Information Technology (I.T.)

Size: px
Start display at page:

Download "Information Technology (I.T.)"

Transcription

1 Location: The Juilliard School Irene Diamond Building Main Office Room: 248 Phone: ext Website: Information Technology Computer Labs There are two computer labs at Juilliard. The main lab is located in Room 248, and offers Macintosh and Windows machines for student use. It is divided into two sections: a general access lab (Internet access, word processing, scanning, printing), and a music technology classroom (notation, sequencing, audio editing). The lab is available to students with valid ID cards during building hours. A second facility, the residence hall lab, is on the 19th floor of the Rose Building. It is open 24 hours a day, seven days a week, for residents of the residence hall, and 7 a.m.-midnight each day for non-resident students. Internet access and word processing are provided in this lab. In addition to these labs, a number of Internet access workstations are provided around the building, including in the library, on the second, third, fourth, and fifth floors, as well as in the Morse Student Lounge. Wireless Internet access is available around the main building and the residence hall. A valid Juilliard ID is required for access to Juilliard s computing facilities. A unique network login that grants access to all computing resources is established for each new student. Details of how to activate the account are covered during the orientation for new students. Alumni and guests are not permitted access to either facility. For information about policies regulating the use of computers at Juilliard, see also Computer Use Policy below. Computer Use Policy The use of The Juilliard School s information technology systems, including its computer systems, networks and the data contained therein, is governed by a set of rules contained in the Computer Use Policy. All users are expected to familiarize themselves with these policies and sign a memorandum of understanding stating such. A. Institutional Privileges System administrators may monitor and log usage data and may review this data for evidence of violation; when necessary, they may monitor all the activities and inspect the files of specific users on their computers and networks. System administrators may suspend privileges of an individual user for reasons relating to physical or emotional safety and well-being, or for reasons relating to the safety and well-being of other members of the Juilliard community or Juilliard property. Juilliard retains ownership of all administrative information created by its employees. Departments that operate their own computers may add, with the approval of the appropriate Senior Staff member, individual guidelines that supplement, but do not relax, this policy. B. Institutional Responsibilities Juilliard presents no warranty, either expressly stated or implied, for the services provided; damages resulting directly and indirectly from the use of these resources are the responsibility of the user. Juilliard does not and will not act as a censor of information but will investigate properly identified allegations arising from the Juilliard community and will comply with applicable state and federal laws (see appendix). Supervisors are responsible for providing copies of this policy to consultants, temporary staff and other special employees and assisting them to understand the policy. Juilliard will fully comply with the authorities to provide any information necessary for the litigation process and will report criminal offenses to the appropriate authorities. C. Security 1. Physical Access to the computer operations area is restricted to those responsible for operation and maintenance. No individuals are allowed in Juilliard s I.T. or Library server rooms unless they are under close and immediate supervision of an I.T. staff member or authorized Library staff member. Tampering with equipment is prohibited. 2. Network The owner of a private computer connected to Juilliard s network is responsible for the behavior of its users and for all network traffic to and from that computer. A private computer is defined as a non-juilliard owned computing Updated: Friday, August 22, 2014 Page 1

