POLICY MANUAL. Purpose
|
|
|
- Harry Blake
- 10 years ago
- Views:
Transcription
1 POLICY MANUAL POLICY IT_101 Page 1 of 7 Last Revision Date: September 14, 2011 Effective Date: April 15, 2002 Section Subject Title Computer Network/Internet/Information Resources Usage Purpose Computing resources at Louisiana Delta Community College are provided for the use of students, faculty and staff to help carry out the mission of the College. The College encourages and promotes uses of computing and network resources by the College community that support this mission. Computer systems/electronic information systems include all computer based hardware, and software owned by the College, any communications hardware and software provided by the College for the purpose of accessing its computers, any computer network governed in part or whole by the College. Louisiana Delta Community College generally provides users access to computer services such as electronic mail and the Internet 24-hours a day, seven days a week. (The College reserves the right to bring these services down for maintenance as needed.) Because of the nature of some of this information, access to it must be limited. However, because of Delta s role as a state-supported educational institution, it is the College's obligation to make suitable information available to both its internal and external constituents. Because of these potential conflicting needs -- limiting access to information and making information widely available -- it is the obligation of faculty, staff and students to make use of computer and Internet resources responsibly, ethically and legally. General Scope The College Department of MIS/IT shall have final authority over all data processing systems, information technologies and networks associated with LDCC, including the authority to access, evaluate and/or suspend the operation of a data processing system or network associated with Louisiana Delta Community College.
2 LDCC Network/internet General Guidelines and Usage Policies General Guidelines 1. The College Network is defined to include any and all computer-based communications facilities, which are owned or operated under the supervision of Louisiana Delta Community College. 2. The College Network is for use by authorized persons legitimately affiliated with LDCC, consistent with and in the course of their official work, study and/or research. 3. The LDCC Network Administrator or the Department Head of the MIS/IT must approve all physical connections/modifications to the College Network. 4. The LDCC Department head of the MIS/IT must approve any computer related hardware and software, before purchase. Any purchase requisition related to computer related hardware or software must first have the approval of the Department Head of the MIS/IT before purchase can be made. 5. Any wiring being installed by College personnel or by a contractor must follow current wiring standards. The Network Administrator or the Department Head of the MIS/IT will oversee all contract work on the network. Payment for such work will not be rendered until the Network Administrator or Department Head of MIS/IT approves the work. 6. Access to non default shares must be approved by the user s department head and if needed consent of the owner of that share. 7. Requests for new technology (i.e. new computers, printers or software) must come from the user s department head. Usage Policies The computers, lines, servers, wiring and all components of the system belong to the State of Louisiana and are paid for by the taxpayers. None are to be used to individually benefit an individual except in pursuit of his/her official business for the State. Individual groups or projects within LDCC may adopt more restrictive network usage policies that apply to their sub-networks and personnel within their area. Acceptable Uses: 1. Communication for professional development, to maintain current or to collaborate in research and education. 2. The publication of information via the Internet s World Wide Web (WWW), File Transfer Protocol (FTP), or similar techniques with proof of the Department of MIS/IT
3 3. Other administrative communications or activities in direct support of LDCC projects and missions. Prohibited Uses include: 1. Use for personal or for-profit activities, such as a personal business. 2. Use by friends, family members, relatives, or others not officially affiliated with and authorized by the College. The LDCC networks, including its dial-in lines, are not available as a substitute for private Internet service providers. 3. Any use that is likely, or intended, to cause unauthorized network disruption, system failure or information loss. 4. Any use related to achieving, enabling or hiding unauthorized access to systems, software or information either within or outside LDCC. 5. Direct connection to a College device via an outside internet service provider (ISP). 6. Bypassing or building a conduit through the College firewall. 7. Any use which violates LDCC Administrative Policies. 8. Accessing or downloading any child pornography materials. Violation of these rules will result in immediate suspension from LDCC. 9. Accessing or downloading sexually explicit materials. The violation of these rules may result in disciplinary review. In such a review, the full range of disciplinary sanction is available including the loss of computer use privileges, dismissal from the College and/or legal action. 10. An individual s computer use privileges may be suspended immediately upon discovery of a possible violation of these policies. Information resources usage policies Any user of College information resources who is found to have purposely or recklessly violated any of the following policies will be subject to disciplinary action up to and including discharge, dismissal, expulsion and/or legal action.
