ICT POLICY AND PROCEDURE



Similar documents
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

ITU Computer Network, Internet Access & policy ( Network Access Policy )

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Human Resources Policy and Procedure Manual

City of Grand Rapids ADMINISTRATIVE POLICY

Online Communication Services - TAFE NSW Code of Expected User Behaviour

INTERNET ACCEPTABLE USE POLICY

INTERNET, AND COMPUTER USE POLICY.

Dauphin County Technical School

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

DIOCESE OF DALLAS. Computer Internet Policy

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Acceptable Use of ICT Policy For Staff

POLICY ON USE OF INTERNET AND

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

How To Behave At A School

ELECTRONIC COMMUNICATIONS: / INTERNET POLICY

CARRAMAR PUBLIC SCHOOL

Internet Use Policy and Code of Conduct

How To Use Your Cell Phone At Renaissance Academy Charter School

Revelstoke Board of Education Policy Manual

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

ICT Student Usage Policy

Sibford School Student Computer Acceptable Use Policy

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND USAGE POLICY

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

Services Policy

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

Acceptable Use Policy

Internet, Social Networking and Telephone Policy

Forrestville Valley School District #221

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

Acceptable Use of Information and Communication Systems Policy

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

, Internet & Telephone. Policy and Procedure

ICT Safe and Acceptable Use Policy for Students

Acceptable Use of ICT Policy. Staff Policy

ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY

SAS TRUSTEE CORPORATION ( STC )

13. Acceptable Use Policy

The Internet and 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

Acceptable Use of Information Systems Standard. Guidance for all staff

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.

Conditions of Use. Communications and IT Facilities

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Student Laptop User Charter

Sydney Technical High School

Delaware State University Policy

Dene Community School of Technology Staff Acceptable Use Policy

Dulwich College ICT Acceptable Use Policy

The Bishop s Stortford High School Internet Use and Data Security Policy

Acceptable Use of Information Technology Policy

HUMAN RESOURCES POLICIES & PROCEDURES

Internet, and SMS Texting Usage Policy Group Policy

Digital Device LOAN CHARTER

City of Venice Information Technology Usage Policy

Information Technology Security Policies

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan ACCEPTABLE USE POLICY

How To Deal With Social Media At Larks Hill J & I School

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

Rules for the use of the IT facilities. Effective August 2015 Present

Transcription:

ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day operations and longer term planning objectives. St Michael s College policy is to take any measures it considers necessary to ensure that all aspects of the system are fully protected. POLICY APPLICATION The Information and Communication Technology (ICT) Policy and Procedure applies to all staff and students. It is designed to protect individual data, corporate data, programmes, hardware and the network as a resource for the entire organisation. The following procedure and guidance sets out the rules and behaviours expected from all staff and students who manage and use the systems. PROCEDURE Overall ICT security is the responsibility of the Business Manager reporting to the Principal The computers and network/internet facilities given to staff and students are to assist them in performance of their work. Staff and students are permitted access only to those parts of the computer system which they need in order to do their normal duties or studies. Levels of access will be decided by the Business Manager in consultation with the Principal. New permanent staff and all students will be questioned on their computer experience and will be given a copy of the ICT Policy and Procedure at their induction. Temporary staff will be checked in as much detail as possible before they are allowed access to the computer system. All such agency staff will be given a copy of the ICT Policy and Procedure. All staff and students will be trained in the use of St Michael s College computer resources as and when study or job requirements dictate. Access to the computer resources will only be gained through the use of a personal password. Such passwords must not be given to any other person and must be changed regularly. Passwords will only be issued on receipt of a signed Acknowledgement of ICT Policy and Procedure. Those members of staff or students who have access to personal sensitive data must not divulge such information to a third party other than where directed by the Principal or the Police. All software used on St Michael s College computers must be authorised by the Business Manager. Under no circumstances may any other software be installed. Staff and students should not have an expectation of privacy in anything created, stored, sent or received via the computer facilities. Without prior notice the Principal may review any material created, stored, sent or received on St Michael s College network through the internet, through e-mail or any individual computer. No game playing is permitted on College computers. Computer storage devices from external sources must be checked for viruses before use. Files saved to external storage devices internally are the responsibility of the staff member who must store them in a secure place.