2 device, including any type of PC (personal computer) or smartphone, tablet device, game console or any other computing device. Private computers must not be used to provide network access to individuals who do not have access through official Juilliard systems or as a router to other networks or to non-juilliard affiliated systems. Private computers must not use the Juilliard network for commercial gain or profit. It is the responsibility of users to ensure that an appropriate level of security is implemented on private devices that connect to the Juilliard network. Smartphones MUST be passwordprotected and users are expected to deploy an anti-virus solution such as Juilliard s free antivirus tool. Users may not alter the Juilliard network infrastructure (including ResNet) by installing any unauthorized networking equipment including (but not limited to) hubs, switches, routers, or wireless access points of any kind without the expressed permission of the I.T. Department. It is also a violation to install any devices or programs on Juilliard networked or any other PC or computing device connected to the Juilliard network (including ResNet) that are designed to alter, reshape, affect, monitor, or intercept network traffic. The Juilliard School reserves the right to terminate or limit the network connectivity of any user whose online activities are deemed detrimental to the health of the network. 3. Administrative Data Access to administrative systems is based on the need to use specific data, as defined by job duties, and will be annually re-evaluated by the supervisor. Employees are to safeguard the integrity, accuracy, and confidentiality of information as part of the condition of employment. Any person-authorized access to information of any type is not to remove any official record, report or copy from the office where it is kept except in performance of job responsibilities. Any person-authorized access to information is not to make or permit unauthorized use of that information. Employees who attempt unauthorized access to administrative computer access IDs are subject to disciplinary measures. Improper access to or unauthorized disclosure of confidential information may be a violation of federal law. Users must hold confidential any administrative data after termination of employment with Juilliard. Monitors should be positioned to prevent unauthorized reading of sensitive information. Users are also strongly advised to lock their workstations when leaving them even for only a few minutes. Windows workstations can be locked by hitting Ctrl + Alt +Delete keys. They are unlocked by providing the network access password. Storage or dissemination of nonelectronic forms of administrative information must safeguard against unauthorized viewing as well as loss due to accidents or acts of nature. Good judgment should be used in the storage and disposal of administrative data. Electronic storage media (thumb drives, external drives) and paper copies should be stored in secure places; when it is necessary to discard information, data should be removed from these devices and paper copies should be shredded. Department heads are responsible for implementing procedures to maintain access security and for educating their employees regarding these procedures. All Juilliard-related work files should be stored in the My Documents folder or on the appropriate Departmental network location. This folder is located on the network, and is backed up nightly to safeguard against loss of data. Employees are encouraged NOT to store important Juilliard files on the computer itself (the C: drive, or internal hard drive). Personal files may be stored on the computer (the C: drive, or internal hard drive). The I.T. Department is NOT responsible for the preservation or content of these files, and may remove any applications or files it deems in violation of this Computer Use Policy. Personal files, such as music (mp3), video, and highresolution pictures, may NOT be stored in the My Documents folder or on a network share. Students must provide identification to access their own data. Parents must provide written evidence that a student is their dependent to access the student s data unless specific permission is given by the student (refer to Updated: Friday, August 22, 2014 Page 2

3 FERPA guidelines). Individuals who are on leave of absence or whose employment has been terminated for reasons other than retirement with reemployment rights have the right of access to their records. Legal representatives of deceased faculty and staff members shall have the right of access for five years after the death of the individual. 4. User Accountability Any attempts to secure a higher level of privileges on networked systems are punishable disciplinary offenses. Gaining unauthorized access to a system or area of a system using knowledge of access abilities gained during a previous position at Juilliard is prohibited. Under no circumstances may individuals give others access to any system they do not administer. Gaining access to non-public computers, network facilities, information services and resources is a violation of this policy. Any user who finds a possible security lapse on a Juilliard system is obliged to immediately report it to the system administrator. Loopholes in system security or knowledge of a special password are not to be used to damage systems or obtain unauthorized services. Users are expected not to develop programs or use mechanisms to alter or avoid accounting, or to employ means by which the facilities and systems are used anonymously or by means of an alias. Use of systems and/or networks to connect to other systems, in evasion of the security limitations of the remote system/network, is prohibited. Users must not physically or electronically attach any foreign device without specific authorization. Rules prohibiting theft or vandalism apply to authorization codes, long distance telephone services, television signals and service information, as well as to physical equipment. 5. Integrity of Use Any person authorized to access information is not to knowingly include in any record or report a false, inaccurate, or misleading entry. The creation, alteration, or deletion of any electronic information contained in or posted to any Juilliard computer or affiliated network will be considered forgery. Knowingly accepting or using information that has been obtained by illegal means is a violation of others rights and is subject to disciplinary action. The use of Juilliard computing facilities to effect or receive unauthorized electronic transfer of funds is prohibited. 6. Peer-to-Peer (P2P) Software Policy Use of Peer-to-Peer (P2P) Software A. The School's computing and telecommunications resources shall not be used for any type of P2P file sharing without the express consent of the I.T. Department. B. The I.T. Department employs traffic-shaping tools to control P2P traffic on the Juilliard School network. C. The I.T. Department, in consultation with the Office of Legal Affairs, will consent to the use of P2P software on a per-user basis only when provided with specific, written purposes directly related to, or in support of, the academic, research, or administrative activities of the School. D. Permission to use P2P software may be revoked at the discretion of the I.T. Department. This includes but is not limited to the following reasons: service abuse, degradation of the performance of the network, or use for purposes other than School business. E. It is a violation of The Juilliard School, New York State and federal regulations to illegally share copyrighted material using P2P or other tools. User Responsibility 6. Network users shall not knowingly download, install, or use P2P software on either Juilliard s wired or wireless network. 7. Network users shall remove any P2P software that is discovered on any resource attached to the Juilliard School network, including personal property, unless granted specific permission by the I.T. Department to be used. Enforcement of Policies If a system is detected engaging in unauthorized P2P activity on the wired or wireless networks, sanctions that range from a temporary block on the offending machine to to other disciplinary actions may be applied. 7. Copyright Users must abide by all applicable copyright Updated: Friday, August 22, 2014 Page 3