4 Integrity of Information Resources 1. Modification or Removal of Equipment: Technology users, including faculty, students and staff, may not in anyway modify or remove computer or network equipment, software, or peripherals that are owned by the College without proper authorizations. Absolutely no modification may be made to any computer, or peripheral, or network device without the permission of the Department of MIS/IT. 2. Encroachment on Access and Use: Computer users must not encroach on others appropriate access to, or use of, College computer or network devices. This includes but is not limited to: the sending of chain letters or excessive messages, either locally or offcampus; printing excess copies of documents, files, data or programs; running grossly inefficient programs when efficient alternatives are known by the user to be available; unauthorized modification of system facilities, operating systems or disk partitions; attempting to crash or tie up a College computer or network and damaging or vandalizing College property. 3. Unauthorized or Destructive Programs: Computer users must not intentionally develop or use programs which disrupt network or computer use, or which access private or restricted portions of a system and/or damage the software or hardware components of a system. Computer users must use great care to ensure that they do not use programs or utilities that interfere with other computer users or which modify normally protected or restricted portions of the system or user accounts. Computer users must not use network links for any use other than those permitted in the network guidelines. 4. Academic Pursuits: The College recognizes the value of research on computer security and the investigation of self-replicating code. The College may restrict such activities in order to protect College and individual computing environments, but in doing so will take into account legitimate academic pursuits. Passwords Use of passwords shall conform to the following requirements: 1. Passwords shall be kept confidential. 2. Twelve character minimum length and expire every 105 days. 3. Categories of password complexity shall contain at least 3 of the 4 categories: English upper case characters (A-Z), English lower case characters (a-z), Base 10 digits (0-9), and non-alphanumeric characters (e.g. %,&,!). 4. Passwords shall not be kept on paper or stored in plain text format. 5. All passwords shall be changed whenever it is determined that a system s security may have been compromised. 6. The cycling or re-use of passwords shall be reasonably limited. Applicable devices and application systems shall maintain a password history file to prevent continual re-use of the same passwords or group of passwords for a valid user-id (with 3 being the minimum number of previous passwords checked).
5 Distribution Lists We have set up the list to include all Delta Employees. Main Distribution Lists MainCampus, Tallulah and Lake Providence s employees at the Main Campus. s employees at the Margaret Surles Campus s employees at the Tallulah Campus s current adjuncts at all locations. These will not be sent an using the list. These distribution lists are to be used for work related purposes or LA Delta sponsored events only. They are not be used to promote events or fundraisers not associated with Delta. If a user sends an to any large group, including these distribution lists, use the Blind Carbon Copy option in your . This assures that any replies will be sent only to the sender and that if you are sending to external parties that you are not sharing any addresses. To use the blind carbon copy option while composing your message click on the options tab and click on the "show bcc icon. Unauthorized Access 1. Abuse of Computing Privileges: Users of College information resources must not access computers, computer software, computer data or information or networks without proper authorization, or intentionally enable others to do so, regardless of whether the computer, software, data, information or network in question is owned by the College. For example, abuse of the networks to which the College belongs or the computers at other sites connected to those networks will be treated as an abuse of Louisiana Delta Community College computing privileges. 2. Reporting Problems: Any defects or abuse discovered in system accounting or system security must be reported to the appropriate system administrator so that steps can be taken to investigate and solve the problem.
