DUVAL COUNTY PUBLIC SCHOOLS (DCPS) INFORMATION SECURITY PROGRAM SUBJECT: ACCEPTABLE USE POLICY (AUP) POLICY NUMBER: 8.71
|
|
|
- Sabina Parrish
- 10 years ago
- Views:
Transcription
1 ACCEPTABLE USE POLICY (AUP) POLICY NUMBER: 8.71 PURPOSE/SCOPE: This establishes the School Board Policy for Acceptable Use of Information Resources and applies to all users of DCPS information resources. Individuals using information resources belonging to DCPS must act in a legal, ethical, responsible, and secure manner, with respect for the rights of others. The primary purpose of the DCPS network is to assist in preparing students for success in life and work in the 21st century. Networks provide the ability to share educational and research resources from around the world. These resources include access to instructional/business applications, interactive collaboration between teachers, students and other users, document sharing, and communications of all forms with people from around the world. Access to computers, computing systems and networks owned by the School Board is a privilege which imposes certain responsibilities and obligations, and which is granted subject to DCPS policies and procedures, Code of Student Conduct, the Code of Ethics of the Education Profession in the State of Florida, and governing laws. These procedures sets forth the principles that govern appropriate use of information resources, and is intended to promote the efficient, ethical and lawful use of these resources. 1. DEFINITIONS 1.1. Access The right to enter or make use of a computer system. To approach, view, instruct, communicate with, store data in, retrieve data from, or otherwise make use of computers or information resources Administrative Access Enhanced privilege level that allows the user to perform administration of the system Account A set of privileges for authorization to system access, which are associated with a user id Information Resources The procedures, equipment, facilities, software and data that are designed, built, operated and maintained to collect, record, process, store, retrieve, display and transmit information Audit Trail In computer security systems, a chronological record of system resource usage. This includes user login, file access, other various activities, and whether any actual or attempted security violations occurred, legitimate, and unauthorized Information Custodians Individuals who maintain or administer information resources on behalf of Information Owners. They are guardians or caretakers who are charged with the resource owner s requirements for processing, telecommunications, protection controls, and output distribution for the resource.
2 POLICY NUMBER:8.71 Page 2 of Information Owners The individuals ultimately responsible for information resources, and are generally Directors or designated senior managers. The initial owner is the individual who creates, or initiates the creation or storage of, information. Once information is created or stored, the individual s respective DCPS business unit becomes the Owner, with the Director of that unit taking official responsibility Information Security Manager (ISM) Directs the organization's day-to-day management of its Information Systems Security Program. This individual is also responsible for coordinating all security-related interactions among organizational elements involved in the Information Systems Security Program Information Users Individuals who use or have access to DCPS s information resources, including employees, vendors, and visitors Password Any secret string of characters which serves as authentication of a person s identity (personal password), or which may be used to grant or deny access to private or shared data (access password) Personal Use Activity that is conducted for purposes other than accomplishing official or otherwise authorized activity System Administrator A designated individual who has special privileges to maintain the operation of a computer application or system. 2. PROCEDURES & GUIDELINES Employees shall use DCPS provided information resources primarily for DCPS related business in accordance with their job functions and responsibilities. Employees are permitted limited personal use of information resources if the use does not result in a loss of associate productivity, interfere with official duties or business, and involves minimal additional expense to the School Board. Unauthorized or improper use of information resources may result in loss of use or limitations on use of those resources or disciplinary action Employees are required to comply with the District s Information Security Program and its procedures. Updated procedures will be sent to all employees using the District s system.