4 laws and licenses. Users are responsible to use available mechanisms and procedures to protect their own programs, programs in software libraries, and data. Users are also responsible for assisting in the protection of the systems they use. Employees are not allowed to copy programs, take them home, distribute, or sell them to others. Juilliard reserves the right to refuse to defend any faculty, student, or staff member named in a lawsuit arising out of alleged copyright infringement activity, and to refuse to pay any damages awarded by a court of law against such person. 8. Network Security for access to the network and to files and applications on a server will be implemented via a user ID and password. 9. Accounts Computer accounts are owned by Juilliard and are to be used for Juilliard-related activities only. Accounts remain in effect as long as the user maintains an official relationship with Juilliard. Any employee who does not access an administrative system in a one-year time period will have access removed and must be reauthorized for access. Access managers will immediately delete the access of employees who have been terminated by Juilliard. Employees who resign may keep their Juilliard account for up to two months after they leave Juilliard. All other access for these employees will be terminated. Providing false or misleading information for the purpose of obtaining access to computing facilities is prohibited and may be regarded as an offense to the disciplinary code and treated accordingly by Juilliard. Employees are accountable for the activities on their workstation. Sharing of IDs is prohibited. Workstations must be logged off to a point that requires a new logon whenever employees leave their work area. Access to Juilliard Computing resources requires a valid username and password combination. The system locks out a user after 10 unsuccessful attempts to log on. Locked out users can unlock their own accounts if they are enrolled in the password management tool. Administrative accounts in the Windows domain are subject to a password complexity requirement enforced by Active Directory group policy. Passwords must contain a minimum of 6 characters, and characters from 3 of the following 4 character groups must be present: uppercase letters, lowercase letters, numbers and alphanumeric symbols. The chosen passwords may not contain the accounts username, and the last 6 passwords set by a user are remembered and blocked from re-use. Passwords must be changed every 120 days. Colleague users log into the Colleague system through Unix. Passwords expire every 180 days. Passwords must be at least 6 characters but there is no maximum limit and the first 6 characters of the password must contain at least two alphabetic and one numeric character. Only the first 8 characters are encrypted. Five consecutive failed logon attempts will result in the account being locked out for 1 hour. No user ID or administrative system may be used for unethical, illegal, or criminal purposes. Accessing files or directories of other users is not permitted without consent of the other user. Remotely logging onto or otherwise using any workstations or computers not designated explicitly for public logons is not permitted without consent from the owner. Users must not conceal or cover up violations by anyone. D. Individual Privileges 1. Privacy Users must respect the privacy and personal rights of others. Computer programs, , voice mail and electronic files can only be accessed by authorized personnel for compelling business or security reasons and only with the approval of the President. Information that users obtain through special privileges is private. User privacy cannot be extended under conditions such as a program causing disruption to the network or other shared resources or the suspected violation of Juilliard s guidelines of behavior or state or federal law. System administrators may view the contents of due to serious addressing errors or as a result of maintaining the system. Updated: Friday, August 22, 2014 Page 4

