DATA ACCESS POLICY. Attached is a policy statement regarding data access at the New Jersey Institute of Technology.
|
|
|
- Sheena Walker
- 10 years ago
- Views:
Transcription
1 DATA ACCESS POLICY As NJIT has moved to a distributed data access environment, policy has been established to protect the computer-based institutional data from unauthorized (c.q. other improprietary) access and us. Attached is a policy statement regarding data access at the New Jersey Institute of Technology.
2 NEW JERSEY INSTITUTE OF TECHNOLOGY DATA ACCESS POLICY It is the policy of New Jersey Institute of Technology to protect its computerbased institutional data from unauthorized, wrongful or malicious use, by resolving the following responsibilities and definitions: RESPONSIBILITIES 1. It is the responsibility of each NJIT database owner to: o extend authorization to database managers for access to information; o authorize access to secondary users in written form; 2. It is the responsibility to database managers to: o provide the day-to-day controls of the data; o provide secondary users with reasonable knowledge of how to interpret data; o to extend authorization for access to secondary users upon the owner s satisfaction that such knowledge has been effectively conveyed. 3. It is the responsibility of a secondary user of a NJIT database to: o validate interpretation of data (generally via the Institutional Research office) before the data may be used for - external publication; - effecting legal or moral judgment of students or employees; - placing financial or academic restrictions upon students based solely on interpretation of owner s data. 4. It is the responsibility of data owners, managers and any authorized secondary users to take all reasonable precautions against unauthorized access, willful or not, to screens and/or reports containing sensitive data. 5. It is the responsibility of the Computing Services Department to install security procedures to reasonably prevent unauthorized access to systems and data by students or any other unauthorized person.
3 DEFINITIONS 1. Sensitive data is defined as all data contained in the university s information systems. 2. Data bases and owners are: Human Resources System data: Vice President for Human Resources. Financial Records System data: Vice President for Administration and Treasurer. Student Information System data: Vice President for Academic Affairs and Vice President for Administration and Treasurer. Alumni Development System data: Vice President for Development. 3. Data base (information) managers are: Human Resources System: Medical data Employment data Salary data Director of Human Resources Director of Human Resources Director of Finance Financial Records System: Accounting data Vendor data Budgetary data Student Information System: Admissions data Financial Aid data Academic data Scheduling data Student Financial data Director of Finance Director of Purchasing Associate Vice President for Budget & Fiscal Planning Dean of Enrollment Planning Director of Financial Aid Registrar Registrar Director of Finance Alumni Development System: Alumni data ` Director Alumni Relations
4 4. Secondary users are: NJIT personnel, who have been extended the privilege to access and/or modify or append computer-based institutional data. --- August 1, 1989 ADDITIONAL INFORMATION REGARDING DATA ACCESS POLICY. The following summary indicates which offices generally can provide NJIT personnel or students with information that is relevant to their work or position. FINANCE / TREASURER s OFFICE: - Institute financial data - Student financial data HUMAN RESOURCES OFFICE: - Employment certification - Employment statistics REGISTRAR s OFFICE: - Individual student data - Enrollment statistics - Student enrollment certification INSTITUTIONAL RESEARCH: - External surveys ADMISSIONS OFFICE: - Applicant data - Applicant statistics GRADUATE DIVISION: - Graduate applicant data - Graduate applicant statistics COMPUTING SERVICES: - Statistics and data regarding academic and administrative computing - University computing resources data DEVELOPMENT OFFICE: - Development and fund raising data ALUMNI OFFICE: - Alumni data RESEARCH OFFICE: - Research and grant data.