3 POLICY NUMBER:8.71 Page 3 of Pursuant to the Children s Internet Protection (CIPA) Act, DCPS uses filtering software to screen Internet sites for offensive material. DCPS acknowledges the fact that inappropriate materials exist on the Internet and will do everything it can to actively avoid them. To that extent, DCPS has implemented technology protection measures that filter Internet access to block visual displays that are obscene, pornographic, or harmful to minors. The Internet is a collection of thousands of worldwide networks and organizations that contain millions of pages of information. Users are cautioned that many of these pages contain offensive, sexually explicit, and inappropriate material. In general it is difficult to avoid at least some contact with this material while using the Internet. Even innocuous search requests may lead to sites with highly offensive content. Additionally, having an address on the Internet may lead to receipt of unsolicited containing offensive content. Users accessing the Internet do so at their own risk. No filtering software is one hundred percent effective... In the event that the filtering software is unsuccessful and children and staff gain access to inappropriate and/or harmful material, the District will not be liable DCPS makes no guarantee that the functions or the services provided by or through the District s network will be error-free or without defect. The District will not be responsible for any damage suffered, including but not limited to, loss of data or interruptions of service. Users are responsible for making a back-up copy of crucial files. The District is not responsible for the accuracy or quality of the information obtained through or stored on the network. The District will not be responsible for financial obligations arising through the unauthorized use of the network as the result of intentional misuse Software development, modifications, and documents of such become the intellectual property of the District when developed during work hours or used as part of their normal duties or instructional material in the classroom. Ownership, including all intellectual property rights, is and remains with DCPS The District is not responsible for the accuracy or quality of information obtained through the network. All users need to consider the source of any information they obtain through the network, and evaluate the accuracy of the information All software and equipment configurations installed on DCPS computers are owned by DCPS. All files and data stored on District equipment and back-up copies are considered to be the property of the District. The District retains the right to remove from its network any material it views as unnecessary, offensive or potentially illegal.
4 POLICY NUMBER:8.71 Page 4 of Use of any information obtained via the Internet is at the user's own risk. The District will not be responsible for any damages a user may incur. This includes, but is not limited to, loss of data resulting from delays, non-deliveries, misdeliveries, or service interruptions caused by negligence, errors, or omissions Access to the Internet from the district network as a tool for learning will be automatic. Parents must notify the school in writing if they do not want their child to access the Internet. See the Code of Student Conduct for details and opt-out form Any student access must be approved by the Principal, Chief Technology Officer (CTO), and Information Security Manager (ISM) Employees must maintain professional boundaries between themselves and students. Employees will not solicit or engage in inappropriate communications with students verbally, in writing, or electronically regardless of the age of that student. Employees will not engage in any direct electronic communications with students, parents, supervisors, or co-workers whether by , instant messaging, or other digital media that will adversely affects the employee s ability to perform his or her job DCPS employees are required to use their district assigned address for all electronic communications to DCPS parents and students. Using personal to communicate with DCPS parents and students is prohibited Employees are reminded that during non-working hours they are representatives of DCPS and should behave in a manner that does not bring disrespect or discredit the education profession. Unless engaging an officially sanctioned District activity, employees should clearly specify that any opinions or statements are the employee s and do not reflect the views of the District. Employees are prohibited from using officially sanctioned school district logos, school mascots, and other official symbols unless authorized to do so in advance When using School Board information resources, users are expected to: Act responsibly so as to ensure the ethical use of DCPS information resources Acknowledge the right of DCPS to restrict or rescind computing privileges at any time Use security measures to protect the confidentiality, integrity, and
