Dene Community School of Technology Staff Acceptable Use Policy



Similar documents
Acceptable Use of ICT Policy. Staff Policy

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Internet Use Policy and Code of Conduct

Conditions of Use. Communications and IT Facilities

ITU Computer Network, Internet Access & policy ( Network Access Policy )

Berwick Academy Policy on E Safety

Version: 2.0. Effective From: 28/11/2014

The Bishop s Stortford High School Internet Use and Data Security Policy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

E- Safety and Digital Photography - College ICT

Rules for the use of the IT facilities. Effective August 2015 Present

INTERNET, USE AND

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

USE OF INFORMATION TECHNOLOGY FACILITIES

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Using Public Computer Services in Somerset Libraries

ICT Security Policy for Schools

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Acceptable Use Policy (AUP) School Computing

UTC Cambridge ICT Policy

John of Rolleston Primary School

Information Security and Electronic Communications Acceptable Use Policy (AUP)

POLICIES AND REGULATIONS Policy #78

Sibford School Student Computer Acceptable Use Policy

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

UNIVERSITY OF ST ANDREWS. POLICY November 2005

How To Behave At A School

INTERNET, AND COMPUTER USE POLICY.

Acceptable Use of Information Technology Policy

How To Use The School Network Safely

St Vincent s Catholic Primary School e-safety Policy

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

How To Ensure Your School Is Safe Online

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Acceptable Use of ICT Policy For Staff

Acceptable Use of Information Technology

School Information Security Policy

Policy and Code of Conduct

ICT Student Usage Policy

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Information Security

Sample Employee Network and Internet Usage and Monitoring Policy

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

Angard Acceptable Use Policy

ICT POLICY AND PROCEDURE

HIPAA Security Training Manual

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

13. Acceptable Use Policy

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Technology Department 1350 Main Street Cambria, CA 93428

Simon Langton Grammar School for Boys E-Safety Policy

SERVER, DESKTOP AND PORTABLE SECURITY. September Version 3.0

CARRAMAR PUBLIC SCHOOL

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

St. Peter s C.E. Primary School Farnworth , Internet Security and Facsimile Policy

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

How To Deal With Social Media At Larks Hill J & I School

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Information Technology Security Policies

Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.

ELECTRONIC MAIL ( ) September Version 3.1

Acceptable Use Policy

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

Transcription:

Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers, by members of staff, is governed at all times by this Acceptable Use Policy. Please ensure you understand your responsibilities under this policy, and direct any questions or concerns to the IT Network Manager in the first instance. All members of staff have a responsibility to use the school s computer system in a professional, lawful, and ethical manner. Deliberate abuse of the school s computer system may result in disciplinary action (including possible termination), and civil and/or criminal liability. Please note that use of the school network is intended to be as permissive and flexible as possible under current UK legislation as well as local authority and DCSF guidelines. This policy is not intended to arbitrarily limit the ways in which you can use the system, but to ensure compliance with the legal responsibilities of the school and staff, to safeguard the reputation of the school, and to ensure the safety of all users. Please respect these guidelines, many of which are in place for your protection. This Acceptable Use Policy is aimed at encouraging responsible behaviour and good practice 1. Policy Statement 1.1. Dene Community School of Technology reserves the right to amend this Acceptable Use Policy, at anytime, without notice. Once amended the revised policy will be circulated to all staff via email. It is your responsibility to ensure that you are up to date with such changes. 1.2. This Acceptable Use Policy replaces and supersedes all previous versions. 1.3. A copy of this document can be found on the school intranet site. 2. Network Access 2.1. All members of staff will have the opportunity to take part in the Introduction to ICT training. The training is designed to ensure correct usage of ICT equipment and network resources on site. The training will also focus on safe use of electronic resources such as the internet and email to ensure compliance with this document. 2.2. The school reserves the right to remotely monitor user activity. The school also reserves the right to monitor all network traffic either manually or through automated software, to ensure policy compliance and to aid in resolving any issues. 2.3. Users should not allow any other person access to any equipment/device logged in under their own user account, unless as part of authorised work. 2.4. Allowing another person to use your login for any other reason is a severe breach of this Acceptable Use Policy and contravenes legislation. 2.5. It is imperative that members of staff protect their password(s) and computer(s) at all times. Staff must log off or lock their workstation/laptop if they are to leave it unattended for any length of time. 2.6. Passwords must never be divulged to anyone at anytime. 2.7. If it is suspected that a password has been compromised it must be changed immediately. 2.8. It is prohibited to copy any software or inappropriate material on to any network resource. 2.9. Access to the school network is only granted to school workstations/laptops. All third party workstation/laptops will need to be approved by the IT Development & Support Team before being connected to the school network. 2.10. The use of network resources is a privilege and inappropriate use will result in that privilege being withdrawn and other action, as appropriate taken. 2.11. By storing or creating any personal documents or files on the school computer system, you grant the school a non-exclusive, universal, perpetual, irrevocable, and royalty-free license to use, copy, and distribute those documents or files in any way the school sees fit.

