INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
|
|
|
- Ambrose Andrews
- 10 years ago
- Views:
Transcription
1 INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user who accesses such data shall be responsible for protecting data from unauthorized change, destruction or disclosure according to State Fair Community College and federal Family Educational Rights and Privacy Act (FERPA) guidelines, as well as any other regulations or laws which may apply. This policy shall govern the central administrative system and extracted data from this system; Regulation 8400 shall define the responsibilities of staff who maintain or use this system. The data owner has the authority to grant or revoke access to data or systems which use data. Educational Technology Services shall be responsible for implementing specific procedures which enforce access authority and establish guidelines and standards for systems and data security under this policy. (approved 6-/27-/05) Information Technology Policy 8400 Data Management, Use and Protection Data provided to State Fair Community College for any purpose is the property of the institution. Individuals and business units will act as data stewards to ensure the accuracy and protection of the information. Access, distribution, security and disposal of the information will be determined in accordance with institutional regulations and Federal and State laws including but not limited to FERPA (Family Educational Rights and Privacy Act) and GLB (Gramm Leach Bliley) Act. Regulation 8400 will define the access, distribution, security and disposal of data. Educational Technology Services will be responsible for implementing specific procedures which enforce access authority and establish guidelines and standards for systems and data security under this policy. (approved )
2 Information Technology Regulation 8200 Appropriate Use State Fair Community College shall provide computing and networking resources to the campus community of students, faculty, staff, and the public to support its educational mission. The computing and networking facilities are a College resource. Computers and networks can provide access to resources on and off campus, as well as the ability to communicate with other users worldwide. Such open access is a privilege, and requires that individual users act responsibly. Users shall respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations. Computing and networking resources shall always be used in compliance with all international, federal, state, and local laws. This regulation applies to all users of SFCC and computing and technology resources including faculty, staff, students, guests, external individuals or organizations and individuals accessing external network services, such as the internet via College facilities. Preserving the access to information resources is a community effort that requires each member to act responsibly and guard against abuses. Therefore, both the community as a whole and each individual user have an obligation to abide by the following standards of acceptable and ethical use: Use only those computing and information technology resources for which you have authorization. Use computing and information technology resources only for their intended purpose. Protect the access and integrity of computing and information technology resources. Abide by the applicable laws and college policies and respect copyrights and intellectual property rights of others, including the legal use of copyrighted software. Respect the privacy and personal rights of others. Failure to comply with the appropriate use of these resources threatens the atmosphere for the sharing of information, the free exchange of ideas and the secure environment for creating and maintaining information property and subjects one to discipline. Any member of the College community found using information resources for unethical and unacceptable practices has violated this policy and is subject to disciplinary proceedings including the suspension of system privileges, expulsion from school, termination of employment, and/or legal action as may be appropriate.
3 Regulation 8200 Page 2 SFCC reserves the right to limit or restrict the use of its computing and information technology resources based on institutional priorities and financial consideration, as well as when it is presented with evidence of a violation of College policies, contractual agreements, or state and federal laws. Although members of the community have an expectation of privacy, if a user is suspected of violating this policy, his or her right to privacy may be superseded by the College s requirements to protect the integrity of information technology resources, the rights of all users and the property of the College. The College, thus, reserves the right to examine material stored on or transmitted though its facilities if there is cause to believe that the standards for acceptable and ethical use are being violated by a member of the college community. User Responsibilities: Use of College computing and information technology resources is granted based on acceptance of the following specific responsibilities: Use only those computing and information technology resources for which you have authorization. o to use resources you have not been specifically authorized to use o to use someone else's account and password or share your account and password with someone else o to access files, data or processes without authorization o to purposely look for or exploit security flaws to gain system or data access Use computing and information technology resources only for their intended purpose. o to send forged o to misuse Internet Relay Chat (IRC) software to allow users to hide their identity, or to interfere with other systems or users o to use electronic resources for harassment or stalking other individuals o to send bomb threats or "hoax messages" o to send chain letters o to intercept or monitor any network communications not intended for you o to use computing or network resources for advertising or other commercial purposes
4 Regulation 8200 Page 3 o to attempt to circumvent security mechanisms o to use privileged access for other than official duties o to use former privileges after graduation, transfer or termination Protect the access and integrity of computing and information technology resources. o to release a virus or worm that damages or harms a system or network o to prevent others from accessing an authorized service o to send bombs that may cause problems and disrupt service for other users o to attempt to deliberately degrade performance or deny service o to corrupt or misuse information o to alter or destroy information without authorization Abide by applicable laws and College policies and respect the copyrights and intellectual property rights of others, including the legal use of copyrighted software. o to make more copies of licensed software than the license allows o to download, use or distribute pirated software o to operate or participate in pyramid schemes o to distribute pornography o to upload, download, distribute or possess pornography Respect the privacy and personal rights of others. o to tap a phone line or run a network sniffer without authorization o to access or attempt to access another individual's password or data without explicit authorization o to access or copy another user's electronic mail, data, programs, or other files without permission System Administrator Responsibilities: System administrators and providers of College computing and information technology resources have the additional responsibility of ensuring the integrity, confidentiality, and availability of the resources they are managing. Persons in these positions are granted significant trust to use their privileges appropriately for their intended purpose and only when required to maintain the system. Any private information seen in carrying out these duties must be treated in the strictest confidence, unless it relates to a violation or the security of the system.
