Managing Internet Access Sample Clauses

Managing Internet Access. 4.1 Internet access:  Internet access will be authorised once parents and students have returned the signed Acceptable Use Agreement (Appendix A).  A record will be kept of all students who have been granted internet access.  Students’ passwords will be changed on a regular basis and their activity is continuously monitored by the E-Safety Officer.  Management systems will be in place to allow teachers and members of staff to control workstations and monitor students’ activity.  Effective filtering systems will be established to eradicate any potential risks to students through access to, or trying to access, certain websites which are harmful or use inappropriate material.  Filtering systems will be used which are relevant to students’ age ranges, their frequency of use of ICT systems, and the proportionality of costs compared to risks.  The LGC will ensure that use of appropriate filters and monitoring systems does not lead to ‘over blocking’, such that there are unreasonable restrictions as to what students can be taught with regards to online teaching and safeguarding.  Any requests by staff for websites to be added or removed from the filtering list must be first authorised by the Headteacher/Principal.  All school systems will be protected by up-to-date virus software.  An agreed procedure will be in place for the provision of temporary users, e.g. volunteers. These will be applicable to a 24 hour access right, or a set period of time agreed with the School Business Manager, Site Services Manager or Headteacher/Principal.  Master users’ passwords will be available to the Headteacher/Principal for regular monitoring of activity.  Personal use will only be monitored by the E-Safety Officer for access to any inappropriate or explicit sites, where it is justifiable to be necessary and in doing so, would outweigh the need for privacy. 4.2 Information system security  School ICT systems security will be reviewed regularly.  Security strategies will be discussed with the Trust and their appointed Strategic IT Partner.  Network profiles for each pupil and staff member are created, in which the individual must enter a username and personal password when accessing the ICT systems within the school.  Passwords have a minimum and maximum length, to prevent ‘easy’ passwords or mistakes when creating passwords. These will be alpha-numeric and must contain a symbol.  Passwords will expire after 90 days to ensure maximum security for pupil and staff...
AutoNDA by SimpleDocs
Managing Internet Access. 3.1 Information system security
Managing Internet Access. E-mail Published content and the school web site Publishing pupil’s images and work Photographs taken by parents/carers for personal use Social networking and personal publishing Managing filtering Managing emerging technologies
Managing Internet Access. The company will maintain a record of users who are granted access to the company’s devices and systems. All employees will read and sign the Code of Conduct and those individuals we support will sign The Acceptable Use Statement (see Appendix 1) before being given access to any company computer system, IT resources or internet. The following chart defines Student/Leaner access criteria in Schools Acceptable Acceptable at certain times Acceptable for nominated users Unacceptable Unacceptable and illegal Users shall Child sexual abuse images. The X not visit making, production or distribution internet sites, of indecent images of children. make, post, Contrary to the protection of download, Children Act 1978 upload, data Grooming incitement, arrangement X transfer, or facilitation of sexual acts against communicate children Contrary to the Sexual or pass on Offences Act 2003 material Possession of extreme X remarks pornographic image (grossly proposal or offensive, disgusting or otherwise comments of an absence character) Contrary that relate to; to the Criminal Justice and Immigration Act 2008 Criminally racist material in the UK X – to stir up religious hatred (or hatred on the grounds of sexual orientation contrary to the Public Order Act 1986 Pornography X Promotion of any kind of X discrimination Threatening behaviour, including X promotion of physical violence or Acceptable Acceptable at certain times Acceptable for nominated users Unacceptable Unacceptable and illegal mental harm Any other information which maybe offensive to colleagues or breaches the integrity of the ethos of the school/site or brings the service into disrepute. X Using school systems to run a private business X Using systems, applications, website or other mechanisms that bypass the filtering or other safeguards employed by the school/service X Infringing copyright X Revealing or publicising confidential or propriety information (e.g. financial/personal information, databases, computer/network access codes and passwords) X Creating or propagating computer viruses o other harmful files X Unfair usage (downloading/uploading large files that hinders others in their use of the internet X On-line gaming (educational) X On-line gaming (non-educational) X On-line gambling X On-line shopping commerce X File sharing X Use of Social media X Use of messaging Apps X Use of broadcasting (e.g. You Tube) X
Managing Internet Access. Information system security 2.1. School ICT systems security will be reviewed regularly. 2.2. Virus protection will be updated regularly. 2.3. Security strategies will be discussed with the LA. 2.4. Pupils may only use approved email accounts on the school system. 2.5. Pupils must immediately tell a teacher if they receive an offensive email. 2.6. In email communication, pupils must not reveal their personal details or those of others or arrange to meet anyone without specific permission. 2.7. Incoming emails will be treated as suspicious and attachments not opened unless the author is known. 2.8. The school will consider how emails from pupils to external bodies are presented and controlled. 2.9. The forwarding of chain letters is not permitted. 2.10. The school: • Provides staff with an email account for their professional use (Microsoft 365) and makes clear personal email should be through a separate account. • Does not publish personal email addresses of pupils or staff on the school website. • Will contact the police if one of our staff or pupils receives an email that it considers is particularly disturbing or breaks the law. • Will ensure that email accounts are maintained and up-to-date. • Reports messages relating to or in support of illegal activities to the relevant authority and if necessary to the police. • Knows that spam, phishing and virus attachments can make emails dangerous. 2.11. Staff or pupil personal contact information will not be published. The contact details given online should be the school office. 2.12. The headteacher will take overall editorial responsibility and ensure that content is accurate and appropriate, and the quality of presentation is maintained. 2.13. Uploading of information is restricted to our website authorisers. 2.14. The school website complies with the following statutory DfE guidelines for publications: • What academies, free schools and colleges should publish online 2.15. Most material is the school’s own work; where others’ work is published or linked to, we credit the sources used and state clearly the author's identity or status. 2.16. The point of contact on the website is the school address and telephone number. The school uses a general email contact address; xxxxxx@xxxxxxxxx.xxxxx.xxx.xx. Home information or individual email identities will not be published. 2.17. Photographs published on the web do not have full names attached. 2.18. The school does not use pupils’ names when saving images in the...
Managing Internet Access. Information system security E-mail Published content and the school web site Publishing photographs, images and work Social networking and personal publishing on the school learning platform Managing filtering
Managing Internet Access 
AutoNDA by SimpleDocs