5 2. Freedom of Expression The constitutional right to freedom of speech applies no matter what medium is used. System administrators will not remove any information from individual accounts unless the information involves illegality, endangers computing resources, is inconsistent with the mission of the institution or involves obscene, bigoted, or abusive language; users who wish to appeal such removal of information may do so through the Office of Legal Affairs. 3. Responsible Use While some incidental personal use of Juilliard computing resources may be allowed, it is not appropriate for employees to convert Juilliard resources to private endeavors. No administrative computing system may be used for improper purposes, such as computer games or the playing of practical jokes. Users should, where possible, limit the wastage of paper by not printing unnecessary listings or multiple copies of files. Users must check thoroughly for all errors and corrections before printing documents. Users must print only academic, school life or job-related work. The messaging services should not be used to send rude, obscene, harassing, or illegal materials. Potentially offensive material is not to be forwarded to others without their consent. Downloading onto your desktop any inappropriate images, photos, sounds, attachments or messages is prohibited; refrain from transmitting to others inappropriate images, sounds, or messages which might reasonably be considered harassing. Users must not use any communications services to intimidate, insult, or harass others. Users must not use mail or messaging services for broadcasting unsolicited messages. 4. Student, staff and faculty mailboxes are set to 50GB in size. Students accounts are granted for life. Upon graduation, student accounts are converted to self-service alumni accounts with a maximum capacity of 5GB. As part of Office365, users are also provided up to 1TB of cloud data storage as part of OneDrive For Business. 5. Discipline Violations of this policy will be governed under the disciplinary procedures as stated in the faculty, staff or student handbook, whichever is applicable. 6. Abuse of Privilege Users must not use any communications services to intimidate, insult, or harass others. Potentially offensive material is not to be forwarded to others. Chain letters and other forms of mass mailings are not allowed. Users must not use mail or messaging services for broadcasting unsolicited messages. Changing another person s password is considered a form of harassment. Users must not display on screens in shared facilities images, sounds, or messages which could create an atmosphere of discomfort or harassment to others; users must refrain from transmitting to others inappropriate images, sounds, or messages which might reasonably be considered harassing. No one should look at, copy, alter, or destroy anyone else s personal files without explicit permission, unless authorized to do so by law or regulation. Knowingly accepting or using information which has been obtained by illegal means is a violation of others rights and subject to disciplinary action. Gaining access to non-public computers, network facilities, information services and resources is a violation of the policy. The use of Juilliard computing facilities to effect or receive unauthorized electronic transfer of funds is prohibited. Rules prohibiting theft or vandalism apply to authorization codes, long distance telephone services, television signals and service information as well as to physical equipment. No one should deliberately attempt to degrade the performance of an information system (including computers, networks, telephone systems, and video systems). 7. Public Facilities Users must be sensitive to the needs of others and use only their fair share of computing resources including Internet bandwidth. Users must refrain from holding (without activity) Updated: Friday, August 22, 2014 Page 5

