Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Riverside Community School District
Business Plug-In B7 Ethics.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
VISD Acceptable Use Policy
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
1 Tuesday, August 16, 2005 W E B C A S T August 16, 2005 Policy Development Theory & Practice: An Emphasis on IT Pat Spellacy Director of Policy & Process.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Security Awareness Norfolk State University Policies.
CPS Acceptable Use Policy Day 2 – Technology Session.
An Educational Computer Based Training Program CBTCBT.
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
FCPS Regulation PORTABLE ELECTRONIC DEVICES – STUDENT USE.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Chapter 4 – Slide 1 Effective Communication for Colleges, 10 th ed., by Brantley & Miller, 2005© Technology and Electronic Communication.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Copyright – What you should know! Matthew Mayo and Martha Nixon EDTC 6149.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Our Acceptable Use Policy An Overview What is an Acceptable Use Policy (AUP)?
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
The Library’s Internet Acceptable Use Policy What it is for Why it is important What you need to know How you can help users understand it.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
Hanscom Middle School Acceptable Use Policy and Computer Lab Rules By Mónica Albuixech Instructional Technology Specialist 2011.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
University Policy towards Privacy and Network Use Group Members: Serena Lam, Sarah Hong, Charlie Korschun, Zan Fort, Kristen France, and Jason Saltiel.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
EPals ePals is your school account Communicate with group members/teachers stu.gbaps.org.
Computer Technology Timpview High School
SEE-GRID The SEE-GRID initiative is co-funded by the European Commission under the FP6 Research Infrastructures contract no SEE-GRID.
Why Privacy & Security Awareness Training?. Why is privacy & security awareness training required?
Presentation of Acceptable Use Policy Kathryn Thomas UMUC EDTC 620 Summer 2012.
August 31, The Etowah County School District’s electronic network is available to all students and employees. The goal is to foster learning environments.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
The Medical College of Georgia HIPAA Privacy Rule Orientation.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Tuloso-Midway High School Library
Internet Safety and Acceptable Use Policies.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Internet law Business law.
The Issues with Technology in education
AUP, EDP, & Centralized Printing
Presentation transcript:

Montgomery College Acceptable Use Policy (AUP)

2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information Technology Policy Administrator (ITPA). The content of the presentation was reviewed by the Office of the General Counsel. Acceptable Use Policy (AUP) PowerPoint Presentation

3 What Is the AUP? provides guidelines for the acceptable use of Montgomery College’s technology resources by members of the College community and non-College individuals who have been authorized to use these resources. applies to all technology devices -- including those that attach to computers, printers, software, telephones, PDAs and instructional television equipment. The AUP is the College policy that …

4 What does “Acceptable Use” Mean? work - related tasks occasional, limited, non - work related tasks as long as these tasks do not interfere with the user’s work, another’s work, or have an undue impact on the College’s IT resources the creation, display or transmission of material that does not violate College policy. It means technology resources may be used to support …

5 What Are My Responsibilities? abiding by the College’s security requirements abiding by existing legal requirements, including respecting intellectual property rights, e. g. copyrights and trademarks adhering to a standard of behavior that is not disruptive to the business of the College being good stewards in the care and safeguarding of files and records. All users are responsible for …

6 Other Acceptable Use Expectations Privacy Issues Web Publishing Issues Policy Assurance

7 Privacy Issues Users should have no expectation of privacy. Information received for work purposes, and/or created, or contained in College computing files, servers or can constitute a public record.

8 Privacy Issues MC voluntarily chooses to refrain from inspecting user files, and electronic and telephonic communications. However, in very special situations and with senior vice president approval, the College may monitor access to its equipment and networking structures and systems in order to: insure the security and operating performance of its systems and networks review employee performance enforce College policies, procedures, guidelines and applicable law.

9 World Wide Web Publishing Personal websites or home pages are permitted as a learning tool. Personal websites must display disclaimer: “This page/site is not endorsed or sponsored or provided by or on behalf of Montgomery College.” Electronic publishers must abide by all laws and rules and regulations.

10 Policy Assurance The AUP establishes the Office of the Information Technology Administrator (ITPA) position. The ITPA is responsible for investigations of unacceptable use of technology resources. Results of the ITPA’s investigations are reported to the supervisor, Chief Human Resources Officer, and Office of the General Counsel (as appropriate).

11 Reporting An Issue or Concern Any employee who believes they may have witnessed a possible violation of the AUP, or has a question about the Acceptable Use Policy, should contact the IT Policy Administrator (ITPA). The ITPA may be contacted by telephone at: ITPA Confidential Reporting Line (240) The ITPA may be contacted by at:

12 Please Note: This presentation cannot possibly address all situations that arise under the AUP, nor is it meant to be comprehensive or replace the AUP and other College policies and procedures. Accordingly, you should review and become familiar with all the policies and procedures of the College as they apply to you. An electronic copy of the AUP is posted at: A hard copy is located at each campus Library.

13 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information Technology Policy Administrator (ITPA). The content of the presentation was reviewed by the Office of the General Counsel. Acceptable Use Policy (AUP) PowerPoint Presentation