5 POLICY NUMBER:8.71 Page 5 of 10 availability of information, data, and systems Act professionally and to refrain from using School Board information resources for activities that are inappropriate Respect all pertinent licenses, copyrights, contracts, and other restricted or proprietary information Use good judgment in accessing the Internet. Each use of the Internet should be able to withstand public scrutiny without embarrassment to DCPS or the School Board Safeguard their user IDs and passwords, and use them only as authorized. Any actions taken under an assigned identification (e.g., userid) are the responsibility of the user Respect School Board property Access and appropriately use and safeguard data to which access has been granted Exercise good judgment regarding the reasonableness of personal use Use information resources efficiently Comply with the Family Educational Rights and Privacy Act (FERPA) and state and federal laws governing the confidentially of employee and student records. Personally identifiable student information is confidential under Florida law and similar federal laws The following activities are strictly prohibited when using DCPS information resources Intentionally corrupting, misusing, or stealing software or any other computing resource Accessing DCPS systems that are not necessary for the performance of the associate s duties, including student and employee records Performing functions that are not related to the employee s job responsibilities on systems that they are otherwise authorized to access Making unauthorized changes to DCPS computer resources, including installation of unapproved software or interfering with security measures (such as audit trail logs and antivirus software) Copying DCPS proprietary software or business data for personal or other non-school Board use Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which DCPS or the end user does not have an active license Disseminating trade secrets or business confidential information, except
6 POLICY NUMBER:8.71 Page 6 of 10 as permitted by law or regulation Transmitting, storing, or processing classified data except as authorized and in accordance with the DCPS Information Systems Security Plan Unauthorized access to other computer systems using DCPS information resources Accessing information resources, data, equipment, or facilities in violation of any restriction on use, such as Peer-to-Peer Using School Board computing resources for personal or private financial gain Using another person's computer account, with or without their permission Implementing any computer systems without authorization from the CTO or designee Knowingly, without written authorization, executing a program that may hamper normal DCPS computing activities, such as Peer-to-Peer Adding unapproved components or devices to DCPS equipment without approval from the CTO or designee Attaching or assisting others in attaching non-dcps equipment to the DCPS network without first obtaining approval from the CTO or designee Knowingly introducing malicious programs into the network or server (e.g., viruses, worms, Trojan horses, bombs, etc.) Revealing account passwords to others or allowing the use of one s account or DCPS equipment by others, including family, friends and other household members. Users are ultimately responsible for the activity that occurs under their account and their assigned equipment Knowingly allowing a student to access their assigned laptop or administrative desktop. Students are only permitted to access student designated computers and should never access or logon to a teacher or administrative computer Revealing system passwords (e.g. DCPS system passwords, database passwords, etc) to anyone who is not specifically authorized to use them Exporting software, technical information, encryption software, or technology, in violation of international or regional export control laws Effecting security breaches or disruptions of network communication Unauthorized security scanning, network monitoring, or data interception that is not part of the associate s regular job duties and approved by the ISM Using the District s equipment or personal equipment while on DCPS property to connect to any wireless network not provided by DCPS without authorization from the ISM is prohibited and maybe illegal.
7 POLICY NUMBER:8.71 Page 7 of 10 External signals will not provide content filtering and access to private networks may be illegal Circumventing any DCPS information security measures Use of encryption software or hardware that has not been authorized by ISM Interfering with or denying service to other information resource users, such as using Peer-to-Peer Sending unsolicited messages (spam) Any form of harassment via , telephone, pager, IRC, SMS, or other communication method, whether through language, frequency, or size of messages Creating or forwarding "chain letters," "Ponzi" or other "pyramid" schemes of any type Engaging in any unauthorized fund-raising activity, participating in any lobbying activity, or engaging in any partisan political activity without specific permission from DCPS Posting agency information to external news groups, bulletin School Boards or other public forums without authority, or conducting any activity that could create the perception that communication was made in one s official capacity as a School Board associate, unless appropriate approval has been obtained Any personal use that could cause congestion, delay, or disruption of service to any School Board system or equipment Using School Board office equipment or information resources for activities that are illegal, inappropriate, or offensive to fellow employees or the public. This includes, but is not limited to, materials related to: Sexually explicit or sexually oriented content Offensive comments related to race, color, religion, gender, age, marital status, disability, sexual orientation, political or religious beliefs, national or ethnic origin, veteran status, or any other distinguishing physical or personality characteristics Anything that is in violation of sexual harassment or hostile workplace laws Making fraudulent offers of products, items, or services Gambling Illegal weapons or terrorist activities Planning or commission of any crime Forging or misrepresenting one s identity.