6 public terminals. Others must not be prevented from using shared resources by signs placed on devices to "reserve" them without authorization. Users must not lock a computer or other device which is in a public facility. Public terminals may only be used for their designated purpose. Users must be sure to log off after using public terminals. E. Lab Usage Policy By entering this lab, you agree to the following: Only current Juilliard faculty, staff, interns and students are allowed to use machines in the lab. A valid Juilliard ID is required for entry to the lab. Access is on a first-come, first serve basis and users may use any free workstation. During busy periods, lab users are encouraged to be considerate of others and limit their usage to accommodate other users. You are not permitted to install any software onto Juilliard machines. You may not bring any food or beverages into the lab. You will be liable for any damage that occurs. Under a networked Print Accounting System, each student is allocated $50 worth of printing privilege (500 pages). When this is used up, you can replenish their printing accounts from the Business Office at a rate of $0.10 per black & white page and $0.25 per color page. Go to print.juilliard.edu to check your printing balance. The Student Computer Lab is open from 8AM to 11PM, 7 days a week. The Juilliard School will not be held liable for any material you send or receive over the Internet. You agree not to use the lab for illegal purposes or for the transmission of material that is unlawful, harassing, libelous, invasive of another s privacy, abusive, threatening, harmful, vulgar, obscene, tortuous, or otherwise objectionable, or that infringes or may infringe the intellectual property or other rights of another. We reserve the right to restrict computer usage if it is deemed inappropriate for our educational environment. You agree that The Juilliard School may in its sole discretion terminate your account if it believes you have in any way violated the Terms of Service. F. Lila Acheson Wallace Library Computer Use Policy The Library computer network provides access to JUILCAT, The Juilliard School online library catalog, as well as to a number of electronic resources. These computers are designed to be used for reference and research purposes only. Three computers at the far end of the library reference room have been designated for Web browsing. There is a twenty (20) minute time limit on use of these computers. Use of other computers in the library for Web browsing or is forbidden. Updated: Friday, August 22, 2014 Page 6

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 (Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I

More information

COMPUTER USE POLICY. 1.0 Purpose and Summary

COMPUTER USE POLICY. 1.0 Purpose and Summary COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive

More information

North Clackamas School District 12

North Clackamas School District 12 North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology

More information

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to

More information

Bates Technical College. Information Technology Acceptable Use Policy

Bates Technical College. Information Technology Acceptable Use Policy Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment

More information

COMPUTER USE IN INSTRUCTION

COMPUTER USE IN INSTRUCTION COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be

More information

Ethical and Responsible Use of EagleNet 03/26/14 AMW

Ethical and Responsible Use of EagleNet 03/26/14 AMW Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized

More information

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and

More information

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration

More information

BOBCAT COMPUTING POLICY

BOBCAT COMPUTING POLICY BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

Use of ESF Computing and Network Resources

Use of ESF Computing and Network Resources Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among

More information

Student & Staff Access and Use of Networked Information Resources and Communications

Student & Staff Access and Use of Networked Information Resources and Communications Page 1 of 6 These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive and effective digital citizenship among students and staff. Digital

More information

Appropriate Use Policy for Information Technology

Appropriate Use Policy for Information Technology Appropriate Use Policy for Information Technology Amarillo College Faculty, Staff, Students, Friends and Guests Amarillo College reserves the right to amend or otherwise revise this document as may be

More information

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user

More information

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer

More information

Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents

Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Introduction... 2 Prohibited Use... 2 Electronic Communication & Computer Usage... 3 Identification

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

University of Maryland Baltimore Information Technology Acceptable Use Policy

University of Maryland Baltimore Information Technology Acceptable Use Policy The UMB School of Nursing follows and adheres to the UMB Campus Information Technology Acceptable Use Policy. The UMSON further defines Authorized User to also include any person who receives a password

More information

C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY

C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)

More information

COMPUTER NETWORK FOR EDUCATION

COMPUTER NETWORK FOR EDUCATION 4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and

More information

COMPUTER, NETWORK AND INTERNET USE POLICY

COMPUTER, NETWORK AND INTERNET USE POLICY 4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate

More information

district Legal Networking

district Legal Networking COMPUTER NETWORK FOR EDUCATION REGULATION 4526-R The following rules and regulations govern the use of the district's computer network system and access to the Internet. I. Administration The Superintendent

More information

Franciscan University of Steubenville Information Security Policy

Franciscan University of Steubenville Information Security Policy Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,

