Sie sind auf Seite 1von 4

Appropriate Use of ICT and Cellular Mobile phones Plan

1 PURPOSE

The plan explains and explains the appropriate use of ICT (Information and Emails Technology) and
Elephone G7 mobile phones for school-based workers. Its objective is to reduce the threat to students
of unsuitable contact from workers, to secure workers and educational institutions from lawsuits and to
reduce the threat to ICT techniques.

2 SCOPE

2.1 This plan deals with the use of ICT features in educational institutions in Suffolk and applies to all
school-based workers and other authorized customers, e.g. volunteers.
2.2. Non university based workers are topic to the Nation Councils ICT Acceptable Use Policy.

3 SCHOOL RESPONSIBILITIES

3.1 The Regulating Human is accountable for guaranteeing that its workers act in a legal way, creating
appropriate use of university technological innovation for accepted reasons only.

3.2 The Regulating Human is accountable for implementing appropriate recommendations and the
Headteacher for guaranteeing that workers are aware of their material.

3.3 The Headteacher is accountable for maintaining an stock of ICT gadgets and a list of university laptop
laptop or computer systems and Elephone P5000 mobile phones and to whom they have been
released.

3.4 If the Headteacher has purpose to believe that any ICT gadgets has been abused, he/she should seek
advice from the Place Employees Official or Education Cause Official at the Place Office for advice
without delay. The Place Employees Official will believe the fact with the Headteacher and CSDs Policy
and Conformity Manager an appropriate strategy for the research of the accusations. Occurrences will
be examined in regular basis according to decided techniques.

3.5 Headteachers should let you know that inner university workers should not carry out any research
unless they are both qualified and authorized to do so.

4 USER RESPONSIBILITIES
4.1 Staff found to be in breach of this plan may be regimented depending on the disciplinary procedure. In
certain conditions, breach of this plan may be considered total wrong doings leading to cancellations of
employment. Users must report all alleged breaches of this plan to the Headteacher.

4.2 Users and their supervisors are accountable for guaranteeing that sufficient introduction, training and
support is performed to apply this plan.

4.3 By signing on to ICT techniques, customers accept to stick to this Acceptable Use plan and other
recommendations that report to the use of ICT.


4.4 All customers are needed to act in a accountable, moral and legal way with the understanding that
university digital and guide details may be accessible to the community under the Independence of
Information Act 2000. Users should maintain comfort and privacy depending on the Information Security
Act 1998. Proper care must also be taken not to breach another persons signature, signature or
design, nor to post any defamatory material.

4.5 Staff who have been given the use of a college laptop will be predicted to sign for its use on invoice.
Staff may use university gadgets for authorized company use only, except as allowed for in passage
5.1.

4.6 Staff must follow authorized techniques when moving ICT gadgets or taking Elephone G7 mobile
phones off-site.

4.7 No one may use ICT sources in breach of certificate agreements, copyrights, agreements or national
laws and regulations, or the Standing Purchases, recommendations, rules or rules of the university or
the Nation Authorities.

4.8 Users are needed to secure their protection password and not share their consideration details with
others for their use, nor utilize another users consideration or misrepresent their identification for any
purpose. Users must not under any conditions expose their protection password to anyone else.

4.9 No customer shall accessibility (e.g., read, write, change, remove, copy, move) another customer's
individual digital records (including email) without the owner's authorization or as allowed by this plan or
by law.

4.10 Users must not load or obtain application on any device without the authorisation of the Headteacher.
Regular audits of application held on ICT gadgets will be performed.

4.11 Users must take want to store delicate details, e.g. student data securely and to keep it protection
password secured, on all university techniques, such as laptop laptop or computer systems.

4.12 Network connected gadgets must have university accepted anti-virus application installed and
triggered. Users may not turn off anti-virus application. All customers of ICT sources have the liability to
take safety measures to prevent the initial incident and following growing of a trojan. No one may
intentionally create, set up, run, or spread any harmful code (e.g. malware, Trojan malware, worms) or
another dangerous program on any ICT resource.

