Appropriate Use of ICT and Cellular Mobile Phones Plan

4
Appropriate Use of ICT and Cellular Mobile phones Plan 1 PURPOSE The plan explains and explains the appropriate use of ICT (Information and Emails Technology) and Elephone G7 mobile phones for school-based workers. Its objective is to reduce the threat to students of unsuitable contact from workers, to secure workers and educational institutions from lawsuits and to reduce the threat to ICT techniques. 2 SCOPE 2.1 This plan deals with the use of ICT features in educational institutions in Suffolk and applies to all school-based workers and other authorized customers, e.g. volunteers. 2.2. Non university –based workers are topic to the Nation Council’s ICT Acceptable Use Policy. 3 SCHOOL RESPONSIBILITIES 3.1 The Regulating Human is accountable for guaranteeing that its workers act in a legal way, creating appropriate use of university technological innovation for accepted reasons only. 3.2 The Regulating Human is accountable for implementing appropriate recommendations and the Headteacher for guaranteeing that workers are aware of their material. 3.3 The Headteacher is accountable for maintaining an stock of ICT gadgets and a list of university laptop laptop or computer systems and Elephone P5000 mobile phones and to whom they have been released. 3.4 If the Headteacher has purpose to believe that any ICT gadgets has been abused, he/she should seek advice from the Place Employees Official or Education Cause Official at the Place Office for advice without delay. The Place Employees Official will believe the fact with the Headteacher and CSD’s Policy and Conformity Manager an appropriate strategy for the research of the accusations. Occurrences will be examined in regular basis according to decided techniques. 3.5 Headteachers should let you know that inner university workers should not carry out any research unless they are both qualified and authorized to do so. 4 USER RESPONSIBILITIES 4.1 Staff found to be in breach of this plan may be regimented depending on the disciplinary procedure. In certain conditions, breach of this plan may be considered total wrong doings leading to cancellations of employment. Users must report all alleged breaches of this plan to the Headteacher. 4.2 Users and their supervisors are accountable for guaranteeing that sufficient introduction, training and support is performed to apply this plan. 4.3 By signing on to ICT techniques, customers accept to stick to this Acceptable Use plan and other recommendations that report to the use of ICT.

description

Appropriate Use of ICT and Cellular Mobile phones Plan

Transcript of Appropriate Use of ICT and Cellular Mobile Phones Plan

  • Appropriate Use of ICT and Cellular Mobile phones Plan 1 PURPOSE The plan explains and explains the appropriate use of ICT (Information and Emails Technology) and

    Elephone G7 mobile phones for school-based workers. Its objective is to reduce the threat to studentsof unsuitable contact from workers, to secure workers and educational institutions from lawsuits and toreduce the threat to ICT techniques.

    2 SCOPE 2.1 This plan deals with the use of ICT features in educational institutions in Suffolk and applies to all

    school-based workers and other authorized customers, e.g. volunteers.2.2. Non university based workers are topic to the Nation Councils ICT Acceptable Use Policy. 3 SCHOOL RESPONSIBILITIES 3.1 The Regulating Human is accountable for guaranteeing that its workers act in a legal way, creating

    appropriate use of university technological innovation for accepted reasons only. 3.2 The Regulating Human is accountable for implementing appropriate recommendations and the

    Headteacher for guaranteeing that workers are aware of their material. 3.3 The Headteacher is accountable for maintaining an stock of ICT gadgets and a list of university laptop

    laptop or computer systems and Elephone P5000 mobile phones and to whom they have beenreleased.

    3.4 If the Headteacher has purpose to believe that any ICT gadgets has been abused, he/she should seek

    advice from the Place Employees Official or Education Cause Official at the Place Office for advicewithout delay. The Place Employees Official will believe the fact with the Headteacher and CSDs Policyand Conformity Manager an appropriate strategy for the research of the accusations. Occurrences willbe examined in regular basis according to decided techniques.

    3.5 Headteachers should let you know that inner university workers should not carry out any research

    unless they are both qualified and authorized to do so. 4 USER RESPONSIBILITIES4.1 Staff found to be in breach of this plan may be regimented depending on the disciplinary procedure. In

    certain conditions, breach of this plan may be considered total wrong doings leading to cancellations ofemployment. Users must report all alleged breaches of this plan to the Headteacher.

    4.2 Users and their supervisors are accountable for guaranteeing that sufficient introduction, training and

    support is performed to apply this plan. 4.3 By signing on to ICT techniques, customers accept to stick to this Acceptable Use plan and other

    recommendations that report to the use of ICT.

  • 4.4 All customers are needed to act in a accountable, moral and legal way with the understanding that

    university digital and guide details may be accessible to the community under the Independence ofInformation Act 2000. Users should maintain comfort and privacy depending on the Information SecurityAct 1998. Proper care must also be taken not to breach another persons signature, signature ordesign, nor to post any defamatory material.

    4.5 Staff who have been given the use of a college laptop will be predicted to sign for its use on invoice.

    Staff may use university gadgets for authorized company use only, except as allowed for in passage5.1.