MISUSE Misuse of St Michael s College computer resources is a serious disciplinary offence. The following are examples of misuse: fraud and theft; system sabotage; introduction of viruses; use of unauthorised software; use of system for game playing; excessive use of facilities for private purposes; breaches of the Data Protection Act; sending abusive, rude or defamatory messages via e-mail; hacking; breach of the policy and procedure. This list is not exhaustive. Depending upon the circumstances of each case, misuse of the computer system is likely to be considered gross misconduct punishable by dismissal. Misuse amounting to criminal activity may be reported to the police. All breeches of computer security must be referred to the Business Manager. Any member of staff or student who suspects that a colleague of whatever seniority is abusing the computer system may speak in confidence to the Principal or the Business Manager. EMAIL Staff and students are given access to the internet and e-mail facilities. St Michael s College expects its staff and students to restrict personal use of these facilities to a minimum. Duty of care Staff and students should endeavour to make each electronic communication truthful and accurate. You should use the same care in drafting e-mail and other electronic documents as you would for any other written communication. Duty not to waste computer resources Staff and students must not deliberately perform acts that waste computer resources or unfairly monopolise resources to the exclusion of others. These acts include, but are not limited to, sending mass mailings or chain letters, spending excessive amounts of time streaming music or film, printing multiple copies of personal documents, or otherwise creating unnecessary network traffic. Audio, video, and picture files require significant storage space; for personal files, please make use of external storage such as flash drives and memory sticks or online storage (e.g. Flickr or Dropbox). Large file transfers and e-mail attachments Staff and students at St Michael s College use the same connections to send and receive e- mail. The time that the line is tied up for is directly in proportion to the size of the e-mail plus its attachment. A normal e-mail message may be about 1-25kb in size. However, a video clip or picture could be typically 10Mb or more in size and could tie up the line for some minutes, stopping business-e-mail from coming in or going out. This is not acceptable. Staff and students who persistently send personal e-mails with large attachments may be disconnected from the e-mail facility. Data Protection implications There are Data Protection implications in the electronic transfer of information and files containing personal information. E-mail is a quick and convenient way to transfer data, but it is governed by the Data Protection Act in exactly the same way as other computer files.

Apply the same qualitative judgement to sending information by e-mail as you would do by any other means of communication. Altering attribution information Staff and students must not alter the From: line or other attribution-of-origin information in e-mail communications. Anonymous or pseudonymous electronic communications are forbidden. Staff and students must identify themselves honestly and accurately when sending e-mail or otherwise communicating by e-mail. No expectation of privacy You should never consider your electronic communications to be either private or secure. E-mail may be stored indefinitely on any number of computers, including that of the recipient. Copies of your messages may be forwarded to others either electronically or on paper. In addition, e-mail sent to non-existent or incorrect usernames may be delivered to persons that you never intended. Expectation of a reply E-mail is a speedy means of communication and there is an expectation by the sender of a prompt reply far quicker than by conventional mail. Try to respond within a few hours rather than days, even if it is a holding acknowledgement awaiting a fuller reply. Monitoring of computer usage St Michael s College have the right to monitor any and all aspects of its computer system, including, but not limited to, monitoring sites visited by staff and students on the internet, reviewing material downloaded or uploaded by staff and students to the internet, and reviewing e-mail sent and received by staff and students. Prohibited activities Material that is fraudulent, harassing, embarrassing, sexually explicit, profane, obscene, intimidating, defamatory or otherwise unlawful or inappropriate must not be sent by e-mail or other form of electronic communication (social networking, newsgroups, chat groups), downloaded from the internet, or displayed on or stored on the organisation s computers. Staff and students encountering or receiving this kind of material should immediately report the incident to the Principal or the Business Manager. Our connections to the Internet To ensure security and avoid the spread of viruses, staff and students accessing the internet through a computer attached to the network must do so through the system installed by St Michael s College which uses our approved internet firewall and virus scanning software. This is there for the protection of the network against viruses and unauthorised hacking. Accessing the internet directly by modem is strictly prohibited unless the computer you are using is not connected to the network at the time (e.g. a laptop computer in use outside the office). Virus detection Files obtained from outside sources including files downloaded from the internet, newsgroups, social networking, or other online services; files attached to e-mail; and files provided by customers or vendors, all may contain dangerous computer viruses that could damage the network. This includes files on storage devices such as DVD ROMS or flash