8 POLICY NUMBER:8.71 Page 8 of Auditing and Privacy: Users shall have no expectation of privacy while utilizing the DCPS network, equipment or information resources. This extends to any hardware attached to the DCPS network, even if such equipment or computer is not owned by DCPS. Any equipment attached to the DCPS network or on DCPS property is subject to be scanned, monitored, captured, and physically and electronically searched. This includes the right to confiscate any equipment if required as part of an investigation even if that equipment is not owned by the District. The District may disclose any data collected to Administration, internal and external law enforcement agencies Users agree to be governed by acceptable usage policies and to have their usage audited. By using School Board office equipment, employees imply their consent to disclosing the contents of any files or information maintained or passed-through School Board office equipment To the extent that employees wish that their private activities remain private, they should avoid using agency office equipment such as their computer, the Internet, or , for those activities Auditing procedures will be implemented to ensure compliance with DCPS security policies System administrators have the ability to audit network logs, employ monitoring tools, and perform periodic checks for misuse Accessing the Internet through District equipment is a privilege, not a right, and inappropriate use, including violation of this policy may result in limited, restricted or complete loss of the privilege Any user account may be closed, suspended or revoked at any time it is determined an account user or holder has used the network in an inappropriate or unacceptable manner in violation of this or any other applicable District policy Files and are protected by security permissions and only approved administrators can access or change permissions. Requests from supervisors to access subordinates files and must be approved by the CTO or their designee. Unless otherwise stated, submission of a trouble call or ticket will authorize technicians to access individual s permissions ( or hard drive) as it may be necessary for technical support personnel to review the content of an individual employee's communications during the course of problem resolution. Technical support personnel are not authorized to review the content of an individual employee's communications out of personal curiosity or at the behest of individuals who have not gone through proper approval
9 POLICY NUMBER:8.71 Page 9 of 10 channels Employees and contractors will electronically or physically sign an agreement to comply with the DCPS AUP Usage of DCPS IT resources for illegal purposes may be reported to appropriate authorities ROLES & RESPONSIBILITY Information Users are responsible for: Using information resources responsibly and in compliance with all DCPS information security policies and guidelines Reporting any suspected inappropriate use of information resources to their Principal, supervisor, or the ISM Supervisors are responsible for: Ensuring that their personnel understand DCPS protocol regarding acceptable usage of information resources Monitor their employees use of information resources. (Report any suspicious activity to the ISM) Information Owners are responsible for implementing measures to protect their resources against inappropriate use Information Custodians are responsible for assisting information owners with implementing measures to protect their resources against inappropriate use Information Security Manager (ISM) is responsible for auditing usage of the DCPS information resources to ensure compliance with policies and guidelines ENFORCEMENT Unauthorized or improper use of School Board information resources could result in loss or limitations of use of these resources, as well as disciplinary and/or legal action, including termination of employment, termination of contract, or referral for criminal prosecution.