3. Home Directories and Security 3.1. Each member of staff will have access to a Home Directory located on the Staff File server. 3.2. Staff must ensure that they do not exceed the predefined storage limit for their individual Home Directory. The current storage limit is set to 5GB (5120MB). 3.3. The school reserves the right to delete any inappropriate materials found within staff Home Directories during any routine or random checks. 3.4. Staff must always check all files brought in on removable media (such as CDs, USB Flash Drives, and Floppy Disks etc) with the Antivirus software installed on site. 3.5. Removable media should only be used if it is found to be free of any virus. All incidents of infection through a Virus, Trojan or Spyware should be reported to the ICT Support and Development Team. 3.6. Members of staff must not store any sensitive or personal information about staff or students on any portable storage system (such as a USB memory stick, CD/DVD, portable hard disk, or personal computer) unless that storage system is encrypted and approved for such use by the school. 3.7. If there is a genuine reason to store any school related sensitive or personal information on a portable storage system the device must be encrypted to prohibit unauthorised access should the device be lost or stolen. In such cases members of staff must contact the ICT Support and Development Team to either be provided with an encrypted USB device or to encrypt an existing storage system. 4. Electronic mail (e-mail) 4.1. All members of staff will be provided with email services from the school Microsoft Exchange server. 4.2. Members of staff are responsible for all the e-mails they send and for any contacts made. 4.3. Caution should be exercised when sending confidential information via e-mail. 4.4. The transmission of confidential information via e-mail to unauthorised persons is strictly prohibited. 4.5. The use of e-mail for personal purposes is permitted but must be reasonable. 4.6. While Dene Community School of Technology respects the privacy of staff, where there is reason for concern, the school reserves the right to monitor and intercept e-mail communication. 4.7. Members of staff should only open attachments to emails if they have come from someone they know and trust. Attachments can contain viruses and other programs that could destroy files and software on the computer being used as well as files and data on network servers. 4.8. Users who receive unsolicited mail should inform the ICT Support and Development Team who will attempt to filter/block any future emails. 4.9. Members of staff must not send chain email or unsolicited commercial e-mail (also known as SPAM). 4.10. Any e-mail communication made must not bring the school into disrepute; this includes anything libellous, defamatory or criminal. 5. Social Networking Sites and Online Forums 5.1. Staff must take care when using social networking websites and online forums even when such use occurs in their own time using their own computer. 5.2. You must not allow pupils to access personal information you post on a social networking site or any online forums. 5.3. Members of staff must not add a pupil to their list of friends. 5.4. You should avoid contacting any pupil privately via a social networking website or Instant Messenger even for school related purposes. 5.5. Staff should also take care when posting to any public website that their comments do not harm their professional standing or the reputation of the school. 5.6. Unless authorised to do so, you must not post content on websites that may appear as if you are speaking for the school. 5.7. You should not post any material online that can be clearly linked to the school that may damage the school s reputation.