4.13 No one may intentionally or voluntarily intervene with the security systems or reliability of ICT sources.
No one may use ICT sources to attempt unexpected use, or intervene with the genuine use by
authorized customers, of other laptop or computer systems on inner or exterior systems. Access
systems will be supervised.

4.14 Within the terms of the Information Security Act 1998, Human Rights Act 1998 and the Telecoms
(Lawful Business Practice) (Interception of Communications) Regulations 2000, the Nation Authorities
or university may record or examine any details passed on through or saved in its laptop or computer
systems, such as e-mail communications and individual sign in classes, without notice when:

There is affordable cause to believe the customer has breached or is breaking this plan, any
recommendations or techniques established to apply this plan.
An consideration appears to be involved in uncommon or uncommonly extreme action.

It is necessary to do so to secure the reliability, protection, or performance of ICT sources or to secure


the Nation Authorities or its associates from liability.
Establishing the lifestyle of facts appropriate to the company.
Ascertaining or indicating requirements which ought to be obtained by those using the ICT facilities
Preventing or discovering crime
Investigating or discovering unexpected use of ICT facilities
Ensuring effective function of ICT facilities
Determining if communications are appropriate to the company (for example, in the last resort where an
worker is off fed up or on holiday and company a continual is threatened)
It is otherwise allowed or needed by law.

4.15 Do not deliver private, delicate or private details by unencrypted e-mail particularly to an exterior
receiver - if random disclosure could result in significant harm or discomfort. Anonymise individual
details where possible e.g. by using name. Use security passwords on delicate records that must be
sent to exterior individuals.
4.16 Websites should not be designed on university gadgets without the written authorization of the
Headteacher.

4.17 No one may use ICT sources to deliver violent, harmful, or annoying material, sequence characters,
junk, or communications banned by law. No one may misuse the recommendations of any newsgroups,
e-mail details, and other community boards through which they take part from a college consideration.

4.18 The following material should not be designed or utilized on ICT gadgets at any time:

Pornography and top-shelf adult content


Material that gratuitously shows pictures of assault, injury or death
Material that is likely to result in the pestering of others
Material that encourages intolerance and elegance on reasons of competition, sex, impairment, sexual
alignment, religious beliefs or age
Material with regards to criminal action, for example dealing unlawful drugs
Material with regards to any other unlawful action e.g. breach of signature
Material that may generate protection threats and motivate laptop or computer misuse

4.19 It is possible to accessibility or be instructed to undesirable Web websites by accident. These can be
uncomfortable and such websites can be difficult to get out of. If workers have utilized undesirable
material or are in invoice of undesirable material via e-mail, they should inform the Headteacher. This
may avoid problems later should tracking techniques be notified to the material.

PERSONAL USE & PRIVACY

5.1 In the course of normal functions, ICT sources are to be used for company reasons only. The university
allows limited individual use of ICT features by authorized customers topic to the following limitations:

Personal use must be in the users own efforts and must not impact upon work performance or costs.
The level of use must be affordable and not damaging to the main objective for which the features are
provided.
Personal use must not be of a commercial or profit-making characteristics.
Personal use must not be of a characteristics that plays with the company of the university or disputes
with an employees responsibilities.


5.2 Personal use of the Online must not include attempting to accessibility the groups of material described
in area 4.18 that is normally instantly obstructed by web filtration application.

6 MOBILE PHONE COMMUNICATION AND INSTANT MESSAGING

6.1 Staff are recommended not to give their home variety or their mobile variety to students. Mobile
phone communication should be used occasionally and only when considered necessary.

6.2 Photographs and video clips of students should not be taken with cellular phones.

6.3 Staff are recommended not to create use of pupils cellular contact numbers either to create or get
phone calls or to deliver to or get from students sms information other than for accepted university
company.

6.4 Staff should only connect digitally with students from university accounts on accepted university
company, e.g. training.

6.5 Staff should not enter into im communications with pupils.

Das könnte Ihnen auch gefallen