Mountain Ash Comprehensive School Ysgol Gyfun Aberpennar. Network Security Policy
|
|
- Marilyn Bond
- 8 years ago
- Views:
Transcription
1 Mountain Ash Comprehensive School Ysgol Gyfun Aberpennar Network Security Policy Updated: September 2010 Next update: September 2013
2 Table of Contents: Supervised Use page 1 Privacy...page 1 User Access..page 1-2 File Security..page 2 Software Inventory...page 2 Access to Software..page 2-3 Access to Printers page 3 Hardware Security...page 3 Electrical Safety...page 3 Fire Precautions...page 4 Internet Security...page 4-5 1
3 The school network is a valuable resource that is freely available to all pupils and staff from all computers situated throughout the school. Due to the wide variety of uses by well over a thousand users, a number of precautions have to be taken to help ensure that the system is kept available and in full working order: Supervised Use The use of the network should be supervised as closely as is reasonably possible during timetabled lessons. It should be realized however, that all users do have access to the network at other times and with very little supervision beyond the restrictions outlined below. Network Administrator can view a computer screen at any time from anywhere on the school network without the user knowing about it. Normal classroom rules apply, and prohibitions such as eating, drinking, grooming and spraying aerosols are strictly reinforced due to the serious damage that may be caused to the equipment. Pupils may drink water in the computer room, but away from the computer. Privacy Computer (file) storage areas will be treated as school property. Network Administrator may look at files and communications to insure that the system is being used responsibly. Users should not expect that their work and s will always be private. User Access All users are required to log on with their own personal username, which will remain with them throughout their time at this school. All users have their own password to allow them to log on, which should not be made available to anyone else. Student Passwords are set by the Network Administrator for pupils in Year 7, 8 and 9. These are only changed, with the consent of the Administrator, when problems are identified. Year 10, 11, 12 and 13 pupils may change their passwords as required. Staff Passwords are set to expire and changes are automatically enforced as follows: o Teaching staff Termly o Support staff with access to SIMS Monthly Passwords are restricted to at least six characters and may not be reused for some time. The repeatedly incorrect entry of a password will result in the user being locked out until reset by an administrator. Staff User areas left logged-on and unattended are protected by a screen-saver password. This is set to a default of 5 minutes. Accounts not used within a full academic year may be deleted, including all work saved. All network system and administration passwords are recorded and kept in a secure place. 2
4 File Security All users have their own area for storing their work on the network server hard disk (the "my document" folder). This means that they can access their work from any network station. To reduce the chances of the server hard disk filling up and crashing the whole network, the amount of disk space for each user is limited. Overflowing this limit will cause the user to be unable to save the files until the Network Administrator increases disk space or sufficient files have been deleted or mixed to alternative storage media. Users do not have access to station and network drives nor are they able to alter or save files outside their own area (except in the authorized shared topic areas). Precautions are taken to reduce the chances of infection by computer viruses via the Internet, , or other storage media. The antivirus software, which is installed on all school network stations and servers, is updated every day. Network stations cannot be booted up from a floppy disk left in the disk drive. The Network Administrator has a comprehensive procedure for ensuring back-up of the system both on and off site (see Administrator Notes) Staff and pupils should also be encouraged to perform backups of the files they take home, on suitable storage media. Station backups are not required. A faulty station can be quickly rebuilt with all the necessary software via files stored centrally on the server. The network servers are located within a separate server room. This room is kept locked when not under direct supervision. Software Inventory An inventory is maintained containing a record for each item of software that is available for use on the network and the number of licences held. Licences and invoices must be sent to the IT department for filing in case proof of ownership is required. Access to Software All users receive desktop icons and start-menu-shortcuts to all the main application programs and common utilities. Users are guided onto the network via program sets for each of the curriculum subjects. Shortcuts/icons are provided to programs that are relevant to the study of each subject as well as any shared documents provided by the subject teachers. Pupils have read-only access to these shared documents but may copy them for their own use. Users can only access software and other resources as made available to them by the administrator. For example, pupils do not have access to staff programs and shared documents. Access to certain resources such as Internet software may also be removed for certain network users, where found to be necessary. 3
