Information Systems Acceptable Use Policy for Learners

Similar documents
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

ICT Student Usage Policy

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Internet Use Policy and Code of Conduct

INTERNET AND POLICY

Policy No: 2-B8. Originally Released: Date for Review: 2016

ICT Acceptable Use Policy. August 2015

INTERNET, AND COMPUTER USE POLICY.

Rules for the use of the IT facilities. Effective August 2015 Present

Conditions of Use. Communications and IT Facilities

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Technology and Communications Policy

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

INTERNET, USE AND

Internet, Social Networking and Telephone Policy

Acceptable Use Policy Internet and - Students

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Information Management and Security Policy

Dene Community School of Technology Staff Acceptable Use Policy

ICT POLICY AND PROCEDURE

Hull Teaching Primary Care Trust INTERNET USE POLICY

Using Public Computer Services in Somerset Libraries

E Safety Policy. 6 th March Annually. 26 th February 2014

Electronic Communications Guidance for School Staff 2013/2014

How To Deal With Social Media At Larks Hill J & I School

UNIVERSITY OF ST ANDREWS. POLICY November 2005

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & POLICY AND CODE

Acceptable Use of Information Technology Policy

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

LINCOLN COLLEGE INTERNET, , AND COMPUTER ACCEPTABLE USE POLICY

Acceptable Use Policy

& Internet Policy

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

PeopleMatrix Application Hosting Services Agreement

Policies Concerning the use of Computers

SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

COMPUTER USAGE -

Acceptable Use of Information. and Communication Systems Policy

INTERNET, AND PHONE SYSTEMS

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Sibford School Student Computer Acceptable Use Policy

Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy

HUMAN RESOURCES POLICIES & PROCEDURES

If you have any questions about any of our policies, please contact the Customer Services Team.

Acceptable Use Policy

GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES

Acceptable Use of Information and Communication Systems Policy

THE PERSONAL USE OF INTERNET, AND TELEPHONES

POLICY ON USE OF INTERNET AND

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Acceptable Use Policy

INTERNET ACCEPTABLE USE POLICY

Use of ESF Computing and Network Resources

Acceptable Use of Information Technology

TECHNOLOGY USAGE POLICY

St. Peter s C.E. Primary School Farnworth , Internet Security and Facsimile Policy

West Lothian College. and Computer Network Responsible Use Policy. September 2011

Terms and conditions of use

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

Cellular/Smart Phone Use Procedure

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

USE OF INFORMATION TECHNOLOGY FACILITIES

Internet, Social Media and Policy

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

How To Behave At A School

Terms and conditions of use

MIB recommends that you print a copy of these Terms of Use for future reference.

ITU Computer Network, Internet Access & policy ( Network Access Policy )

The Bishop s Stortford High School Internet Use and Data Security Policy

Covered California. Terms and Conditions of Use

Acceptable Use Policy - NBN Services

UNESCO-IHE Code of Conduct regarding Information Technology (IT)

Broadband Acceptable Use Policy

Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears.

Summary Electronic Information Security Policy

, Internet & Telephone. Policy and Procedure

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

Acceptable Use of ICT Policy. Staff Policy

IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT

1. Name of Document: IT Acceptable Use Policy. 2. Originator: Deputy Principal

Information Security

Policy and Code of Conduct

Institute of Education University of London Computer Security Policy

City of Venice Information Technology Usage Policy

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

Public Schools of CLK Acceptable Use Policy for Electronic Resources iclk Learning Initiative

I.T. Facilities Acceptable Use Policy

Information Technology Acceptable Use Policy

Nazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures

You must not: (a) Copy and republish material from this website (including republication on another website);

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:

Transcription:

Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs to ensure that these facilities are used appropriately in pursuance of the College s business. 1.2. This policy provides clear guidance on the use of the College s internet, e mail, photocopying, printing and computer facilities. 1.3. It is also intended to safeguard the College and its learners from information security related incidents and any consequential action, loss of income or damage. 1.4. Any queries about this policy should be addressed to the IT Services Manager. 1.5. This policy will be updated as necessary. 2. Scope 2.1. In this policy, inappropriate, offensive, obscene or pornographic material is material that the College considers (at its absolute discretion) to be racist, sexist or otherwise discriminatory, containing nudity or images of a sexual nature or which does or could cause offence to people or, material that is illegal or defamatory. 2.2. In this Policy, the term Information Systems refers to any computers, peripherals, computer software, files generated regardless of the medium on which stored, computer networks, telephone systems, mobile telephones, e mail, internet, voicemail and all other forms of electronic communication owned or operated by the College. 2.3. In this policy data refers to all communications and information created, sent, received, deleted, stored or otherwise associated in any way with the College s information systems. Data is not the property of any user. 2.4. Unless otherwise stipulated, application of this policy extends to the use of all such Information Systems equipment wherever situated. 2.5. Use of the College s Information Systems is subject to the JANET Acceptable Use Policy and Eduserv User Acknowledgement of Third Party Rights. http://www.ja.net/documents/publications/policy/aup.pdf http://www.eduserv.org.uk/services/chest Agreements/about our licences/userobligations 2.6. Use of College Information Systems is also subject to relevant UK law. 3. Non compliance 3.1. Breach of any part of this policy may lead to disciplinary action and / or facilities being withdrawn. 3.2. Disciplinary action will be taken in accordance with the College s Student Disciplinary Code 3.3. Material that is likely to deprave and corrupt if published may constitute a criminal offence under the Obscene Publications Act and if found on the College s systems may be treated as a criminal offence as well as gross misconduct. 3.4. Accessing websites or material that promote terrorism or violent extremism or that seek to radicalise individuals to such causes may constitute an offence under the

Counter Terrorism and Security Act 2015 and be treated as a criminal offence as well as gross misconduct. Learners who wish to use College facilities to research terrorism or counter terrorism in the course of their learning must notify their tutor who must submit due authorization to the Learner Services Manager before such research is commenced. 3.5. The College may at its discretion withdraw or restrict access to internet sites it believes are disrupting service or being accessed excessively for personal use. 3.6. Action taken by the College does not mean that the individual may not also be liable to civil or criminal action in the courts if appropriate. 4. Personal use 4.1. Learners may have use of College internet services for personal use, however it must not interfere with course delivery or affect the quality of service provision. 4.2. Learners should restrict personal use of College computer equipment to facilities available in the Library and do so in a way that is not disruptive to other Library users. 5. Acceptable Use 5.1. The College s information systems are provided to allow learners to undertake activities commensurate with their studies. 5.2. The College s information systems may also be used for academic research and for professional development. 5.3. The College s Information Systems may not be used for: Personal financial interests or commercial ventures to secure personal advantage including profit or gain making activities not formally sanctioned by the College; wasting resources (e.g. people, capacity, computer equipment, consumables); altering or destroying the integrity of computer based information; compromising the privacy of users; downloading, installing or removing software without authority; downloading, storing, creating or viewing obscene material; making defamatory statements about a person or organisation; playing computer games; propagating unsolicited commercial or advertising material, chain or junk e mails; on line gambling; infringing copyright; streaming audio and visual files not for professional use using the College telephone system for personal calls. political campaigning, petitions or fund raising, including activities relating to party political and single issue political campaigns or events unless agreed by the College; any activities incompatible with the College s policies on Equality and Diversity. Learners who make use of the College s information systems for the following will automatically be deemed to have committed an act of gross misconduct under the College Student Disciplinary Code: using College information systems to access, create or distribute, obscene or indecent material including that which is pornographic, racist, sexist or violent, or which promotes terrorism or seeks to radicalise individuals to such causes; deliberate or repeated introduction of computer viruses, trojans or malicious software; using College systems to threaten, harass, discriminate or bully; gaining unauthorised access to computer systems;

