CPS Acceptable Use Policy Day 2 – Technology Session.

Slides:



Advertisements
Similar presentations
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Advertisements

Northside I.S.D. Acceptable Use Policy
Are you being a safe and successful digital citizen? E-safety
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Oakland Unified School District Family, School & Community Partnerships Translation and Interpretation Policy
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
SIU School of Medicine Identity Protection Act and Associated SIU Policy.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
Boyertown Area School District Acceptable Use Policy.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
INTERNET and CODE OF CONDUCT
Wisconsin Knowledge & Concepts Examination (WKCE) Test Security Wisconsin Department of Public Instruction Office of Educational Accountability 06/26/2013.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Confidentiality… important facts to know and critical things to do!
November 2009 Secure Data Transmission May 2014 What are Secure Methods of Transmission? Encrypted Services Encrypted Memory Sticks Fax Secure.
New Data Regulation Law 201 CMR TJX Video.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
FY12 Title I Common Program Review Findings Title I Technical Assistance Session May 11, 2012.
Using SWHS: The AUP [Acceptable Use Policy]
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
WESTEST 2 Online Writing Principal/Building Level Coordinator’s Responsibilities.
Gradebook Parent Portal. At Ray School, beginning with the second quarter of the school year, parents will have access to a web-based tool that.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
University Health Care Computer Systems Fellows, Residents, & Interns.
St. Agnes School Technology for Teachers Acceptable Protocol.
10/20/ SAI 2012 Statewide Mentor/Mentee Meeting Matt Carver, J.D., Director of Legal Services tel fax –
Records Management 101 The Basics Archival and Records Management Services Division.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
MS 365 Student Accounts Orientation Beavercreek High School.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
FLHS TECHNOLOGY SURVIVAL GUIDE A QUICK GUIDE FOR STUDENTS.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
School Accounts Presented by: Mrs. Mazzola.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Protecting PHI & PII 12/30/2017 6:45 AM
Facebook privacy policy
Acceptable Use Policy (Draft)
The Acceptable Use of Technology
Privacy & Confidentiality
BCSD Computer Resources for Students
An Introduction to Public Records Office of the General Counsel
AUP Full Internet Access
COM Orientation The template can be used to create presentations for community, civic, advocacy and government relations groups. It is also appropriate.
Red Flags Rule An Introduction County College of Morris
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
How to manage the Electronic Signature Process
NORTHEASTERNERS, INC. IRS 990 filing instructions presentation
Third Party Billing for Service Coordinators
HIPAA Overview.
Protecting Student Data
For Service Coordinators
Family Educational Rights and Privacy Act of 1974
Presentation transcript:

CPS Acceptable Use Policy Day 2 – Technology Session

Section: Board Report: PO3 Date Adopted: July 22, 2009 What is Acceptable Use (AUP)? Modifications to the AUP were adopted on 7/22/2009. The Official Title is: The Official Title is: Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: Board Report: PO3 Date Adopted: July 22, 2009

Where is the AUP? The following slides are excerpts from the document. Please familiarize yourself with the entire document. The link to the Adobe Acrobat document is The following slides are excerpts from the document. Please familiarize yourself with the entire document. The link to the Adobe Acrobat document is

Section: Board Report: PO3 Date Adopted: July 22, 2009 IV. OWNERSHIP AND PRIVACY

Section: Board Report: PO3 Date Adopted: July 22, 2009 A. Board Property All documents, data and information stored, transmitted and processed on CPS Network or Computer Resources are the property of, and subject to, the Board’s policies, rules, standards and guidelines on usage. Users shall ensure that all access and use of such documents, data and information complies with applicable laws and Board rules and policies including those related to the Confidentiality of Student Records and Retention. When a User is no longer employed or under contract with the Board, all information stored by that User on CPS Network and Computer Resources remains the property of the Board. All documents, data and information stored, transmitted and processed on CPS Network or Computer Resources are the property of, and subject to, the Board’s policies, rules, standards and guidelines on usage. Users shall ensure that all access and use of such documents, data and information complies with applicable laws and Board rules and policies including those related to the Confidentiality of Student Records and Retention. When a User is no longer employed or under contract with the Board, all information stored by that User on CPS Network and Computer Resources remains the property of the Board.

