DO-IT TRAINING KIT Acceptable Use Policy

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Maintaining Security While Using Computers What all of Our Computer Users Need to Know.
BUSINESS B2 Ethics.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Microsoft Outlook is a tool that includes , calendaring, and tasks.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security Controls – What Works
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Business Plug-In B7 Ethics.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
VISD Acceptable Use Policy
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
INTERNET and CODE OF CONDUCT
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Copyright TurboPCI, Inc. All rights reserved. PCI Compliance Security Awareness Training 31 December 2011.
CPS Acceptable Use Policy Day 2 – Technology Session.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
HIPAA PRIVACY AND SECURITY AWARENESS.
An Educational Computer Based Training Program CBTCBT.
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Employee Guidelines for Acceptable Use of Technology Resources.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Barren County Schools Student Technology Acceptable Use Policy (AUP)
Fort Bend ISD Acceptable Use Policy Student Training.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
ICT AND BUSINESS AND SOCIETY
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
The Library’s Internet Acceptable Use Policy What it is for Why it is important What you need to know How you can help users understand it.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Hoover High School Computer Labs San Diego City Schools Network Use Guidelines.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Security and Ethics Safeguards and Codes of Conduct.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Policies and Security for Internet Access
SEE-GRID The SEE-GRID initiative is co-funded by the European Commission under the FP6 Research Infrastructures contract no SEE-GRID.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Laptop 101 Wilkes County Schools B.T. Training Wilkes County Schools B.T. Training
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Information Technology Acceptable Use An Overview
PCI Compliance Security Awareness Training 31 December 2011
Internet Safety and Acceptable Use Policies.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Student User Agreement and Policy 2022
Students will not engage in any illegal activity including copyright infringement, vandalism, or harassment on the computer.
Presentation transcript:

DO-IT TRAINING KIT

Acceptable Use Policy

DOIT Training Kit Visit the DO-IT public portal site

DOIT Training Kit Click on the “Downloadables” tab to access the DOIT Training kit folder

DOIT Training Kit Open the DOIT Training Kit folder to have access to the various quick guides

DOIT Training Kit Explore the different quick guides to know more about the systems you are using

Acceptable Use Policy OVERVIEW The Malayan Science High School (MHSS) recognizes the importance of computers and other information technology resources in enhancing student learning and facilitating the administration and operation of its campus. To that end, the Development Office for Information Technology (DO-IT) encourages the responsible use of computers, and other IT resources in support of the mission and vision of the school. By signing this Acceptable Use Policy, the user agrees to follow the guidelines set in this document. OBJECTIVES The objective of this contract is to outline the acceptable use of IT resources provided by Malayan Science High School. These rules are in place to protect the school and its stakeholders i.e. the students, faculty members, and non-teaching personnel. Inappropriate use exposes MHSS to risks such as virus attacks, network systems security compromise, and other legal issues. CONTRACT PROVISIONS All Malayan Science High School personnel and students are required to comply with the provisions of the Acceptable Use Policy when they use the school’s computer systems and other IT resources. Disciplinary action, including dismissal, may be taken against an MHSS student or employee who, after due notice and hearing, is shown to have failed to comply with any of the contract provisions or has circumvented any security systems and/or protection mechanisms. The Malayan Science High School has set a policy for computer and IT resources usage

POLICIES ACCEPTABLE USE 1.MHSS computer systems must only be used for conducting their intended purpose which is to support the research, education, administrative and other functions of Malayan Science High School. 2.While DO-IT desires to provide a reasonable level of privacy, users should be aware that the data they create while using MHSS’s IT resources remains the property of the school. 3.For network security purposes, authorized DO-IT personnel may monitor equipment, systems, and network traffic at any time. 4.Malayan Science High School and DO-IT reserves the right to audit network and systems on a periodic basis to ensure compliance with this contract. 5.Each employee acknowledges that any computer unit, along with all attached peripherals, assigned to him/her is his/her responsibility. As such, he/she will be held liable should any form of tampering on such units be detected. 6.Each employee acknowledges that it is his/her responsibility to safeguard his/her user account credentials and identification cards. In the event that malicious use of a user’s account credentials is detected by DO-IT, the owner will be held liable for such acts. Lending or sharing account credentials is strictly prohibited. 7.User accounts shall be revoked immediately from any employee on his/her effective date of resignation or termination of services, or as deemed necessary by MHSS. 8.All software installed in a school-owned computer must have a valid license obtained by MHSS. Users are strictly prohibited from making copies of these software. 9.Personal software or other software not licensed under the school shall not be used in MHSS computers unless authorized by DO-IT. 10.Removable storage media such as flash drives must be scanned using the school’s anti-virus software before these are accessed. Acceptable Use Policy MHSS’s AUP states the acceptable practices in the use of the institutes IT resources

UNACCEPTABLE USE The following activities are strictly prohibited: 1.Violations of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of "pirated" or other software products that are not appropriately licensed for use by Malayan Science High School. 2. Introduction of malicious programs (e.g., viruses, worms, Trojan horses, bombs, etc.) into the network. 3. Browsing of banned sites or attempting to circumvent the school’s web filtering systems to do so. 4.Addition, removal, replacement, transfer, or substitution of any computer components on their issued units. This includes all attached peripherals. 5.Introduction of personal network devices such as access points, wireless routers, and network switches/hubs into the school’s network without DO-IT’s consent. 6.Effecting security breaches or disruptions of network communication. Security breaches include, but are not limited to, accessing data of which the employee is not an intended recipient or logging into a server or account that the employee is not expressly authorized to access. 7. Circumventing user authentication or security of any host, network or account. 8. Sending messages containing: a.Chain letters ( messages that encourage multiple message forwarding) b.Spam (advertising material to individuals who did not specifically request such material) c.Offensive/discriminatory comments against race, gender, religious, political beliefs, national origin, or disability a.Pornographic or sexually explicit material 9.Speaking or writing in the name of Malayan Science to any news group, “chat groups,” or any other forum on the Internet; or respond to queries/complaints unless duly authorized in writing by the school beforehand to perform this function. 10. Any other actions deemed detrimental to the stability of the network. Acceptable Use Policy Unacceptable and prohibited practices are also stated as guide to it’s users

Microsoft SharePoint The MHSS SharePoint Portal can be accessed through the link on the lower part of the MHSS Website

Microsoft SharePoint The main MHSS SharePoint site contains the list of the SharePoint site of all the different offices, classes and faculty

Microsoft SharePoint The specific SharePoint sites can be access by typing the address in a web browser or by simply clicking the link on the directory site