5 NEW JERSEY INSTITUTE OF TECHNOLOGY EMPLOYEE ACCESS TO INFORMATION AND COMPUTING AGREEMENT As an employee of NJIT s computing facilities, I agree to observe the following rules and provisions: 1. I will use only the computer user account(s) assigned to me and will take responsibility to protect my user account(s) from unauthorized use. I further agree to change my passwords at least once a month. This regulation is primarily intended for the protection of my account(s) and of the associated data. If I become aware of attempts to violate or bypass these security mechanisms, I will promptly report such attempts to my supervisor, department head, or to the Executive Director of Computing Services. 2. I have read the Institute s Data Access Policy and agree to abide by its provisions. 3. I will respect the privacy of information stored using NJIT s computing facilities, whether this information belongs to me, to others, or to the Institute. I will not acquire or modify, in any way, information that belongs to another individual or to the Institute without the explicit permission of that person or the Institute. Information which has been acquired or modified remains the property of the original owner and may not be further distributed, modified, or released without the explicit permission of the original owner. 4. I agree to abide by any patent or copyright restrictions which may relate to the use of computing facilities, products, programs or documentation. I agree not to copy, disclose, modify or transfer any such materials that I did not create, without the expressed written consent of the original owner or copyright holder. I agree not to use any NJIT computing facilities to violate the terms of any software license agreement, or any applicable local, state or federal law. I agree not to modify in any way, hardware, software or data to which I have access, unless it is clearly within the scope of my position with the Institute. 5. I agree not to use NJIT s computing facilities for any form of private financial gain, unless having first received written permission from the Executive Director of Computing Services. Business related pursuits of NJIT s facilities will require the creation and use of a separate billable account(s). 6. I agree to take reasonable care of any computing equipment (hardware, software, data) assigned to me during my employment at NJIT and will return such equipment upon the request of my supervisor or termination of my employment with the Institute. 7. I shall not use my privileges to access other computing facilities to which the NJIT network is connected, if I do not have the appropriate approvals for same. 8. I understand that violation of any provision of this agreement may result in employee discipline action and/or civil or criminal liabilities. This agreement will remain in effect as long as I am employed with the New Jersey Institute of Technology. Name. Signature. Date
6 NEW JERSEY INSTITUTE OF TECHNOLOGY ACCESS TO INFORMATION AND COMPUTING AGREEMENT Access to computer facilities maintained by the New Jersey Institute of Technology Computing Services Department may be granted to any student, staff, or faculty member presently affiliated with NJIT. In this agreement, the term unauthorized is defined as not in the best interests of nor pursuant to the expressed goals of the Institute. As a user of NJIT s computing facilities, I agree to observe the following rules and provisions: 1. I will use only the computer User Account(s) provided to me and will take the responsibility to protect my account(s) from unauthorized access. 2. I will not possess a file or program to fraudulently obtain unauthorized privileges. I will not deliberately attempt to degrade the performance of a computer system or deprive authorized personnel of resources or access to any university computer system. If I become aware of attempts to violate or bypass system security mechanisms (i.e. file protection or passwords). I will promptly report such attempts or security loopholes to the Executive Director of Computing Services. 3. The principles of intellectual freedom will apply to the dissemination of information at NJIT CSD managed computer facilities. Intellectual property rights begin with respect for intellectual labor and creativity. They include the right for the creator of the work to acknowledgment, the right to privacy, and the right to determine the form, manner and terms of publication and distribution. Users are free to examine and discuss all questions of interest to them and to express opinions publicly and privately. They should always be free to support causes by orderly means which do not disrupt the regular and essential operation of the computing facilities or NJIT. I will respect the privacy of information stored using NJIT s computing facilities, whether this information belongs to me or to others. I will not acquire or modify, in any way, information that belongs to another person without the explicit permission of that person. Information which has been acquired or modified remains the property of the original owner and may not be further distributed or modified without the explicit permission of the original owner. 4. I agree to abide by any patent or copyright restrictions which may relate to the use of computing facilities, products, programs, or documentation. I agree not to copy, disclose, modify or transfer any such material that I did not create without the expressed written consent of the original owner or copyright holder. I agree not to use any NJIT computing facilities to violate the terms of any software license agreement, or any applicable local, state or federal laws. I agree not to modify in any way hardware, software or data to which I have access unless it is clearly within the scope of my responsibilities within the Institute.