6 3. Password Protection: A computer user who has been authorized to use a passwordprotected account may be subject to both civil and criminal liability if the user discloses the password or otherwise makes the account available to others without permission of the system owner. Privacy Computer users must respect the privacy of other computer users. Attempts to gain unauthorized access to the system or to private information are violations of College policy and may violate applicable law. Department administrators, with authorization from the Department Head of MIS/IT, may access computer users files for critical maintenance purposes or in response to suspected policy violations. Department administrators will report suspected unlawful or improper activities to the Department Head of the MIS/IT. Any issue involving IT personnel will be handled in conjunction with the Human Resources department. 1. Unlawful Messages: Use of electronic communication facilities (such as mail or chat or systems with similar functions) to send fraudulent, harassing, obscene, threatening or other messages that are a violation of applicable federal, state, or other law or College policy is prohibited. 2. Mailing Lists: Users must respect the purpose and charters of computer mailing lists (including local or network newsgroups and bulletin boards). The user of an electronic mailing list is responsible for determining the purpose of the list before sending messages to or receiving messages from the list. Subscribers to an electronic mailing list will be viewed as having solicited any material delivered by the list as long as that material is consistent with the list s purpose. Persons sending to mailing list any materials that are not consistent with the list s purpose will be viewed as having sent unsolicited material. 3. Advertisements/solicitations: In general, the College s electronic communication facilities should not be used to transmit commercial or personal advertisements, solicitations or promotions (See Commercial Use, below). 4. Information Belonging to Others: Users must not intentionally seek or provide information on, obtain copies of or modify data files, programs or passwords belonging to other users without the permission of the other user and, where applicable, the permission of the Department administrator and Department head of the MIS/IT. 5. Confidentiality: The College does not exist in isolation from other communities and jurisdictions and their laws. Under some circumstances, as a result of investigations, subpoena or lawsuits, individual users or the College may be required by law to provide electronic or other records or information related to those records or relating to use of information resources. Political, Personal, and Commercial Use The College is a non-profit, tax-exempt State owned organization and, as such, is subject to specific federal, State and local laws regarding sources of income, use of real estate and similar matters. It is also a contractor with other governmental units and other entities and thus must
7 ensure proper use of property under its control and allocations of overhead and associated costs. Uses of the College s information resources, including the use of the College computer network capabilities, are, therefore, subject to the following conditions: 1. Political Use: College information resources must not be used for partisan political activities where prohibited by federal, State or other applicable laws, and may not be used for other political activities, except when in compliance with federal state and other laws and in compliance with applicable College policies. 2. Personal Use: College information resources may not be used for personal activities not related to College business and functions. Commercial use: College information resources should not be used for commercial purposes except in a purely incidental manner or as permitted under other written policies of the College or with the written approval of a College officer having the authority to give such approval. Any such commercial use should be properly related to College activities, take into account proper cost allocations for government and other overhead determinations and provide for appropriate reimbursement to the College for other costs the College may incur by reason of the commercial use.
Administrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
SOUTH DAKOTA BOARD OF REGENTS. Policy Manual
SOUTH DAKOTA BOARD OF REGENTS Policy Manual SUBJECT: Acceptable Use of Information Technology Systems NUMBER: 7:1 1. Purpose The Board acquires, maintains and operates information technology systems to
Dauphin County Technical School
Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN
LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN TITLE: NUMBER: BUL - 999.8 ISSUER: Acceptable Use Policy (AUP) For District Computer and Network Systems Ronald S. Chandler, Chief Information Officer
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D
Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D 1. PURPOSE SWC owns and operates a variety of computing systems which are provided for the use of the Sisseton Wahpeton
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
Electronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.
Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
POLICY SUPPORT OPERATIONS 5042 ACCEPTABLE USE POLICY FOR NETWORK AND INTERNET ACCESS
I. Overview Network and Internet access is available to students, teachers and staff in the Oneida City School District. The District s goal in providing such services is to promote educational excellence
By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224
COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
ACCEPTABLE USE OF TECHNOLOGY
IIBE Page 1 ACCEPTABLE USE OF TECHNOLOGY Internet and computer network and non-network access is available to authorized students, teachers, and other staff in the. Albemarle County Public Schools primary
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
IT1. Acceptable Use of Information Technology Resources. Policies and Procedures
IT1 Policies and Procedures Acceptable Use of Information Technology Resources Originator: Information Technology Governance Committee Approver: President s Council Effective: October 16, 2007 Replaces:
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
AP 417 Information and Communication Services
AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for
City of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures Purpose The purpose of the ACH Network Acceptable Use Procedures is to provide the procedures, rules, guidelines,
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
Franciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
Please Note: This is the Eastern School District policy in its entirety. Not all regulations are relevant to a K-6 school. Policy Statement ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY All
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
(Internet) for students, staff and, if requested, members of the Board of Education. All computer
4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
POLICIES AND REGULATIONS Policy #78
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY
GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY 1. Introduction This acceptable use policy ("Policy") sets out the principles, terms and conditions that govern the
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