Related to Managing Internet Access

  • Internet Access Hotels and Airports Employees who travel may need to access their e-mail at night. Many hotels provide free high speed internet access and Tyler employees are encouraged to use such hotels whenever possible. If an employee’s hotel charges for internet access it is reimbursable up to $10.00 per day. Charges for internet access at airports are not reimbursable.

  • Market Access 1. With respect to market access through the modes of supply identified in the "trade in services" definition of Article 104 (Definitions), each Party shall accord to services and service suppliers of the other Party treatment no less favourable than that provided for under the terms, limitations and conditions agreed and specified in its Schedule (7). 2. In sectors where market access commitments are undertaken, the measures which a Party shall not maintain or adopt either on the basis of a regional subdivision or on the basis of its entire territory, unless otherwise specified in its Schedule, are defined as: (a) limitations on the number of service suppliers whether in the form of numerical quotas, monopolies, exclusive service suppliers or the requirements of an economic needs test; (b) limitations on the total value of service transactions or assets in the form of numerical quotas or the requirement of an economic needs test; (c) limitations on the total number of service operations or on the total quantity of service output expressed in terms of designated numerical units in the form of quotas or the requirement of an economic needs test; (8) (d) limitations on the total number of natural persons that may be employed in a particular service sector or that a service supplier may employ and who are necessary for, and directly related to, the supply of a specific service in the form of numerical quotas or the requirement of an economic needs test; (e) measures which restrict or require specific types of legal entity or joint venture through which a service supplier may supply a service; or (f) limitations on the participation of foreign capital in terms of maximum percentage limit on foreign shareholding or the total value of individual or aggregate foreign investment.

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Availability of Verizon Telecommunications Services 3.1 Verizon will provide a Verizon Telecommunications Service to Z-Tel for resale pursuant to this Attachment where and to the same extent, but only where and to the same extent, that such Verizon Telecommunications Service is provided to Verizon’s Customers. 3.2 Except as otherwise required by Applicable Law, subject to Section 3.1, Verizon shall have the right to add, modify, grandfather, discontinue or withdraw, Verizon Telecommunications Services at any time, without the consent of Z-Tel. 3.3 To the extent required by Applicable Law, the Verizon Telecommunications Services to be provided to Z-Tel for resale pursuant to this Attachment will include a Verizon Telecommunications Service customer-specific contract service arrangement (“CSA”) (such as a customer specific pricing arrangement or individual case based pricing arrangement) that Verizon is providing to a Verizon Customer at the time the CSA is requested by Z-Tel.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!