6. ICT Equipment and Suites 6.1 Staff should not move or authorise any person to move any ICT Equipment located within any ICT Suites unless as part of authorised work/repair. 6.2 Staff may not pass on any ICT Equipment to any other person. It must first be passed back to the ICT Support and Development Team so that it can be reissued. 6.3 Any equipment issued to staff remains the property of the school and must be returned upon request. The issued equipment must also be available for inspection at all reasonable times. 6.4 If a laptop is provided to members of staff it is expected that it should be brought to school on a daily basis. 6.5 Upon termination of employment at the school all equipment must be returned. 6.6 Staff are responsible for all equipment issued to them and must take reasonable precautions to protect such equipment. 6.7 Staff are responsible for all equipment and use of workstations and laptops by students during their lessons. Individual departments will be billed for any associated damage. 6.8 All shared lapsafes must be signed for before being used. The keys to the two shared lapsafes will be located in the ICT Support and Development office. 6.9 Staff must make sure that after use all laptops stored within lapsafes are connected to their individual power pack so that they can be charged ready for use again. 6.10 Staff must ensure that all lapsafes are locked after use and the key returned to the ICT Support and Development office. 6.11 Staff must ensure that students do not consume any food or drink whilst working on any ICT equipment. 6.12 Staff must ensure that ICT Suites are locked upon leaving the room. Students should not be allowed access to keys to ICT Suites at any time. 6.13 No students may be allowed to use ICT Suites without suitable supervision by a member of staff. 6.14 Students are only allowed to use workstations/laptops that have been configured to run under the Ranger for Networks software. Under no circumstances must a student be allowed to log on to a workstation/laptop issued to a member of staff. Allowing a student to do so constitutes a breach of this Acceptable Use Policy. 6.15 Before purchasing any hardware or software members of staff should consult a member of the IT Support & Development Team to check compatibility, license compliance and discuss any other implications that the purchase may have. 7. Electrical Equipment 7.1 Any mains-operated personal computer or electrical equipment used on site, for any use, is subject to a Portable Appliance Test (PAT) by site maintenance staff or the local authority. 7.2 Members of staff must not connect any electrical equipment that has not been tested. 8. Reporting Problems 8.1 Members of staff should report any problems that need the attention of the ICT Support and Development Team as soon as is feasible. Problems that seriously hinder your job or teaching and require immediate attention should be reported by telephone. All other problem must be reported via the online Help Desk that all members of staff have access to. 8.2 Data loss should be reported to the ICT Support and Development Team as soon as possible. The longer a data loss problem goes unreported, the less the chances of the data being recovered.

9. Internet Access Dene Community School of Technology 9.1 Dene Community School of Technology will only provide access to the Internet on receipt of a signed Acceptable Use Policy. 9.2 The use of the internet for personal purposes is permitted but must be limited to before/after school, during designated break periods and lunch time only. 9.3 All Internet access is logged for the purposes of maintaining standards of security and acceptable use. 9.4 Attempts to access inappropriate websites, websites which attempt to bypass filtering systems or personal use of the internet outside of the designated times constitutes a breach of this Acceptable Use Policy. 9.5 Inappropriate websites referred to in 9.4 include, but are not limited to any site which contains: Pornographic Material (of either a legal or illegal nature); Material which incites hatred or discrimination; Material which promotes illegal activity; Material which is in breach of the Copyright Designs and Patents Act 1998; Material which is degrading to persons or groups of persons; 9.6 Staff are required to report any website that they become aware of, which is not filtered, that is deemed inappropriate as per the criteria stated within 9.5. 9.7 While the school respects the privacy of its staff, where there is reason for concern, the school reserves the right to perform a detailed audit of all network activity. 9.8 Reason for concern referred to in 9.7 include, but are not limited to the following: A complaint made by a student A complaint made by a visitor to the school A complaint made by a parent/carer 9.9 A detailed audit of network activity can only be requested by a member of the Senior Management Team. The request must be made in writing and must be accompanied by documentary evidence supporting the reason for the request. 9.10 The audit itself can only be generated by the Network Manager. Whilst the report is being generated a member of the Senior Management Team and an elected member of staff must be present. 9.11 The school will keep an accurate and up to date record of all generated reports. Each time a detailed audit of network activity is created the Network Activity Audit Log must be completed and signed by the Network Manager, member of Senior Management Team and the elected member of staff. 9.12 While Dene Community School of Technology uses sophisticated filtering technology and takes all precautious to ensure that users only access appropriate material, it is not possible to guarantee that unsuitable material will be inaccessible. The school cannot accept liability for the material accessed, or any consequences of such access. 10. Additional Systems 10.1 Members of staff may have access to additional systems which include, but are not limited to: SIMS, Finance Software, the Durham Learning Gateway, Exam Software, the Durham Schools Extranet and Attendance Software. 10.2 These systems require additional passwords. It is the responsibility of the member of staff to ensure that their password has basic complexity to it and that their password is only known by them. A password with basic complexity is one that is at least 6 characters in length, which uses a combination of upper, and lower case letters, numbers and symbols.

