ICT School Policies 6 th November 2014. Suggested Policies for Schools Not always a requirement, but useful to cover you, your school and the students.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
ESafety Strategy. The six priorities Raise awareness and understanding of eSafety issues amongst children and young people Raise awareness and understanding.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Factors to be taken into account when designing ICT Security Policies
10 Essential Security Measures PA Turnpike Commission.
Awareness raising session for Parents and Carers.
INTERNET SAFETY Lynn W Zimmerman, PhD.  Hacking  Identity theft  Stolen passwords  Invasion of privacy POTENTIAL PROBLEMS  Stalking  Cyber-bullying.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Lead ▪ learn ▪ protect ▪ engage Ofsted e-Safety Briefing e-Learning and Information Management Service Julia Briggs Education Technology.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Practical Information Management
Information Security Technological Security Implementation and Privacy Protection.
St Meryl School e-Safety Presentation for Parents 16 th June 2015 Mr Davies (Computing Subject Leader)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Next Generation Learning How good is your Acceptable Use Policy (AUP)? Presented by Ruth Hammond, Manager, Safeguarding Programmes Presented at BETT 2009.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Cyber Security & Fraud – The impact on small businesses.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Helping you and your family to stay in control. YouTubeWhatsApp Instagram Facebook Google Moviestar Planet Twitter Oovoo Amazon Club Penguin.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Working with HIT Systems
Internet Safety Presentation by Diahn Hess. Overview Internet Safety Private and personal information Meeting people online Safe interactions Cyberbullying.
Grove Primary School. What is E-Safety? E-Safety is a term which means not only the internet but other ways in which young people communicate using electronic.
© University of Reading Information Technology Services 23 December 2015 Information Security Policy Mike Roch - Director of IT.
IT & e-Safety Paul Leverett Lead Teacher of ICT 25 th September 2013.
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Health Insurance Portability and Accountability Act By Bradley Gleich.
Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.
Security and Ethics Safeguards and Codes of Conduct.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Policies and Security for Internet Access
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
Online Safety ~ Raising students’ awareness of the risks of Internet use ~
E-Safety for parents and carers Highfield Community Primary School.
Brighton & Hove Healthy Schools Team E-safety and Cyberbullying Information for Parents and Carers.
KS2 E-Safety assembly How to be smart and keep safe online.
Scientific data storage: How are computers involved in the following?
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Online Safety The Campion School.
Digital Citizenship Grades 4-6
Online Safety and Safeguarding Update
East Carolina University
Living with technology Helping you and your family to stay in control
Final HIPAA Security Rule
County HIPAA Review All Rights Reserved 2002.
Chapter 27 Security Engineering
Information management and communication
Drew Hunt Network Security Analyst Valley Medical Center
How it affects policies and procedures
Introduction to the PACS Security
Guidelines for building security policies. Building a successful set of security policies will ensure that your business stands the best possible chance.
Presentation transcript:

ICT School Policies 6 th November 2014

Suggested Policies for Schools Not always a requirement, but useful to cover you, your school and the students and teachers within the school. Excellent for Ofsted, parental queries, dealing with difficult incidents and as a mechanism for agreeing process with leadership teams.

Disaster Recovery Policy Discussed Previously Includes: how, what, when along with details of testing and recovery Include recording of previous testing and major incidents

Data Protection Data Storage Data Encryption Data in Transit Security Access and Permissions Password Policies Physical protection to data Network Security

Mobile and Portable Devices Data in transit Device encryption Device Security Use of Device by others Suitable Locations for Device Use Requirement of Device to be returned to school at set periods

E-Safeguarding Safe use of ICT for students E-Safety Risks and Responsibilities Protection methods (software, filters, access etc) Links to other schools policies (Safeguarding, Bullying) Process for recording and dealing with incidents

Social Media Policy Staff responsibilities related to Social Media usage Social Media usage within School Advice and guidelines on following policy and maintaining appropriate security on profiles

Health and Safety (part of) Risk Assessments Safe use (RSI, DSE) Health and Safety checks and processes

Maintenance and Renewal Maintenance to ensure equipment is serviced and maintained to keep working Maintained for Health and Safety Renewal of Equipment (to ensure that equipment isn’t used beyond warranties or date of suitability) Equipment testing

Inventory and Audit List of Equipment and locations Age of Equipment and Supplier (warranty) Loan Equipment Log Disposal Log with accompanied disposal certificates Testing and Maintenance information could be stored here

Acceptable Use Policy - Staff Internet Use Guidelines Password and Account details Use of computers within school Responsibilities when working with computers ICT Support processes

Acceptable Use Policy - Students Use of computers Internet: appropriate access, safe access and cyberbullying Password and network access Rules and Responsibilities