drives brought from home or downloaded onto a laptop away from St Michael s College. Staff and students must never use storage devices from non-company sources without first scanning the material with ICT department-approved virus checking software. If you suspect that a virus has been introduced onto the network, notify the Business Manager immediately. Use of encryption software Staff and students must not install or use encryption software on any computer. INTERNET Disclaimer of liability for use of Internet St Michael s College is not responsible for material viewed or downloaded by staff and students from the internet. Staff and students are cautioned that there are pages on the internet that include offensive, sexually explicit, and inappropriate material. Even innocuous search requests may lead to sites with highly offensive content. In addition, having an e-mail address on the internet may lead to receipt of unsolicited e-mail containing offensive content. Staff and students accessing the internet do so at their own risk. Accessing inappropriate Internet sites Whilst at St Michael s College, staff and students have a duty to conduct themselves in a manner that is appropriate to the culture, aims and objectives of the College. Deliberate accessing of offensive, pornographic or other inappropriate web-sites for personal gratification using the organisation s equipment and internet address is not in keeping with the nature of St Michael s College. Visiting such web-sites leaves a trail that the site owners can trace back to the organisation and the resulting publicity could be highly embarrassing for the College and the Church. Such activities are likely to be considered as gross misconduct. There are occasions when some staff and students may, in the course of their work, require to access otherwise undesirable web-sites. In such cases the member of staff or student involved must clear this in advance with the Principal, who will in turn liaise with the Business Manager. Blocking any inappropriate Internet site The college may use software to identify and block inappropriate or sexually explicit internet sites. However, you may, nonetheless, encounter inappropriate or sexually explicit material while browsing on the internet. If you do, immediately disconnect from the site and report the matter to the Principal or the Business Manager. Illegal copying Staff and students must not illegally copy material protected under copyright law or make that material available to others for copying. You are responsible for complying with copyright law and applicable licences that may apply to software, files, graphics, documents, messages, and other material you wish to download or copy. Violations of this policy will be taken seriously and may result in disciplinary action, including disconnection from the e-mail and/or the internet system and, in serious or repeated cases, possible termination of employment.

ACKNOWLEDGEMENT OF ICT POLICY This form is used to acknowledge receipt of, and compliance with, St Michael s College ICT Policy and Procedure. PROCEDURE Complete the following steps: 1. Read the ICT Policy and Procedure 2. Sign and date in the spaces provided below 3. Return this page only to Reception SIGNATURE By signing below, I agree to the following terms: i. I have received and read a copy of the ICT Policy and Procedure and understand the same. ii. I understand and agree that any computers, software, and storage media provided to me by the organisation contain proprietary and confidential information about St Michael's College and its activities, and that this is and remains the property of St Michael's College at all times. iii. I agree that I shall not copy, duplicate (except for backup purposes as part of my job or studies here at St Michael's College), otherwise disclose, or allow anyone else to copy or duplicate any of this information or software. iv. I agree that if I leave St Michael s College for any reason, I shall immediately return the original and copies of any and all software, computer materials, or computer equipment that I may have received from the College that is either in my possession or otherwise directly or indirectly under my control. Staff/Student signature.. Staff/Student name Date STUDENT / STAFF (please circle) If you are a student this form should be countersigned by your group tutor. If you are a member of staff this form should be signed by the Principal or the Business Manager. Countersignature...... Countersignature name... Job Title (if appropriate)... Date......