Section: Board Report: PO3 Date Adopted: July 22, 2009 B. Privacy Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

Section: Board Report: PO3 Date Adopted: July 22, 2009 C. Monitoring ITS has the right to access, search, read, inspect, copy, monitor, log or otherwise use data and information stored, transmitted and processed on CPS Network and Computer Resources in order to execute the requirements of this policy. CPS Network including but not limited to Internet and usage may be monitored and audited by Department/School Management and ITS for inappropriate activity or oversight purposes. ITS reserves the right to: (1) access and make changes to any system connected to the CPS Network and Computer Resources to address security concerns, (2) deny User access to any system to address security concerns, and (3) determine what constitutes appropriate use of these resources and to report any illegal activities. ITS may intercept and/or quarantine messages and related resources, such as Internet mail and other messaging services for business, legal or security purposes. ITS has the right to access, search, read, inspect, copy, monitor, log or otherwise use data and information stored, transmitted and processed on CPS Network and Computer Resources in order to execute the requirements of this policy. CPS Network including but not limited to Internet and usage may be monitored and audited by Department/School Management and ITS for inappropriate activity or oversight purposes. ITS reserves the right to: (1) access and make changes to any system connected to the CPS Network and Computer Resources to address security concerns, (2) deny User access to any system to address security concerns, and (3) determine what constitutes appropriate use of these resources and to report any illegal activities. ITS may intercept and/or quarantine messages and related resources, such as Internet mail and other messaging services for business, legal or security purposes.

Section: Board Report: PO3 Date Adopted: July 22, 2009 D. Manager Access Department/School Management may access documents, data and information generated, stored, transmitted or processed by a User on the CPS Network and Computer Resources in accordance with ITS Guidelines. A User’s manager may also access a User’s CPS Network account for business purposes, including oversight purposes, regardless of whether the User is present or absent. In all cases, the Department/School Management shall contact the 3- EXCL Service Desk to obtain access. Managers shall not ask Users to share their password for such purposes. Department/School Management may access documents, data and information generated, stored, transmitted or processed by a User on the CPS Network and Computer Resources in accordance with ITS Guidelines. A User’s manager may also access a User’s CPS Network account for business purposes, including oversight purposes, regardless of whether the User is present or absent. In all cases, the Department/School Management shall contact the 3- EXCL Service Desk to obtain access. Managers shall not ask Users to share their password for such purposes.

Section: Board Report: PO3 Date Adopted: July 22, 2009 V. GENERAL PROVISIONS REGARDING USE

Section: Board Report: PO3 Date Adopted: July 22, 2009 K. Passwords Users shall comply with ITS standards and guidelines on password set up, usage and security. Users must never disclose passwords or other access or authorization codes to any person. Users shall comply with ITS standards and guidelines on password set up, usage and security. Users must never disclose passwords or other access or authorization codes to any person.

Section: Board Report: PO3 Date Adopted: July 22, 2009 VI.

Section: Board Report: PO3 Date Adopted: July 22, 2009 A. Usage Users are not allowed to use third party systems (such as Yahoo or AOL) in their capacity as representatives of Chicago Public Schools. All sent by Users in their capacity as representatives of the Chicago Public Schools must be sent from Board authorized e- mail systems, with Board authorized return addresses. User s are subject to retention by ITS in accordance with the Board’s Retention Policy. Users are not allowed to use third party systems (such as Yahoo or AOL) in their capacity as representatives of Chicago Public Schools. All sent by Users in their capacity as representatives of the Chicago Public Schools must be sent from Board authorized e- mail systems, with Board authorized return addresses. User s are subject to retention by ITS in accordance with the Board’s Retention Policy.