10 POLICY NUMBER:8.71 Page 10 of 10 The Duval County Public Schools Acceptable Use Policy Agreement Form The following form must be read and signed physically or electronically by anyone using district computers or network resources. By signing this form, agreement is made to the terms in the Duval County Public Schools Acceptable Use Policy. In accordance with the Electronic and Communications Privacy Act of 1986, (18 USS Section 2510), users are hereby notified that there are no facilities provided by Duval County Public Schools for sending or receiving private or confidential electronic communications. All messages will be determined to be readily accessible to the general public. Duval County Public Schools shall be held harmless against any and all claims arising from said use. Name RC or Company Name Department I have read, understand, and agree to the Duval County Public Schools Acceptable Use Policy. I agree to follow the rules contained in these documents. I understand that if I violate the rules my account can be restricted or terminated, my access to computers revoked, and I may face other disciplinary measures. I hereby release the Duval County Public Schools, its personnel and any institutions with which it is affiliated, from any and all claims and damages of any nature arising from my use of, or inability to use, the district s network and computer systems, including, but not limited to claims that may arise from the unauthorized use of the system. If I work with students, I have read the Code of Student Conduct and agree to enforce them with students. Signature Date
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
REGION 19 HEAD START. Acceptable Use Policy
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Hyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
How To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
Acceptable Use Policy
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
Insert GNIS Logo Here. Acceptable Use Policy & Guidelines Information Technology Policies & Procedures. Guangzhou Nanhu International School
Insert GNIS Logo Here Acceptable Use Policy & Guidelines Information Technology Policies & Procedures Guangzhou Nanhu International School May, 2013 Table of Contents 1 Overview...1 2 Purpose...1 3 Scope...1
Acceptable Use Policy
Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
COMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
Chatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320
ACCEPTABLE USE OF VOICE, VIDEO AND DATA NETWORK Policy Code: 3225/7320 Chatham County Schools offers electronic network access for students, teachers, and staff within the school system. A component of
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN
LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN TITLE: NUMBER: BUL - 999.8 ISSUER: Acceptable Use Policy (AUP) For District Computer and Network Systems Ronald S. Chandler, Chief Information Officer
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
POLICY 4526. Adopted by Board of Education: 4/20/05
POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,
Acceptable Use Policy
Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
VIRTUAL LEARNING ACADEMY CHARTER SCHOOL POLICY EMPLOYEE ACCEPTABLE USE POLICY
VIRTUAL LEARNING ACADEMY CHARTER SCHOOL POLICY EMPLOYEE ACCEPTABLE USE POLICY GBEA Goals: The goal of Virtual Learning Academy (VLACS) in providing the technology resources, network services, the Internet
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
COMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
Commonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to interconnected computer systems within the district
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
Descriptor Code: EFE-P
ADMINISTRATIVE PROCEDURE Descriptor Term: ACCEPTABLE USE OF ELECTRONIC TRANSMISSION CAPABILITIES Descriptor Code: EFE-P Date Issued: October 30, 2003 Date Changed June 26, 2008 September 30, 2009 1. Network
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
RECOMMENDED EXECUTIVE BRANCH MODEL POLICY/GUIDANCE ON LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY
RECOMMENDED EXECUTIVE BRANCH MODEL POLICY/GUIDANCE ON LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY Federal CIO Council General Services Administration contact: [email protected]
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
POLICY SUPPORT OPERATIONS 5042 ACCEPTABLE USE POLICY FOR NETWORK AND INTERNET ACCESS
I. Overview Network and Internet access is available to students, teachers and staff in the Oneida City School District. The District s goal in providing such services is to promote educational excellence
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to the Internet, and a Bring
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) The Middletown City School District provides an electronic communications network that allows District-authorized individuals internal access
------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.
Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
AP 417 Information and Communication Services
AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for
Department of Veterans Affairs VA DIRECTIVE 6001 LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY
Department of Veterans Affairs VA DIRECTIVE 6001 Washington, DC 20420 Transmittal Sheet July 28, 2000 LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY 1. REASON FOR
U.S. Chemical Safety and Hazard Investigation Board
BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students AUP Sections 1. Acceptable Use 2. Privileges 3. Internet Access 4. Procedures & Caveats 5. Netiquette
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures Purpose The purpose of the ACH Network Acceptable Use Procedures is to provide the procedures, rules, guidelines,
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE
GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE IF YOU HAVE A MEDICAL EMERGENCY, YOU ARE INSTRUCTED IMMEDIATELY TO CALL EMERGENCY PERSONNEL (911). DO NOT RELY ON THIS WEBSITE OR THE INFORMATION PROVIDED
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE
Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students
La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy
LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology
INFORMATION SYSTEM GENERAL USAGE POLICY
PURPOSE The Information System General Usage Policy ("Policy") establishes appropriate uses of Devon s Information Systems. Devon provides secure Information Systems in accordance with the Information
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