More information

How To Use East Georgia State College Computers And Networks Safely

How To Use East Georgia State College Computers And Networks Safely 11.1 Campus Computer and Network Usage Policy "Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers

More information

Electronic Communications System

Electronic Communications System Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as

More information

Valdosta State University. Information Resources Acceptable Use Policy

Valdosta State University. Information Resources Acceptable Use Policy Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06. REFERENCE: Board Rule 2.16 PAGE 1 OF 6

TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06. REFERENCE: Board Rule 2.16 PAGE 1 OF 6 LAKE-SUMTER COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06 REFERENCE: Board Rule 2.16 PAGE 1 OF 6 1. General Information a. LSCC Information Systems (IS)

More information

RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET

RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET Administrative Procedure 140 Background RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET This Administrative Procedure is to guide users in the proper use of technology within the Division. The goal of the

More information

[Acceptable Use Policy]

[Acceptable Use Policy] South College Computer Code of Ethics [Acceptable Use Policy] Introduction Freedom of expression and an open environment to pursue scholarly inquiry and for sharing of information are encouraged, supported,

More information

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the

More information

POLICY 4526. Adopted by Board of Education: 4/20/05

POLICY 4526. Adopted by Board of Education: 4/20/05 POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,

More information

How To Use A College Computer System Safely

How To Use A College Computer System Safely Claremont Graduate University and The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources An overall guiding mission of The Claremont Colleges is education in

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer

More information

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources Appendix I The City University of New York Policy on Acceptable Use of Computer Resources Introduction CUNY s computer resources are dedicated to the support of the university s mission of education, research

More information

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

The District's Electronic Communications System - A Review

The District's Electronic Communications System - A Review ROBINSON INDEPENDENT SCHOOL DISTRICT ACCEPTABLE USE POLICY (AUP) The Superintendent or designee will oversee the District's electronic communications system. The District's system will be used only for

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes

More information

COMPUTER AND NETWORK USAGE POLICY

COMPUTER AND NETWORK USAGE POLICY COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.

More information

POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6

POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.

More information

OLYMPIC COLLEGE POLICY

OLYMPIC COLLEGE POLICY TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,

More information

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology

More information

INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures

INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures Purpose The purpose of the ACH Network Acceptable Use Procedures is to provide the procedures, rules, guidelines,

More information

Acceptable Use of Computing and Information Technology Resources

Acceptable Use of Computing and Information Technology Resources Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,

More information

Niagara County Community College

Niagara County Community College Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:

More information

Riverside Community College District Policy No. 3720 General Institution

Riverside Community College District Policy No. 3720 General Institution Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall

More information

Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications

Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.

More information

- Do not leave open email/network applications unattended. Log off of a computer when it is in an unsecured area and out of your sight.

- Do not leave open email/network applications unattended. Log off of a computer when it is in an unsecured area and out of your sight. STAFF PROCEDURES FOR ACCEPTABLE USE OF EMAIL/NETWORK AND INTERNET The primary purpose of Sycamore Community Schools email/network system is to provide resources to enhance and support educational instruction

More information

III. RESPONSIBILITIES

III. RESPONSIBILITIES Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 1 of 5 I. POLICY & SCOPE This is the SUNY College at Old Westbury policy on College-provided access to electronic information

More information

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing

More information

Johnson Creek School District Parent/Student Information Packet

Johnson Creek School District Parent/Student Information Packet Johnson Creek School District Parent/Student Information Packet This packet includes Johnson Creek School Board policies as referenced on the Parent/Student Signature Page, as well as, the Johnson Creek

More information

OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY

OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY 03.13211 Referenced by OVEC Policy Manual and OVEC Employee Handbook Version 2.0.0 2/12/2014 Section headings: 1. Introductory paragraph

More information

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology

More information

Internet Acceptable Use Policy

Internet Acceptable Use Policy 1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems. VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0

More information

------------------- COMPUTER NETWORK AGREEMENT FORM

------------------- COMPUTER NETWORK AGREEMENT FORM COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.