    4.6 Staff must follow authorized techniques when moving ICT gadgets or taking Elephone G7 mobile

    phones off-site. 4.7 No one may use ICT sources in breach of certificate agreements, copyrights, agreements or national

    laws and regulations, or the Standing Purchases, recommendations, rules or rules of the university orthe Nation Authorities.

    4.8 Users are needed to secure their protection password and not share their consideration details with

    others for their use, nor utilize another users consideration or misrepresent their identification for anypurpose. Users must not under any conditions expose their protection password to anyone else.

    4.9 No customer shall accessibility (e.g., read, write, change, remove, copy, move) another customer's

    individual digital records (including email) without the owner's authorization or as allowed by this plan orby law.

    4.10 Users must not load or obtain application on any device without the authorisation of the Headteacher.

    Regular audits of application held on ICT gadgets will be performed. 4.11 Users must take want to store delicate details, e.g. student data securely and to keep it protection

    password secured, on all university techniques, such as laptop laptop or computer systems. 4.12 Network connected gadgets must have university accepted anti-virus application installed and

    triggered. Users may not turn off anti-virus application. All customers of ICT sources have the liability totake safety measures to prevent the initial incident and following growing of a trojan. No one mayintentionally create, set up, run, or spread any harmful code (e.g. malware, Trojan malware, worms) oranother dangerous program on any ICT resource.

    4.13 No one may intentionally or voluntarily intervene with the security systems or reliability of ICT sources.

    No one may use ICT sources to attempt unexpected use, or intervene with the genuine use byauthorized customers, of other laptop or computer systems on inner or exterior systems. Accesssystems will be supervised.

    4.14 Within the terms of the Information Security Act 1998, Human Rights Act 1998 and the Telecoms

    (Lawful Business Practice) (Interception of Communications) Regulations 2000, the Nation Authoritiesor university may record or examine any details passed on through or saved in its laptop or computersystems, such as e-mail communications and individual sign in classes, without notice when:

    There is affordable cause to believe the customer has breached or is breaking this plan, any

    recommendations or techniques established to apply this plan. An consideration appears to be involved in uncommon or uncommonly extreme action.

  • It is necessary to do so to secure the reliability, protection, or performance of ICT sources or to securethe Nation Authorities or its associates from liability.

    Establishing the lifestyle of facts appropriate to the company. Ascertaining or indicating requirements which ought to be obtained by those using the ICT facilities Preventing or discovering crime Investigating or discovering unexpected use of ICT facilities Ensuring effective function of ICT facilities Determining if communications are appropriate to the company (for example, in the last resort where an

    worker is off fed up or on holiday and company a continual is threatened) It is otherwise allowed or needed by law. 4.15 Do not deliver private, delicate or private details by unencrypted e-mail particularly to an exterior

    receiver - if random disclosure could result in significant harm or discomfort. Anonymise individualdetails where possible e.g. by using name. Use security passwords on delicate records that must besent to exterior individuals.

    4.16 Websites should not be designed on university gadgets without the written authorization of theHeadteacher.

    4.17 No one may use ICT sources to deliver violent, harmful, or annoying material, sequence characters,

    junk, or communications banned by law. No one may misuse the recommendations of any newsgroups,e-mail details, and other community boards through which they take part from a college consideration.

    4.18 The following material should not be designed or utilized on ICT gadgets at any time: Pornography and top-shelf adult content Material that gratuitously shows pictures of assault, injury or death Material that is likely to result in the pestering of others Material that encourages intolerance and elegance on reasons of competition, sex, impairment, sexual

    alignment, religious beliefs or age Material with regards to criminal action, for example dealing unlawful drugs Material with regards to any other unlawful action e.g. breach of signature Material that may generate protection threats and motivate laptop or computer misuse 4.19 It is possible to accessibility or be instructed to undesirable Web websites by accident. These can be

    uncomfortable and such websites can be difficult to get out of. If workers have utilized undesirablematerial or are in invoice of undesirable material via e-mail, they should inform the Headteacher. Thismay avoid problems later should tracking techniques be notified to the material.

    PERSONAL USE & PRIVACY 5.1 In the course of normal functions, ICT sources are to be used for company reasons only. The university

    allows limited individual use of ICT features by authorized customers topic to the following limitations: Personal use must be in the users own efforts and must not impact upon work performance or costs. The level of use must be affordable and not damaging to the main objective for which the features are

    provided. Personal use must not be of a commercial or profit-making characteristics. Personal use must not be of a characteristics that plays with the company of the university or disputes

    with an employees responsibilities.

  • 5.2 Personal use of the Online must not include attempting to accessibility the groups of material described

    in area 4.18 that is normally instantly obstructed by web filtration application. 6 MOBILE PHONE COMMUNICATION AND INSTANT MESSAGING 6.1 Staff are recommended not to give their home variety or their mobile variety to students. Mobile

    phone communication should be used occasionally and only when considered necessary. 6.2 Photographs and video clips of students should not be taken with cellular phones. 6.3 Staff are recommended not to create use of pupils cellular contact numbers either to create or get

    phone calls or to deliver to or get from students sms information other than for accepted universitycompany.

    6.4 Staff should only connect digitally with students from university accounts on accepted university

    company, e.g. training. 6.5 Staff should not enter into im communications with pupils.