5 Regulation 8200 Page 4 Security Caveat: Be aware that although computing and information technology providers throughout the College are charged with preserving the integrity and security of resources, security sometimes can be breached through actions beyond their control. Users are therefore urged to take appropriate precautions such as safeguarding their account and password, taking full advantage of file security mechanisms, backing up critical data and promptly reporting any misuse or violations of the policy. Violations: Every member of the College community has an obligation to report suspected violations of the above guidelines or of the Information Technology Policies Reports should be directed to the unit, department, school, or administrative area responsible for the particular system involved. If a suspected violation involves a student, a judicial referral maybe made to the Vice President of Student Services. Incidents reported to the Dean will be handled through the College Code of Student Conduct. If a suspected violation involves a staff or faculty member a referral will be made to the individual's supervisor.
6 Information Technology Regulation 8300 Access Computing and networking resources shall be provided for the educational, academic, and administrative purposes of the College. Some computer labs, networks, systems, and other resources shall be restricted to students who are enrolled in specific courses or programs or employees who have specific work assignments. Computer users shall learn and follow the access regulations for each resource used and shall use the resources appropriately and consistently with access regulations. The use of these computers/networks is a privilege granted to members of the college community. When using this account, you are agreeing to: 1. Take no actions which violate the Information Technology Appropriate Use regulation 8200, Employee Handbook, or other applicable policy or law. 2. Use these resources only for purposes consistent with the College's mission and applicable policy or law. Inappropriate use includes, but is not limited to: a. sending harassing messages or in any way harassing other computer users; b. gaining OR attempting to gain access to accounts or files without permission on any computer or network system; c. making unauthorized copies of any copyright protected software, or other copyrighted or trademarked material, regardless of source; d. taking actions which threaten the security or capacity of computer or network systems, or which destroy, damage or overload these resources; e. violating any applicable law or policy. Failure to abide by these policies will result in revocation of your privileges to use computing and network resources. Although we have backup procedures in place, use of these facilities is at your own risk since recoverability and security of data cannot be guaranteed. Files, data and disks may be considered SFCC property and are therefore subject to access by the College. Certain data may also be subject to access pursuant to Missouri Public Records statutes, via subpoena, or consistent with other state or federal law.
7 Information Technology Regulation 8400 Data Security Information systems contain data necessary to conduct business of the College. This policy establishes data security practices for the privacy of College employees, students, alumni, and donors. Data is an institutional resource and must be protected from unauthorized change, destruction, or disclosure, whether accidental or intentional. Staff who maintain data and handle computer-generated documents must: use data and data access only as required in the performance of their jobs, disclose confidential College data to other staff only on a need-to-know basis, exercise due care to protect data from unauthorized use, disclosure, alteration, or destruction, follow established data processing practices when connected to the database - including the following: o do not leave workstations unattended after logging-in o do not write down or display the password near the workstation o do not disclose a login account and password to anyone, including ETS personnel The Information Technology department, ETS, is responsible for: maintaining a network and computer system that provides safeguards against unauthorized access of these data, providing a custodial environment for the maintenance of the database. It is not the responsibility of ETS to disseminate data to anyone on or off campus. Within the guidelines of this policy, that responsibility belongs to the head of the department which maintains the desired data, maintaining and identifying the following information classifications for all College data: o Unclassified. Information or documents which are available to the public. o Internal Use Only. Information or documents restricted for use within the College which related to the institution's business. Computer generated reports listing students, staff, financial data and telephone directories are primarily for internal use only. Documents and data of this kind need not be kept under lock and key although reasonable care should be made to keep it from public view. Precautions must be taken when these data are transferred to another individual or destroyed.