5 Sites visited on the Internet are filtered, logged and audited - see our Internet Security Policy below. Access to Printers To encourage good management and reduce wastage of ink and paper, the number of pages for each user is currently limited and is reinstated each week. Attempts to print beyond this credit limit are automatically denied by the system. Users may ask for more credits on production of the evidence or wait until the following week. Hardware Security An inventory is maintained of all equipment together with make, model, serial number, date of purchase and location. Rooms with computers should be locked overnight. Keys to computer rooms are recorded and monitored. All external visitors are required to report to the office and wear identification at all times. All computer rooms and corridors are monitored by the school alarm system after school hours. All major items are security marked to identify them as the property of the school. Mouse balls are sealed permanently to prevent tampering. Electrical Safety All equipment attached to the main electrical supply is safety tested regularly. The servers operate from an Uninterruptible Power Supply (UPS) to protect against power surges and blackouts. Fire Precautions Waste material should be frequently removed from the computer areas. A carbon dioxide (CO2) fire extinguisher is required in all main computer rooms and staff should ensure that they know where it is and how to use it. Internet Security The Internet is a valuable resource that is freely available to all pupils and staff on all our school network stations. Due to the "unsuitable" nature of some material on the Internet and the possible misuse of , a number of precautions have to be taken to help ensure that the system is used responsibly: The use of the Internet will be supervised as closely as is reasonably possible during timetabled lessons. It should be realized however, that users do have access to the Internet at other times and with very little supervision beyond the restrictions outlined below. Classroom staff can view a computer screen in 4
6 the room they are supervising at any time from within that room without the user knowing about it. The Internet may be accessed on all network stations at all times. Individual department websites contain links to sites that are relevant to the study of that subject and which have been selected by the teachers of that subject. The school cannot be held responsible for the contents of any external websites including those visited via links on sites recommended by school staff. The search engines that are provided as links on our web pages are only those that make an effort to prevent the inclusion of links to "unsuitable" sites in the listed results of any searches made. Access to many, if not most sites considered to contain "unsuitable" material, is prevented by a filtering system provided by Research Machines. As new sites of this nature come online and come to the attention of staff they can be filtered immediately. Chatlines are not considered to be a suitable use of a busy school network system nor of anyone s time in school. All staff and pupils have their own personal address, which will not be made available to anyone outside of the school except by the individual themselves. s are also restricted by size to reduce the possibility of "unsuitable" material being received or sent by attachment. Precautions are taken to reduce the chances of infection by computer viruses via the Internet or , which may then be inadvertently taken or sent home. The antivirus software, which is installed on all school network stations, is continuously updated. Users found searching for "unsuitable" material or sending offensive messages will have their access denied and further action taken depending on the nature of the offence. Repeated abuse of the facilities will result in further and more serious action being taken. 5
7 N:\C E Saunders (Dep Head)\MISC\MACS Network Security Policy doc 6
Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy)
Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy) What is E-Safety? E-Safety encompasses Internet technologies and electronic communications such as mobile
More informationInformation Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
More informationTukwila School District #406. Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080. Computer and Phone Support Handbook
Tukwila School District #406 Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080 Computer and Phone Support Handbook Revised: July 2009 Table of Contents Network Systems Department
More informationTameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
More informationNetwork and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
More informationADMINISTRATION COMPUTER NETWORK
ADMINISTRATION COMPUTER NETWORK School Administrative Computer Network The Cumberland School operates a network of computers specifically for administrative purposes in the school. This network is electronically
More informationSITTINGBOURNE COMMUNITY COLLEGE IT SUPPORT MANAGER. Job Description
SITTINGBOURNE COMMUNITY COLLEGE IT SUPPORT MANAGER Job Description Swale Academies Trust Job Description for Sittingbourne Community College IT Support Manager Sittingbourne Community College IT Support
More information1:1 COMPUTER PROGRAM LAPTOP POLICY
1:1 COMPUTER PROGRAM LAPTOP POLICY STATEMENT The focus of learning with laptops at Greater Clark County Schools (GCCS) is to prepare students for their future, a world of digital technology and information.