Section: Board Report: PO3 Date Adopted: July 22, 2009 B. Confidentiality Users must exercise due care to ensure that messages containing confidential information conform to the confidential transmission requirements noted herein and are transmitted only to their intended recipients. Users must exercise due care to ensure that messages containing confidential information conform to the confidential transmission requirements noted herein and are transmitted only to their intended recipients. Users are prohibited from transmitting Social Security Number information via without the prior written approval of ITS. Users shall abide by ITS-issued standards and guidelines on the classification, handling and transmission of confidential information, including applicable encryption requirements. Users are prohibited from transmitting Social Security Number information via without the prior written approval of ITS. Users shall abide by ITS-issued standards and guidelines on the classification, handling and transmission of confidential information, including applicable encryption requirements.

Section: Board Report: PO3 Date Adopted: July 22, 2009 C. Broadcast s The Office of Communications shall establish guidelines by which a broadcast s may be authorized for distribution. Users may transmit broadcast s only when authorized in accordance with such guidelines. The Office of Communications shall establish guidelines by which a broadcast s may be authorized for distribution. Users may transmit broadcast s only when authorized in accordance with such guidelines.

Section: Board Report: PO3 Date Adopted: July 22, 2009 VII. PORTABLE DEVICES All Computer Resources that are considered portable devices are subject to additional security requirements as set out in the ITS guidelines. Users shall abide by all requirements established by ITS for such portable devices, including but not limited to those related to laptops, cell phones, smart phones, USB memory sticks, and portable hard drives. Users are prohibited from housing Social Security Number information on a portable device without the prior approval of ITS. All Computer Resources that are considered portable devices are subject to additional security requirements as set out in the ITS guidelines. Users shall abide by all requirements established by ITS for such portable devices, including but not limited to those related to laptops, cell phones, smart phones, USB memory sticks, and portable hard drives. Users are prohibited from housing Social Security Number information on a portable device without the prior approval of ITS.

Section: Board Report: PO3 Date Adopted: July 22, 2009 Frequently Asked Questions Q. How do I request to have a website unblocked? A. Information Technology Services (ITS) provides a block/unblock site Q. How do I request to have a website unblocked? A. Information Technology Services (ITS) provides a block/unblock site Q. How does a Parent/Guardian receive a PIN to the Parent Portal? A. Suggest the parent/guardian create an account by going to They must visit the attendance office to confirm that the guardian information is up to date. Teachers will not provide PINs to the Parent; The Attendance Office and Technology Coordinator will expedite this process. Q. How does a Parent/Guardian receive a PIN to the Parent Portal? A. Suggest the parent/guardian create an account by going to They must visit the attendance office to confirm that the guardian information is up to date. Teachers will not provide PINs to the Parent; The Attendance Office and Technology Coordinator will expedite this process. Q. How do I access my Voice Mail? A. Call the main number then choose your extension. Press * to prompt for your password. Q. How do I access my Voice Mail? A. Call the main number then choose your extension. Press * to prompt for your password.

Section: Board Report: PO3 Date Adopted: July 22, 2009 Suggestions Utilize First Class web features (Personal Webpage, Folders, and Calendar). You may learn about the First Class advanced features by attending workshops offered by E-learning ( Utilize First Class web features (Personal Webpage, Folders, and Calendar). You may learn about the First Class advanced features by attending workshops offered by E-learning ( When you talk with parents, ask them when they last accessed Parent Portal. If they need logon access, please send them to the Office A to confirm their guardianship. When you talk with parents, ask them when they last accessed Parent Portal. If they need logon access, please send them to the Office A to confirm their guardianship. Provide the parent the addresses of the official CPS website, Harlan’s website, and Parent Portal page. Provide the parent the addresses of the official CPS website, Harlan’s website, and Parent Portal page.

Section: Board Report: PO3 Date Adopted: July 22, 2009 References Official Public Website Official Public Website Internal Website Internal Website CPS Harlan website (will redirect to new Harlan website) CPS Harlan website (will redirect to new Harlan website) Harlan website Harlan website Parent Portal Parent Portal Student Portal Student Portal Remote Access Remote Access