology Computer Labs There are two computer
Delgado Community College Information Technology Security Policy Approved: *November 5, 2010 ) Delgado Community College IT Security Policy Page 2 *November 5, 2010 Table of Contents Title Page 1.0 Introduction
Guideline Cyber-safety: Keeping Children Safe in a Connected World This document is currently under review. Please direct any queries regarding this document to the policy officer listed in Table 1. Insert
INFORMATION TECHNOLOGY User Standards and Guidelines Manual May 2010 Division of Information Technology http://www.palmbeachschools.org/it/security.asp Table of Contents 1. Introduction... 4 2. Definitions...
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Data breach notification guide: A guide to handling personal information security breaches August 2014 The Office of the Australian Information Commissioner (OAIC) was established on 1 November 2010 by
Mediacom Online Internet Access Service Customer and User Agreement The following are terms and conditions for use of Internet access and related services offered to residential, business and other subscribers
Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
Terms and Conditions of Use For BlackBerry Community Forum Important: These Terms and Conditions of Use ( Terms and Condition of Use ) govern your use of the BlackBerry Community Forum located at http://supportforums.blackberry.com
Reducing the Cyber Risk in 10 Critical Areas Information Risk Management Regime Establish a governance framework Enable and support risk management across the organisation. Determine your risk appetite
Data protection Subject access code of practice Dealing with requests from individuals for personal information Contents 3 Contents 1. About this code of practice 4 Purpose of the code 4 Who should use
CUSTOMERS BANK ONLINE & MOBILE BANKING ACCESS AGREEMENT 1) Scope of Agreement 2) Definitions 3) Terms and Conditions of Online Banking A. Requirements B. Online Banking Services - General C. Electronic
Marist College Information Security Policy February 2005 INTRODUCTION... 3 PURPOSE OF INFORMATION SECURITY POLICY... 3 INFORMATION SECURITY - DEFINITION... 4 APPLICABILITY... 4 ROLES AND RESPONSIBILITIES...
Cyber Security Planning Guide The below entities collaborated in the creation of this guide. This does not constitute or imply an endorsement by the FCC of any commercial product, service or enterprise
USONYX PTE LTD Unmanaged Service Agreement Page 1 PARTIES A. WHEREAS, USONYX provides hosting service(s); B. WHEREAS, Client desires USONYX to provide hosting service(s); C. WHEREAS, Client agrees to Acceptable
Your Current Account Terms NatWest Personal & Private Current Account Terms Personal & Private Current Account Fees & Interest Rates Helping you get the most from your Personal & Private NatWest Current
New York State Office of the State Comptroller Division of Local Government and School Accountability LOCAL GOVERNMENT MANAGEMENT GUIDE Information Technology Governance Thomas P. DiNapoli State Comptroller
On the Record A Practical Guide to Information Privacy 3 rd Edition On the Record 3rd edition Published by the Office of the Privacy Commissioner 2011 1st Edition 1999 2nd Edition 2000 PO Box 10094 Level
Guidance for Safer Working Practice for Adults who work with Children and Young People in Education settings. Guidance for Safer Working Practice for Adults who work with Children and Young People in Education
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)
IT Security & Audit Policy Page 1 of 91 Prepared by: - Department Of IT, Govt. Of NCT Of Delhi Prakash Kumar - Special Secretary (IT) Sajeev Maheshwari - System Analyst CDAC, Noida Anuj Kumar Jain - Consultant
VA Privacy and Information Security Awareness and Rules of Behavior FY14 Text-Only Course Transcript Table of Contents Table of Contents... 0 Purpose of this Document... 3 Using this Document... 3 Module