7 5. Any use of CSD facilities or services unrelated to legitimate instructional or NJIT research computing is improper if it interferes with another user s legitimate instructional or NJIT research computing. I agree not to use NJIT s computing facilities for any form of private financial gain or commercial use, unless having first received written permission from the Executive Director or Computing Services. Business related pursuits of NJIT s facilities will require the creation and use of a separate billable account. 6. Access to NJIT s computing facilities by unauthorized persons or for unauthorized purposes is forbidden. I agree not to take any actions which constitute inappropriate behavior. The following list provides some examples of this type of behavior, but is not intended to be all inclusive: Frivolous, disturbing, or otherwise inconsiderate use of or conduct in the terminal areas or while logged into a computer system; Attempting to modify restricted portions of the operating system or accounting software; Any behavior that causes distractions to other users in public use areas (i.e. use of radio, loud conversation, shouting, etc.); Eating, drinking or smoking in a computer use area; The use of computing facilities for plagiarism or other illegal or unethical activities; Forging, tampering with, or interfering with the delivery of electronic mail or news posting; Unauthorized eavesdropping on network traffic. 7. Computer communications systems and networks promote the free exchange of ideas and information, thus enhancing teaching and research. I will not use electronic communications systems to harass others or interfere with their work. 8. I shall not use my privileges to access other computing facilities to which the NJIT network is connected if I do not have the appropriate approvals for same. 9. I understand that a violation of any provision of this agreement will result in punitive action. Suspension or expulsion from computing facilities is a serious penalty. Users facing this penalty will be given due process protection. The following are actions that may be taken against a user at the discretion of the CSD Systems Programming Staff: The changing of a disk quota; The suspension of CPU intensive processes until a later time; Temporarily suspend the use of a user s computer account after attempting to contact the user through electronic mail or system talk/chat utilities to discuss activities on a computer facility. If an infraction is deemed serous by the CSD Assistant Director of Technical Operations, the following disciplinary action(s) may be taken: An informal warning from CSD; A formal warning from the NJIT Committee on Professional Conduct (CPC);
8 Suspension of the use of Institute computing facilities by the CPC; Expulsion of the user from the Institute computing facilities by the CPC; Suspension of the user from the Institute by the CPC. 10. (The following sentence only applies to members of the NJIT faculty or staff): I understand that violation of any provision of the agreement may result in employee disciplinary action and/or civil or criminal liabilities. I understand that when I am using NJIT computing facilities. I am using NJIT resources in the support of my studies, research or other NJIT related activities. NJIT will make all reasonable efforts to maintain the confidentiality of the storage contents and to safeguard the contents from loss, but cannot be held liable for the inadvertent or unavoidable loss or disclosure of the contents. Normally, only need to know access to storage media contents will be conducted at the discretion of the NJIT CSD Systems Programming Staff or at the request of the Executive Director of Computing Services. This agreement will remain in force as long as I am affiliated with NJIT and require the use of NJIT s computing facilities or services. Name: Signature: NJIT ID Number - - Date: / / System: ADMIN1 HERTZ TESLA (check one) (Administration) (Ultrix/Unix) (VMS) Username:
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
BOARD OF EDUCATION Cherry Hill, New Jersey
BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to
Administrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
COMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
SOUTH DAKOTA BOARD OF REGENTS. Policy Manual
SOUTH DAKOTA BOARD OF REGENTS Policy Manual SUBJECT: Acceptable Use of Information Technology Systems NUMBER: 7:1 1. Purpose The Board acquires, maintains and operates information technology systems to
COMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
POLICY 4526. Adopted by Board of Education: 4/20/05
POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
Information Technology
Information Technology A Handbook for Employees and Students PASSED by FBC BOARD OF DIRECTORS, AUGUST 13, 2006 (Revised 8-10-06) TABLE OF CONTENTS 2 Introduction... 3 Access to Information Technology Resources...
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Warren Consolidated Schools Technology Acceptable Use & Internet Safety Guidelines
Warren Consolidated Schools Technology Acceptable Use & Internet Safety Guidelines Scope The acceptable use of information resources, information technology, and networks in the Warren Consolidated Schools
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of San Diego computing and network resources. This policy
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)
Valdosta State University. Information Resources Acceptable Use Policy
Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE
Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
JHSPH Acceptable Use Policy
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Student Computer Usage Policies and Procedures I. Campus Computer Usage Overview: The purpose of this document is to define the policies and procedures
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
Bossier Parish Community College
Bossier Parish Community College Department of Cyber Information Technology Welcome to the Program! Network Security & Networking Tracks Code of Conduct This marks the beginning of your journey through
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
City of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
Red Cloud Community Schools Acceptable Use and Internet Safety Policy
Red Cloud Community Schools Acceptable Use and Internet Safety Policy The Red Cloud Community School system maintains quality technology systems (hardware, software, and services) for the purposes of enhancing
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES
Administrative RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES For any individual or group utilizing WRDSB technology Responsibility: Legal References: Related References:
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
Provider Web Portal Registration Form
Provider Web Portal Registration Form Thank you for your interest in registering for the Maryland Physicians Care provider web portal. Maryland Physicians Care is committed to protecting the privacy of
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