11. Creation, Distribution & Publication of Digital Media 11.1 Members of staff must ensure that parental permission has been obtained before any students are photographed or filmed whilst at school or taking part in a school activity. 11.2 Parental permission must also be obtained before the distribution or publication of any digital media. The distribution and publication of digital media includes but is not limited to: Photos/videos published on the school website Photos/videos published on the school Virtual Learning Environment (VLE) or Intranet site Photos published within the school newsletter or other school correspondence Photos/videos stored on the school network 11.3 Members of staff can check to see if digital media can be distributed or published by viewing the Parental Permission document stored within Staff Secure (I Drive). 12. Data Protection and Freedom of Information 12.1 All information about staff will be dealt with in compliance the Data Protection Act and only given to authorised agencies. 12.2 Under the Freedom of Information Act 2000 all members of staff have the right to request information held on the school system regarding their network activity. Staff wishing to request such information will need to complete the Information Request form which can be found on the school intranet. 13. Legislation 13.1 All network users are bound by current relevant legislation. The applicable laws (as amended) include, but are not limited to: Computer Misuse Act 1990 Copyright Designs and Patents Act 1998 Criminal Justice Act 1988 Defamation Acts 1952 and 1996 Freedom of Information Act 2000 Human Rights Act 1998 Obscene Publications Act 1959 and 1964 Protection of Children Act 1988 Protection from Harassment Act 1997 Public Order Act 1986 Race Relations Amendment Act 2000 Telecommunications Act 1984 Data Protection Acts 1994 and 1998 Sex Discrimination Act 1986 Regulation of Investigatory Powers Act (RIPA) 2000 13.2 Staff should understand that any attempt to bypass the school, or other network security systems, including the introduction of viruses or applications of a destructive nature could lead to prosecution. 13.3 Where it is believed that a member of staff is in breach of legislation appropriate action will be taken

14. Reporting Breaches of this Policy 14.1 All members of staff have a duty to ensure this Acceptable Use Policy is followed. You must immediately inform a member of the ICT Support and Development Team, or the Senior Leadership Team, of any breaches of this policy. 14.2 Members of staff are required to report: Inappropriate content suspected to be stored on the computer system. Websites accessible from within school unsuitable for staff or student consumption; Breaches, or attempted breaches, of computer security. Any instance of bullying or harassment via the school computer system. 15. Sanctions In the event that this Acceptable Use Policy is breached, staff will be subject to sanctions which may include, but are not limited to: Disciplinary procedures; Temporary or permanent restriction of network access; Temporary or permanent revocation of network rights; Restriction to or denial of access to ICT Suites; Investigation under the Regulation of Investigatory Powers Act (RIPA) 2000.

Staff Agreement I have read and understood the for Dene Community School of Technology. I understand that should I be found in breach of the Acceptable Use Policy I may be liable to disciplinary procedures and, if appropriate, the Police and local authorities may become involved. I accept that it is my responsibility to be aware of amendments to this Acceptable Use Policy which can be found on the school s Intranet under the School Documents section. By default all members of staff agree to their image or likeness to be used on the school website, school intranet, school VLE or in any promotional material published by the school or associated agencies. If you do not wish to give your consent for you image or likeness to be used please tick the following box [ ]. Staff Name * * USE BLOCK CAPITALS Staff Signature Date DD MM YY School Agreement (To be signed by authorised members of the Senior Management Team only) I acknowledge the above named member of staff has returned a signed Acceptable Use Policy which signifies agreement to all clauses of the Acceptable Use Policy. I therefore grant access to the Internet from the date below and permit access to the school s ICT Resources under the conditions of this Policy. Staff Name * * USE BLOCK CAPITALS Authorised Signature Date DD MM YY