More information

PURPOSE To establish standards for the use of College networks and computer accounts.

PURPOSE To establish standards for the use of College networks and computer accounts. IT 01 Classification: Responsible Authority: Executive Sponsor: Approval Authority: Date First Approved: 1998.03.02 Date Last Reviewed: 2011.11.23 Mandatory Review Date: 2016.11.23 Acceptable Use of Computer

More information

Appropriate Use of Campus Computing and Network Resources

Appropriate Use of Campus Computing and Network Resources The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources Approved by the Council of The Claremont Colleges on 08/20/04 An overall guiding mission of The Claremont

More information

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information

More information

Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014

Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014 Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014 Why Bring Your Own Device? Technology is now an essential part of education. To be able to live,

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs

More information

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal

More information

Sample Policies for Internet Use, Email and Computer Screensavers

Sample Policies for Internet Use, Email and Computer Screensavers Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies

More information

Internet usage Policy

Internet usage Policy Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is

More information

Email Policy For Staff and Students

Email Policy For Staff and Students Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management

More information

Coffeyville Community College Computer and Network Usage Policy

Coffeyville Community College Computer and Network Usage Policy Coffeyville Community College Computer and Network Usage Policy Computer and Network Usage Policy Page 1 Introduction "Respect for intellectual labor and creativity is vital to academic discourse and enterprise.

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

[Acceptable Use Policy]

[Acceptable Use Policy] South College Computer Code of Ethics Introduction South College Computer Code of Ethics [Acceptable Use Policy] Freedom of expression and an open environment to pursue scholarly inquiry and for sharing

More information

Ceres Unified School District

Ceres Unified School District Ceres Unified School District TECHNOLOGY USE POLICY Grades K-12 Please read this policy below carefully to be instructed in proper behavior and use regarding the Internet. This policy covers technology

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

Grand Rapids Public Schools

Grand Rapids Public Schools 4510-R Computer Network (Cf. 4520) 4510-R Planning and funding for computer networking in the District shall be handled in accord with the District's policy and rules on technology. Supervised Use Teachers

More information

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE TITLE: COMPUTER USE POLICY PAGE 1 OF 5 EFFECTIVE DATE: 07/2001 REVIEW DATES: 02/2003, 09/2006 REVISION DATES: 03/2005, 03/2008 DISTRIBUTION: All Departments PURPOSE APPROVED BY: Signatures on File Chief

More information

CORPORATE. Tab Authority Subject Related Policies POLICY STATEMENT PURPOSE

CORPORATE. Tab Authority Subject Related Policies POLICY STATEMENT PURPOSE POLICY AND PAGE 1 of 7 OCTOBER 25, 2007 Tab Authority Subject Related Policies Corporate Services Information Technology Services Responsible Computing Corporate IT Guiding Principles Policy, Harassment

More information

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4 Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User

More information

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Odessa College Use of Computer Resources Policy Policy Date: November 2010 Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational

More information

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with

More information

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology

More information

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY Effective August 24, 2004 Overview: The Fresno County Employees Retirement Association (FCERA) provides access to the Internet

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Purposeful Use Of A CCCC Computing System

Purposeful Use Of A CCCC Computing System Purpose Cloud County Community College owns and operates a variety of computing systems which are provided for the use of CCCC students, faculty and staff in support of the programs of the College and

More information

BOARD OF EDUCATION Cherry Hill, New Jersey

BOARD OF EDUCATION Cherry Hill, New Jersey BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

Marion County School District Computer Acceptable Use Policy

Marion County School District Computer Acceptable Use Policy Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through

More information

Instruction. Neoga Community Unit School District #3 Page 1 of 5

Instruction. Neoga Community Unit School District #3 Page 1 of 5 Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

Pulaski Technical College

Pulaski Technical College Pulaski Technical College Internet and E-Mail Acceptable Use Policy 1. Introduction Pulaski Technical College provides faculty and staff with technology resources and a local area network with access to

More information