More informationHow To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
More informationAuthorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together
Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationDene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
More informationEMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards
EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data
More informationNETWORK AND INTERNET SECURITY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004
More informationST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS
ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS Contents:- 1. College policy. 2. Roles and Responsibilities 3. College procedures. 4. College rules for internet use by students. 5.
More informationICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
More informationINFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET
INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET ACCEPTABLE USE POLICY As part of the College IT programme we offer pupils filtered access to the Internet. Before being allowed to use
More informationThe Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
More informationPrimrose Hill School Internet Access Policy
Date: September 2014 Date of next review: September 2015 Primrose Hill School Internet Access Policy INTERNET ACCESS POLICY Euxton Primrose Hill s Internet Policy has been written by the Computing coordinator
More informationTECHNICAL SECURITY AND DATA BACKUP POLICY
TECHNICAL SECURITY AND DATA BACKUP POLICY PURPOSE Effective technical security depends not only on technical measures, but also on appropriate policies and procedures and on good user education and training.
More informationBerwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
More informationICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
More informationStudents KS2-3 Acceptable Use Policy
Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions
More informationQuick Guide to managing your SafetyNet Plus software
Quick Guide to managing your SafetyNet Plus software Updated 27 August 2015 https://swgflfiltering.rm.com 1 P a g e Contents Overview... 3 How the filtering software works... 4 Logging on... 5 Logging
More informationHow To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
More informationTEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015
TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015 Tekamah-Herman Community Schools is proud to offer our High School Students Apple MacBook Air computers for use at school
More informationIT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST
INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT
More informationScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
More informationGrasmere Primary School Asset Management Policy
Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the
More informationSibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
More informationAcceptable Usage Guidelines. e-governance
Acceptable Usage Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
More informationTREYNOR LAPTOP HANDBOOK
TREYNOR LAPTOP HANDBOOK PLEASE NOTE: Given the changing nature of technology use and applications, laptop handbook provisions are subject to change over the course of the school year. If such changes occur,
More informationLighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15)
Lighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15) Student Name Date Responsible Use Agreement (in four parts) Part 1: Responsible Internet and Network Use Part 2: Responsible
More informationHow To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
More informationDulwich College ICT Acceptable Use Policy
Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These
More informationWorking Together Aiming High!
Poplar Street Primary School ICT Security and Acceptable Use Policy E-Safety policy 2013/14 Working Together Aiming High! 1 Contents 1. Introduction... 3 2. Policy Objectives... 3 3. Application... 3 4.
More informationJGSC Laptop Agreement
JGSC Laptop Agreement The mission of the 1:1 program at JGSC is to create an innovative, collaborative learning environment for students and teachers. Together, they will implement creative uses of educational
More informationAcceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
More informationAcceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
More informationInternet and Online Security Policy
Internet and Online Security Policy Policy Updated: Spring 2015 Adopted by Staff and Governors: Spring 2015 Date for Review: Spring 2016 1 Internet and Online Security Policy Contents 1 Aims and Objectives...
