Data Loading...

Acceptable Use Policy Flipbook PDF

Acceptable Use Policy


117 Views
86 Downloads
FLIP PDF 101.23KB

DOWNLOAD FLIP

REPORT DMCA

Acceptable Use Policy (AUP) An Acceptable Use Policy is a document which addresses all rights, privileges, responsibilities and sanctions associated with the use of the internet and digital technologies within the school, including online and offline usage. An Acceptable Use Policy is an important document that can demonstrate due diligence with regards to the security of your IT network and the protection of An Acceptable Use Policy is an important document that can demonstrate due diligence with regards to the security of your IT network and the protection of sensitive data in the event of a breach or regulatory audit. This importantly protects the organization from legal actions sensitive

data in the event of a breach or regulatory audit. This importantly protects the organization from legal actions. Examples of AUP are: • • • • • •

ocial media Internet and other system use Cybersecurity Non-employee users Accessing private or confidential information Bring your own device (BYOD) Purpose The purpose of this policy is to keep students safe online. Allows them to explore the digital world as part of their education, instead of accessing inappropriate or harmful sites, such as bullying, school violence, etc. The Acceptable Use Policy (AUP) aim is to ensure that students will benefit from learning opportunities offered by ICT and internet resources in a safe and effective manner. Internet use and access is a school resources and a privilege. AUPs prevent users from unauthorized access to proprietary or confidential data and unauthorized use of that data. Bring your own device (BYOD). Many organizations allow or require employees to use personal devices for business purposes.

An Acceptable Use Policy is an important document that can demonstrate due diligence with regards to the security of your IT network and the protection of sensitive data in the event of a breach or regulatory audit. This importantly protects the organization from legal actions. The most important part of an AUP document is the code of conduct governing the behavior of a user whilst connected to the network/Internet. ensures that employees understand the way in which information should be used. It enables both employees and the business organization to gain the maximum value from the internet. It alerts all users to the technical and commercial risks that can arise if the technology is misused.

Expectations Ensure that our students become proficient in the information and communication technologies (ICT). Monitoring and privacy, an internet environment that is safe and appropriate. employees

to use and data guidelines. Students treat others with respect. UPs prevent users Confidentiality data. Bring your own device (BYOD). Many organizations allow or require from unauthorized access to proprietary or confidential data and unauthorized use of that personal devices. What is covered in an AUP? Included in a standard AUP are clauses specifying the purpose and scope of the policy, the user's rights and responsibilities, acceptable uses, prohibited uses, and privacy standards.

Acceptable use General use The use of any electronic device during class time is always based on teacher’s discretion. Open internet sessions will always be supervised by a member of staff. Antivirus software is in place to ensure the safe use of the internet and school network. Each student will be given a unique network username and password. This allows them access to the school’s ICT resources at a student’s security level. Students must use their own username at all times. Each student will be issued with a school email account for educational purposes. Students should check the school issued email account on a daily basis. Students will be provided with training on internet usage and safety. Students will treat others with respect at all times both online and offline. Everyone should treat school ICT equipment with respect and should report any damages to a teacher. If one deliberately damages a piece of school equipment, one will be charged for its replacement. Internet Students should not visit internet sites that contain obscene, illegal, hateful or otherwise objectionable materials or attempt to work around protection software. Students should report accidental accessing of inappropriate materials to a teacher, tutor or other staff member. Student should not respond to offensive, abusive or rude messages. They should let a teacher know immediately if they are sent anything they do not feel comfortable with. Students should use the internet for educational purposes. Students should acknowledge sources for their work to avoid plagiarism. Students should not give out or make available any personal information; such as full name, phone number or address to unknown people. They should not arrange to meet someone offline that they have met only online, unless it is part of a school project and approved by a teacher/parent. Internet usage, including distributing or receiving information, school-related or personal, may be monitored for unusual activity, for security and/or network management reasons. Personal devices This section refers to personal devices such as: laptops, tablets, phones, smartphones, iPods, cameras, smart watches, game consoles, etc. Students’ personal devices, unless authorised by a teacher, are not to be used during class time. Each student must ensure all devices are in silent mode in the school building. Mobile phone usage is permitted, in the school, during break times, unless instructed by staff. The unauthorized capture of images, video or audio is not permitted. It is a direct breach of the school’s AUP, Child Protection Policy and GDPR policy. Connecting

or attempting to connect to the school’s network system (wired or wireless) without authorization is in direct breach of the school’s AUP. Misuse of ICT and internet resources may result in disciplinary action, including written warnings, withdrawal of access privileges and, in extreme cases, suspension. The school reserves the right to report any illegal activities to the appropriate authorities. Respect is something that must be shown in both off and online world. As a student at RISS, I understand that I must show respect both on and offline. This means I will not post inappropriate or insulting comments. We do not post, download, upload, search or share illegal, degrading or offensive material. Private conversations are just that. They are meant to stay private; therefore at RISS we do not post overheard or private conversations without permission of all involved. Taking videos or pictures of others without their permission or knowledge is not allowed. If the video or picture is meant to make fun of, insult or harm someone else, it goes directly against our school rules and values. Plagiarism is serious. Do not post work or thoughts of others without permission and crediting their work. Your social media is private. Your parents or guardians are the only people who should have access to your accounts. Do not allow anyone else access to your social media. Do not, even as a joke, change another person’s online space. It is theirs. To make sure you and your accounts stay safe: change your password regularly and never share it with someone else. Unacceptable use Inappropriate use of ICT exposes the university to risks including virus attacks, the compromising of its systems and services, claims for damages and even criminal liability. Pornography, sexual content or sexual services. Abusive, bigoted, racist, discriminatory, offensive or hate-related content. Invasion of privacy or misappropriation of publicity orcelebrity rights. Viruses, Trojan horses, worms, time bombs, spyware or mare. Use of Network These accounts are system account, superuser account, regular user account, and quest user account. Limitations of networking are, security issues, high initial cost, moral and cultural effects, spread of terrorism and drug trafficking and over reliance on networks. Enforcement Internet traffic monitoring can be done manually by reviewing the packets at granular level for any activity that is unusual to the user, network or organization. Similarly, using automated tools such as firewalls, inappropriate messages and packets are automatically filtered out. A school may find your browsing history if you use a school computer, but it's not as simple for them if you use your own device. However, they can still view the cache of websites that have been visited so far in this session.

Conclusion Overall, Acceptable Use Policies are developed to ensure appropriate and safe technology use. Teachers, must make both teachers and students abiding by policies and regulations discussed within school AUP.