Internet Safety and Acceptable Use Policies.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
The Woodlands High School
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Riverside Community School District
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Laura Koehne Online Safety: The Gateway to Your Child’s Internet Experience Amanda Biuso Laura Koehne Kyle Findley Hunter Smothers.
Duxbury’s Acceptable Use Policy Do they really expect me to read all of that stuff? Nicholas Tam Do they really expect me to read all of that stuff? Nicholas.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
INTERNET SAFETY Public Hearing  September 8, 2014.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
00870B2F.0/Internet%20Safety.jpg.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Mrs.. Taylor Cedar High School Business Web Page Design.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Complying with Acceptable Use Policies.  AUP  Code of Conduct for Internet Use  Used by Organizations and Businesses  Outlines agreement in writing.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
Leslie Lambert Q310-2, Winter 2001, Technology Policies The Technology Policies We Need Now and Why Is our current AUP acceptable?
Hoover High School Computer Labs San Diego City Schools Network Use Guidelines.
BYOD: Bring Your Own Device
Acceptable Use Policy By: Ashley Crehan Jessica Harmon Emily Edwards.
Acceptable Use Policies and Online Safety Katie Radcliffe Sabrina Harris Taylor Edwards.
INTERNET SAFETY.
Woodland Hills School District Computer Network Acceptable Use Policy.
School Accounts Presented by: Mrs. Mazzola.
Acceptable Use Policies and Online Safety Katie Radcliffe Sabrina Harris Taylor Edwards.
Presentation of Acceptable Use Policy Kathryn Thomas UMUC EDTC 620 Summer 2012.
Writing an Internet Policy for Your School Kathie Carwile Morgan, ED.D. Liberty University ACSI Washington DC Educator Convention Nov. 22 & 23, 2010 Crystal.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Access to Electronic Media Acceptable Use Policy August 8, 2016 Somerset Independent Schools.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Acceptable Use Policy (Draft)
The Acceptable Use of Technology
Digital Citizenship Grades 4-6
Technology Guidelines for Students
Internet Safety & Acceptable Use Standards
DIGITAL BUSINESS APPLICATIONS
Internet Safety and Acceptable Use Policies.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Student Accounts OFFICE 365 Student Accounts.
Technology Guidelines for Students
The Issues with Technology in education
Student User Agreement and Policy 2022
AUP, EDP, & Centralized Printing
Woodland Hills School District
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Internet Safety and Acceptable Use Policies

What is an Acceptable Use Policy? Acceptable Use Policy (AUP) Code of Conduct for Internet Use Used by Organizations and Businesses Outlines agreement in writing Document signed by employee/participant and the governing organization or business

What’s Included in Policy? Identifies owner of computers/network Defines intended use Identifies unacceptable use Notes consequences Requires signature of acceptance

Why Have a Policy? Protect the company or organization Protect the employee (or computer user) Maintains security

Friendly Reminder

Laws Governing Internet Use Copyright laws Child protection laws Privacy rights and safety National security Laws continue to evolve and change!

Unacceptable Behavior Visiting sites that contain obscene, hateful or otherwise illegal material Using the computer to perpetrate any form of fraud or music piracy Using the Internet to send offensive or harassing material to other users Hacking into unauthorized areas Publishing defamatory and/or knowingly false material about your company, colleagues and/or customers on social networking sites, blogs, etc.

Unacceptable Behavior Revealing confidential information about your company in a personal online posting, upload or transmission (financial information or information relating to customers, business plans, policies, staff and/or internal discussions) Undertaking deliberate activities that waste staff effort or networked resources Introducing any form of malicious software into the corporate network

AUP Consequences Chevron Corp. settled out of court—paying US $2.2 million—after the company was sued because of an e-mail circulated within the company containing offensive material. Microsoft Corp. settled for US $2.2 million a sexual harassment suit involving inappropriate e-mails sent within the company. http://www.isaca.org/Journal/archives/2005/Volume-6/Pages/Best-Practices-for-Establishing-an-Effective-Workplace-Policy-for-Acceptable-Computer-Usage1.aspx

AUP Consequences Xerox fired more than 40 employees for downloading inappropriate images. These downloads choked Xerox's computer system and prevented employees from sending and receiving legitimate e-mails. Wachovia Securities fired six brokers for sending inappropriate images in e-mails. http://www.isaca.org/Journal/archives/2005/Volume-6/Pages/Best-Practices-for-Establishing-an-Effective-Workplace-Policy-for-Acceptable-Computer-Usage1.aspx

LCPS Acceptable Use Students and parents agree by signing the Student R&R page and turning in first week of school each year. Always read a document before you sign it!

LCPS Acceptable Use This computer system is the property of Loudoun County Public Schools. Unauthorized access to this computer system is forbidden. Users (authorized or unauthorized) have no explicit or implicit expectations of privacy. By accessing this computer system, you voluntarily consent to all LCPS’s policies and regulations and you voluntarily consent to having your actions, emails or other electronic information monitored, recorded, seized and disclosed to authorized personnel as determined by LCPS.

Class Assignment: AUP Poster Select ONE key issue of acceptable Internet use in the classroom or workplace and illustrate that in a poster that would make students and/or employees aware of the policy. The poster will be evaluated on creativity, attractiveness, and effectiveness in delivering the message. The poster should be something that could be proudly displayed in a classroom or business setting.