More informationNETWORK INFRASTRUCTURE USE
NETWORK INFRASTRUCTURE USE Information Technology Responsible Office: Information Security Office http://ooc.usc.edu infosec@usc.edu (213) 743-4900 1.0 Purpose The (USC) provides its faculty, staff and
More informationInformation Security Policy
Information Security Policy The purpose of this Policy is to describe the procedures and processes in place to ensure the secure and safe use of the federation s network and its resources and to protect
More informationLAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
More informationChromebook Guidelines for Students and Parents
Chromebook Guidelines for Students and Parents This document provides detailed information to parents and students about how to care for the technology being entrusted to them. 1. Receiving a Chromebook
More informationCC. TECHNOLOGY ACCEPTABLE USE POLICY. 1. Purpose
CC. TECHNOLOGY ACCEPTABLE USE POLICY 1. Purpose a. The Children s Internet Protection Act (CIPA), 47 U.S.C. 254(h)(5), and South Dakota Consolidated Statues Section 22-24-55 require public schools to implement
More informationMeridian Public Schools Laptop Policy
Meridian Public Schools Laptop Policy The focus of the learning with laptops program at Meridian Public School is to prepare students for their future, a world of digital technology and information. As
More informationA Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2
More information51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
More informationInformation Technology Policy
Faculty of Computer Science & Information Technology Information Technology Policy Introduction: Faculty of Computer Science and Information Technology mission is to be a Centre of Excellence, internationally
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationHamlin School District Student Computer Handbook
Hamlin School District Student Computer Handbook 2014-2015 INTRODUCTION All 9 th -12 th grade students will be issued computers for use as part of their educational curriculum. The purpose of these computers
More informationUSFSP Network Security Guidelines
USFSP Network Security Guidelines Table of Contents I. Access to Data II. Workstations and Personal Computers A. Computer Viruses B. Software C. Hardware D. Storage Media III. Local Area Networks (LANs)
More informationdistrict Legal Networking
COMPUTER NETWORK FOR EDUCATION REGULATION 4526-R The following rules and regulations govern the use of the district's computer network system and access to the Internet. I. Administration The Superintendent
More informationINTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP)
4510.2 INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP) The Board of Education is committed to the optimization of student learning and teaching. The Board considers computers to be a valuable tool for
More informationHow To Use A Tablet/Laptop At A School District Computer At Home
Tablet - Laptop Policy, Procedures, and Information 2013-2014 School Year Chester Area HS/MS Chester, South Dakota Chester Area HS/MS Tablet/laptop Program The focus of the 1:1 Classroom Connections Program
More informationProtection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
More informationIntroduction. General Use
Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use
More informationPierce County Policy on Computer Use and Information Systems
Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail
More informationMicrosoft Windows Client Security Policy. Version 2.1 POL 033
Microsoft Windows Client Security Policy Version 2.1 POL 033 Ownership Policy Owner: Information Security Manager Revision History Next Review Date: 2 nd April 2015 Approvals This document requires the
More informationINFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY
INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY Your access to, and use of, the Heathfield High School IT System must be - Only for school use with regard to your subject work. In accordance
More informationInformation Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
More informationWHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES
WHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES Approved: December 2014, Full Governing Body Next review due: December 2016 The key aim of the whole school ICT team is to support
More informationONE-2-ONE LEARNING LAPTOP PROGRAM 2011
GLENUNGA INTERNATIONAL HIGH SCHOOL ONE-2-ONE LEARNING LAPTOP PROGRAM 2011 Department of Education and Children s Services T/A South Australian Government Schools CRICOS Provider No. 00018A 1. VISION and
More informationE-SAFETY POLICY. Signed. for school. Signed for Governors. Date..
E-SAFETY POLICY Signed. for school Signed for Governors Date.. RATIONALE E-safety encompasses Internet technologies and electronic communications such as mobile phones as well as collaboration tools and
More informationLaptop Provision Loreto College, Ballarat
Laptop Provision Loreto College, Ballarat Overview Loreto College is committed to providing all students with relevant, rigorous and engaging learning opportunities and understands that students learn
More information2.2 Access to ICT resources at the Belfast Metropolitan College is a privilege, not a right, and all users must act honestly and responsibly.
1 Purpose The purpose of this document is to set out the College's policy and provide guidance relating to the responsible use of the College's ICT resources and systems. 2 General 2.1 Belfast Metropolitan
More informationStudents are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationNAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures. (March 2012)
NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures (March 2012) Contents Ownership... 3 Privately-owned devices... 4 Optional peripherals... 4 Warranty & Insurance... 4 Stolen or Lost Laptops...
More informationTrinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the
More informationCOMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
More informationDevelopment / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
More informationData Protection and Information Security Policy and Procedure
Data Protection and Information Security Policy and Procedure Document Detail Category: Data Protection Authorised By: Full Governing Body Author: School Business Manager Version: 1 Status: Approved May
More informationONE TO ONE LAPTOP PROGRAMME POLICY
ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...
More informationSUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
More informationCHS 1:1 With Chromebooks Procedures and Info for Students and Parents. 1. Receiving Your Chromebook. 2. Returning Your Chromebook
CHS 1:1 With Chromebooks Procedures and Info for Students and Parents The mission of the 1:1 program in at Carmel High School is to create a collaborative learning environment for all learners. This environment
More informationCreated By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
More informationComputer System Information Century School District 2007-08 Daniel E. Cook
Computer System Information Century School District 2007-08 Daniel E. Cook Account Log On There are various ways to log on to the school s server. Each one has a unique reason. Teacher Log On Teacher Log
More informationU.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
More informationE-SAFETY POLICY. The Kingswinford School - a science college. December 2014. Every Child a Scientist. Page 1
The Kingswinford School - a science college E-SAFETY POLICY December 2014 Page 1 E-Safety Policy - Advice and Guidance Setting This guidance applies to all members of the school community (including staff,
More informationNetwork Security. Task 1 Security Measures
Task 1 Security Measures Connecting your computer to a network, particularly the Internet, can put your computer and your data at risk. It is important, therefore, that you take some steps to secure your
More informationRoles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
More informationJMA Domain Instructions/Policies
JMA Domain Instructions/Policies Login (for faculty and students): If you have used one of our labs before (you have a JMA account), your username is the same. If you have not been in the lab before, your
More informationMelville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students
Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3
More informationChromebook Procedures and Information for Students and Parents
for Students and Parents Central R-3 High School 1:1 With Chromebooks Procedures & Information For Students and Parents The mission of the 1:1 program in the Central R-3 High School is to create a collaborative
More informationEMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
More informationFREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
More informationBROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
More informationSt Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
More informationHow will pupils gain access to the Internet and VLEs at Saintfield High School?
SAINTFIELD HIGH SCHOOL POLICY FOR THE ACCEPTABLE USE OF THE INTERNET AND VIRTUAL LEARNING ENVIRONMENTS What is the Internet? The Internet is an electronic information highway connecting many thousands
More informationThe Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014
The Practice of Internal Controls Cornell Municipal Clerks School July 16, 2014 Page 1 July 18, 2014 Cash Receipts (Collection procedures) Centralize cash collections within a department or for the local
More informationMCR Checklist for Automated Information Systems (Major Applications and General Support Systems)
MCR Checklist for Automated Information Systems (Major Applications and General Support Systems) Name of GSS or MA being reviewed: Region/Office of GSS or MA being reviewed: System Owner: System Manager:
More informationAcceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
More informationSystem and Network Security Policy Internet User Guidelines and Policy. North Coast Council. 5700 West Canal Road Valley View, Ohio 44125
North Coast Council 5700 West Canal Road Valley View, Ohio 44125 Telephone: 216-520-6900 Fax: 216-520-6969 1885 Lake Avenue Elyria, Ohio 44035 Telephone: 440-324-3185 Fax: 440-324-7355 URL: www.nccohio.org
More informationCreating a managed service using the SWGfL Filtering software
Creating a managed service using the SWGfL Filtering software Contents Overview... 2 How the filtering software works... 3 Logging on... 4 Web Access Policy... 5 Editing your school list... 6 Creating
More informationDraft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
More information1 Laptop Handbook 2015-2016 Faith High School Laptop/Tablet Program
1 Faith High School Laptop/Tablet Program The focus of the 1:1 Laptop Initiative (Classroom Connections) at Faith High School is to prepare students for their future, a world of digital technology and
More information1 The benefits of Internet access for education... 2. 2 Whole-Academy network security strategies... 2. 2.1 Hardware and software infrastructures...
CITY ROAD PRIMARY ACADEMY ACCEPTABLE AND RESPONSIBLE USE OF IT RESOURCES (INTERNET ACCESS AND EMAIL POLICY STAFF AND STUDENTS) Contents 1 The benefits of Internet access for education... 2 2 Whole-Academy
More informationNHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction
NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers
More informationThe Internet Acceptable Use Policy (for parents and children)
Contact: Susan Seale The Internet Acceptable Use Policy (for parents and children) This policy is made available via the school website, is provided to all parents (current and prospective) in the office,
More information