deliberate attempt to circumvent the College s computer security & monitoring systems; any illegal activity including the use of unlicensed software or data; unauthorised disclosure, alteration or removal of data processed or stored on computer systems owned or operated by Morley College; posting online comments that brings the College into disrepute. 5.4. Learners should maintain good hygiene standards and refrain from consuming food or drink and from smoking, in close proximity of College Information Systems equipment, whether using it within or outside of the college. 5.5. Learners should refrain from making any excessive noise that may disrupt others. 5.6. Learners may be liable for the costs of remedying any deliberate damage they cause to the College s Information Systems. 6. E mail 6.1. While e mail correspondence tends to be a more informal form of communication, UK legislation requires very little formality in order to create a binding contract that incurs legal liabilities. Learners should therefore not enter into contractual commitments via the Internet or e mail unless they have explicit authority to do so. 6.2. Learners should be aware that UK legislation including the laws of libel and defamation also apply to electronic documents. 6.3. When using e mail learners should communicate in a professional manner, thinking carefully about what is said about other persons or organisations. Learners should be mindful that e mails may be used as an official record and therefore should not be overly familiar or informal. 6.4. Learners should never e mail hastily or out of anger use aggressive, abusive or deliberately anti social language in e mails. The use of capitalised text in e mail should be avoided. 6.5. Learners should not send sexual, racially biased or other inappropriate e mails, which would infringe the College s code of conduct. 6.6. Learners should consider whether alternative means of communication such as the telephone or meeting in person, may be more appropriate when discussing complex, confidential or urgent matters. 6.7. Learners should take care when disclosing their e mail address to ensure it will not be misused for unsolicited e mail, some of which may contain malicious code. 6.8. Learners are advised to regularly delete e mails when no longer needed. 7. Printing and Photocopying 7.1. Learners are able to use the colour printing and photocopying equipment in the Library, subject to a charge for their usage 7.2. The manufacturer s guidelines should be followed at all times when using College printing and photocopying equipment. 7.3. To reduce the impact of paper usage, double sided photocopying and printing should be adopted whenever possible and practical. 7.4. Electronic communication such as e mail and the College VLE Moodle should be used in preference to paper where possible. 7.5. Learners should ensure they have permission to photocopy or scan documents and other materials to avoid infringement of copyright.

8. Software 8.1. Morley College uses computer software in all aspects of its business. 8.2. The College is required by law to have a licence for every piece of software as both individuals and the College can be liable in the civil and criminal courts for software theft. 8.3. No computer software of any kind may be installed on any part of the College s Information Systems without the prior permission of IT Services. 8.4. Learners should not download software from either the Internet or from e mail attachments. Failure to observe this may breach the Copyright, Designs and Patents Act 1988. 8.5. Software will only be installed if covered by a licence and authorised by IT Services to ensure compliance with copyright law and to prevent the introduction of viruses or sub standard software which might interfere with other applications. 8.6. Learners should not use College Information systems to duplicate or distribute software either within or outside of the College, unless formally authorised to do so. 8.7. Learners should not attempt to reverse engineer or decompile software products unless this is explicitly permitted within the terms of the Agreement for the use of the Product. 9. Security 9.1. The College has a duty to protect its data and the IT systems that support them in order to ensure business continuity and minimise the effects of security incidents. 9.2. It is the responsibility of all users of College Information Systems to comply with the College's Data Protection Policy and the Data Protection Act. 9.3. Learners are allocated a user name and password upon registration with the Learning Resources Helpdesk in the Lower Library, for which they are then responsible. 9.4. Learners may also be allocated a temporary account for use during IT classes or exams. 9.5. Learners should only access the College s Information Systems using their allocated user name and password and not divulge passwords to others. 9.6. Learners should ensure they log out of or shutdown their computer when they have finished using it or lock their computer when it is left unattended. 9.7. Learners should ensure they change their password regularly or as prompted to by the College s password policy. 9.8. All College equipment, including that used off site (e.g. laptops) should be physically protected both to reduce the risk of unauthorised access and learners are to take all reasonable steps to safeguard against loss or damage. 9.9. Learners should return all College equipment made available to them at the end of any designated loan period, or when requested. 9.10. All computers should have up to date anti virus software installed. 10. Monitoring 10.1. The College hereby notifies learners that use of the College s Information Systems may be automatically logged to permit the investigation of infringements of College Policies. 10.2. Learners are also notified that this will include automated scanning of internet access on College computer systems, undertaken as a control mechanism to: detect abuse, inappropriate language or images, prevent viruses and malicious code from entering the network,

ensure service continuity. 10.3. Automatic logging and filtering is deemed the least intrusive method and will be used to prevent access to websites deemed unsuitable in a working environment. 10.4. Should a learner find they are blocked from accessing a website they require for their studies, they should contact the Learning Resources helpdesk. 10.5. All e mail and voice mail messages originated or received on College computer and telephone systems are the property of the College. Learners however may prefer to use an internet e mail account for personal e mails (see section 4 Personal Use). 10.6. An automatic back up of College Information Systems including e mail and Internet access will be administered by IT Services and held offsite by a third party storage provider for the purposes of business continuity. 10.7. The College hereby notifies learners that the College premises are monitored by CCTV for security reasons