8 Regulation 8400 Page 2 o Confidential. Sensitive data that would breach reasonable privacy expectations or data that could be detrimental to students, staff members or the College if improperly disclosed. These data are made available only to those individuals whose job responsibilities require such data. This kind of data when printed on paper must be kept under lock and key and carefully safeguarded. Precautions must be taken when these data are transferred to another individual or destroyed. Selling or transferring of addresses, mailing labels, or other serial data by anyone to outside agencies or vendors is prohibited unless approved by the department head. The College complies with applicable laws and regulations regarding the dissemination and protection of data that is confidential. In particular, it adheres to the Family Educational Rights and Privacy Act of 1974, otherwise known as the Buckley Amendment. Enforcement: Violations of any part of this policy may result in disciplinary action as prescribed by College policies and procedures.
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION
FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION DATE: June 10, 2015 REGULATION CHAPTER NO.: Chapter 5 REGULATION CHAPTER TITLE: Miscellaneous REGULATION TITLE AND NUMBER:
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN
LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN TITLE: NUMBER: BUL - 999.8 ISSUER: Acceptable Use Policy (AUP) For District Computer and Network Systems Ronald S. Chandler, Chief Information Officer
Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4
Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Texas University Law - General Use of Technology Resources
Procedure No. 27.99.99.T1.01 (Effective 5/16/03) Computer Use PROCEDURE: Tarleton State University provides each of its students, faculty and staff with one or more computer accounts (user-ids) that permit
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
JHSPH Acceptable Use Policy
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
COMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
AP 417 Information and Communication Services
AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
COMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
DATA ACCESS POLICY. Attached is a policy statement regarding data access at the New Jersey Institute of Technology.
DATA ACCESS POLICY As NJIT has moved to a distributed data access environment, policy has been established to protect the computer-based institutional data from unauthorized (c.q. other improprietary)
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
Administrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
ACCEPTABLE USE OF TECHNOLOGY
IIBE Page 1 ACCEPTABLE USE OF TECHNOLOGY Internet and computer network and non-network access is available to authorized students, teachers, and other staff in the. Albemarle County Public Schools primary
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
POLICY SUPPORT OPERATIONS 5042 ACCEPTABLE USE POLICY FOR NETWORK AND INTERNET ACCESS
I. Overview Network and Internet access is available to students, teachers and staff in the Oneida City School District. The District s goal in providing such services is to promote educational excellence
R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Student Computer Usage Policies and Procedures I. Campus Computer Usage Overview: The purpose of this document is to define the policies and procedures
Information Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
How To Use The Internet Safely
Administrative Procedure 140 DISTRICT-WIDE NETWORK AND INTERNET APPROPRIATE USE Background School District No.43 (Coquitlam)'s District-wide network provides data communication links among all District
By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224
COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist
IT1. Acceptable Use of Information Technology Resources. Policies and Procedures
IT1 Policies and Procedures Acceptable Use of Information Technology Resources Originator: Information Technology Governance Committee Approver: President s Council Effective: October 16, 2007 Replaces:
RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
[Acceptable Use Policy]
South College Computer Code of Ethics [Acceptable Use Policy] Introduction Freedom of expression and an open environment to pursue scholarly inquiry and for sharing of information are encouraged, supported,
SOUTH DAKOTA BOARD OF REGENTS. Policy Manual
SOUTH DAKOTA BOARD OF REGENTS Policy Manual SUBJECT: Acceptable Use of Information Technology Systems NUMBER: 7:1 1. Purpose The Board acquires, maintains and operates information technology systems to
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
Computer, Communication, and Network Technology Acceptable Use
Policy V. 2.10.2 Responsible Official: Dean of University Libraries and Chief Information Officer Effective Date: April 12, 2010 Computer, Communication, and Network Technology Acceptable Use Policy Statement
Commonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
