Policy and Procedure The school seeks to ensure that internet, mobile and digital technologies are used effectively and safely, for their intended educational purpose, in ways that will not infringe legal requirements or create unnecessary risk. The school expects everyone to use internet, mobile and digital technologies responsibly and strictly according to the conditions set out in this policy. This policy also includes expectations on appropriate online behaviour and use of technology outside of school for pupils, parents/carers, staff and governors and all other visitors to the school. Use of email Staff and governors should use a school email account or Governor Hub for all official school communication to ensure everyone is protected through the traceability of communication. Under no circumstances should staff contact pupils, parents or conduct any school business using a personal email address. Pupils should use school approved accounts on the school system for educational purposes. Where required parent/carer permission will be obtained for the pupil account to exist. For advice on emailing, sharing personal or confidential information or the need to gain parent permission refer to the policy for GDPR. Emails created or received as part of any school role will be subject to disclosure in response to a request for information under the Freedom of Information Act 2000. Staff, governors and pupils should not open emails or attachments from suspect sources and should report their receipt to Xxxx Xxxxxxxxxxx, our IT Technician, for advice. Users must not send emails which are offensive, embarrassing or upsetting to anyone (i.e. cyberbullying). Visiting online sites and downloading • Staff must preview sites, software and apps before their use in school or before recommending them to pupils. Before using any online service that requires user accounts to be created or the sharing of any personal data, staff must consult with Xxxx Xxxxxxxxxxx, the Data Protection Officer, with details of the site/service and seek approval from a senior leader. The terms and conditions of the service should be read and adhered to, and parental/carer permission sought where required. If internet research is set for homework, specific sites will be suggested that have been checked by the teacher. All users must observe copyright of materials from electronic sources. • Staff must only use pre-approved systems if creating blogs, wikis or other online content. • When working with pupils searching for images should be done through Google Safe Search (standard through the HICS service), Google Advanced Search or a similar application that provides greater safety than a standard search engine. Users must not: Visit internet sites, make, post, download , upload or pass on, material, remarks, proposals or comments that contain or relate to: • Indecent images of children actually or apparently under the age of 18 or images of child abuse (i.e. images of children, digital or cartoons, involved in sexual activity or posed to be sexually provocative) • Indecent images of vulnerable people over the age of 18 (i.e. images of vulnerable people, digital or cartoons involved in sexual activity or posed to be sexually provocative) • Adult material that breaches the Obscene Publications Act in the UK • Promoting discrimination of any kind in relation to the protected characteristics: age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race or ethnicity, religion or belief, sex, sexual orientation • Promoting hatred against any individual or group from the protected characteristics above • Promoting illegal acts including physical or sexual abuse of children or adults, violence, bomb making, drug and alcohol abuse and software piracy • Any material that may bring the school or any individual within it into disrepute e.g. promotion of violence, gambling, libel and disrespect Users must not: • Reveal or publicise confidential or proprietary information • Intentionally interfere with the normal operation of the internet connection, including the propagation of computer viruses • Transmit unsolicited commercial or advertising material either to other users, or to organisations connected to other networks except where permission has been given to the school • Use the school's hardware and Wi-Fi facilities for running a private business • Intimidate, threaten or cause harm to others • Access or interfere in any way with other users' accounts • Use software or hardware that has been prohibited by the school Only a school device may be used to conduct school business outside of school. The only exception would be where a closed, monitorable system has been set up by the school for use on a personal device. Such a system would ensure the user was not saving files locally to their own device and breaching data security. A monitorable system would be one such as LARA. Through LARA, any school documents accessed on a personal device are never actually on the computer being used, they remain on the school server. When the user logs-out of XXXX, there are no copies left on their own device All breaches of prohibited behaviours detailed above will be investigated, where appropriate, in liaison with the police. The school recognises that in certain planned curricular activities, access to controversial and/or offensive online content may be beneficial for educational use. In such circumstances, there is an expectation that access is pre-planned, risk assessed and recorded, and permission given by the Headteacher.
Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.
Overpayment Policies and Procedures Within 90 days after the Effective Date, Xxxxx shall develop and implement written policies and procedures regarding the identification, quantification and repayment of Overpayments received from any Federal health care program.
Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.
Rules and Procedures (a) The Benefit Society By-Laws will be amended to provide for a 6th Director with three Directors appointed by the Unions and three Directors appointed by the Corporation.
Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.
Definition and Procedure 26.1.1 For the purposes of this PPP Agreement, "
SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.
HIRING PROCEDURE 5.1 The Employer agrees that whenever employees covered by this Agreement are required, the Employer shall call the Union office of the Local Union(s) having jurisdiction.