Saturday, 20 June 2015

Digital Rights and Responsibilities

DIGITAL RIGHTS AND RESPONSIBILITIES

ACCEPTABLE USE OF POLICY

As an education institution it is very vital that there are certain laws put in place in order to ensure the safety and well-being of all persons in the institution. Students are the first priority in the institution and as such there are laws put in place in order to protect them at all times. With such laws, there comes rights and responsibilities that the students must adhere to and failure to do so might result inaction taken against them or the staff that is employed by the institution.


The IIE is dedicated to supporting and maintaining a scholarly community. As its central purpose, this community promotes intellectual inquiry through vigorous discourse. Values which under gird this purpose include civility, dignity, diversity, education, equality, freedom, honesty, and safety.

ACCEPTABLE USE OF POLICY

This Acceptable Usage Policy covers the security and use of all (IIE’s)
information and IT equipment. It also includes the use of email, internet, voice and mobile IT
equipment. This policy applies to all (IIE’s) employees and students (hereafter referred to as ‘individuals’). This policy applies to all information, in whatever form, relating to (IIE’s) business activities nationwide, and to all information handled by (IIE) relating to other organisations with whom it deals. It also covers all IT and information
communications facilities operated by (IIE) or on its behalf.

Computer Access Control – Individual’s Responsibility

Access to the (IIE) IT systems is controlled by the use of User IDs,
passwords and/or tokens. All User IDs and passwords are to be uniquely assigned to named
individuals and consequently, individuals are accountable for all actions on the (IIE’s) IT systems.

Individuals must not:

  • Allow anyone else to use their user ID/token and password on any (IIE) IT system.
  • Leave their user accounts logged in at an unattended and unlocked computer.
  • Use someone else’s user ID and password to access (IIE’s) IT systems.
  • Leave their password unprotected (for example writing it down).
  • Perform any unauthorized changes to (IIE’s) IT systems or information.
  • Attempt to access data that they are not authorized to use or access.
  • Exceed the limits of their authorization or specific business need to interrogate the system or data.
  • Connect any non-(IIE) authorized device to the (IIE) network or IT systems.
  • Store (IIE) data on any non-authorized (IIE) equipment.
  • Give or transfer (IIE) data or software to any person or organisation outside (IIE) without the authority of (IIE).

Line managers must ensure that individuals are given clear direction on the extent and limits
of their authority with regard to IT systems and data.

Internet and email Conditions of Use:

Use of (IIE) internet and email is intended for business use. Personal use is
permitted where such use does not affect the individual’s work or school performance, is not
detrimental to (IIE) in any way, not in breach of any term and condition of
employment/enrollment and does not place the individual or (IIE) in breach of statutory
or other legal obligations. All individuals are accountable for their actions on the internet and email systems

Individuals must not:

  • Use the internet or email for the purposes of harassment or abuse.
  • Use profanity, obscenities, or derogatory remarks in communications.
  • Access, download, send or receive any data (including images), which (IIE) considers offensive in any way, including sexually explicit, discriminatory, defamatory or libelous material.
  • Use the internet or email to make personal gains or conduct a personal business.
  • Use the internet or email to gamble.
  • Use the email systems in a way that could affect its reliability or effectiveness, for example distributing chain letters or spam.
  • Place any information on the Internet that relates to (IIE), alter any information about it, or express any opinion about (IIE), unless they are specifically authorized to do this.
  • Send unprotected sensitive or confidential information externally.
  • Forward (IIE) mail to personal (non-IIE) email accounts (for example a personal Hotmail account).
  • Make official commitments through the internet or email on behalf of (IIE) unless authorized to do so.
  • Download copyrighted material such as music media (MP3) files, film and video files (not an exhaustive list) without appropriate approval.
  • In any way infringe any copyright, database rights, trademarks or other intellectual property.
  • Download any software from the internet without prior approval of the IT Department.
  • Connect (IIE) devices to the internet using non-standard connections.

Clear Desk and Clear Screen Policy

In order to reduce the risk of unauthorized access or loss of information, (IIE)
enforces a clear desk and screen policy as follows:

  • Personal or confidential business information must be protected using security features provided for example secure print on printers.
  • Computers must be logged off/locked or protected with a screen locking mechanism controlled by a password when unattended.
  • Care must be taken to not leave confidential material on printers or photocopiers.
  • All business-related printed matter must be disposed of using confidential waste bins or shredders.

Mobile Storage Devices

Mobile devices such as memory sticks, CD's, DVDs and removable hard drives must be
used only in situations when network connectivity is unavailable or there is no other secure
method of transferring data. Only (IIE) authorized mobile storage devices
with encryption enabled must be used, when transferring sensitive or confidential data.

Software

Employees must use only software that is authorized by (IIE) on (IEE’s) computers. Authorized software be used in accordance with the software supplier's licensing agreements. All software on (IIE) computers
must be approved and installed by the (IIE) IT department.

Individuals must not:


  • Store personal files such as music, video, photographs or games on (IIE) IT equipment.

Viruses

The IT department has implemented centralized, automated virus detection and virus
software updates within the (IIE). All PCs have antivirus software installed to
detect and remove any virus automatically.

Individuals must not:


  • Remove or disable anti-virus software.
  • Attempt to remove virus-infected files or clean up an infection, other than by the use of approved (IIE) anti-virus software and procedures.

Monitoring and Filtering

All data that is created and stored on (IIE) computers is the property of
(IIE) and there is no official provision for individual data privacy, however
wherever possible (IIE) will avoid opening personal emails.
IT system logging will take place where appropriate, and investigations will be commenced
where reasonable suspicion exists of a breach of this or any other policy. (IIE) has the right (under certain conditions) to monitor activity on its systems,
including internet and email use, in order to ensure systems security and effective operation,
and to protect against misuse.
Any monitoring will be carried out in accordance with audited, controlled internal processes,
the UK Data Protection Act 1998, the Regulation of Investigatory Powers Act 2000 and the
Telecommunications (Lawful Business Practice Interception of Communications)
Regulations 2000.

It is your responsibility to report suspected breaches of security policy without delay
to your line management, the IT department, the information security department or
the IT help-desk.
All breaches of information security policies will be investigated. Where
investigations reveal misconduct, disciplinary action may follow in line with (IIE)
disciplinary procedures.

STUDENT RIGHTS AND RESPONSIBILITIES

RIGHTS:
  • Students have the right to computer access within the institution's network
  • Students have the right to be treated fairly and with dignity regardless of race, color, national origin, age, marital status, sex, sexual orientation, gender identity, gender expression, disability, religion, height, weight, or veteran status.
  • Students have the right to be protected from capricious decision-making by the College and to have access to College policies which affect them. 
Along with rights come certain responsibilities. Students at the College are expected to act consistently with the values of the College community and to obey local and state laws.


RESPONSIBILITIES:
  • Students must not damage the College's equipment in any way
  • Students must use the College equipment and internet access accordingly
  • Students must not violate College computer policies

Failure to comply with the responsibilities mentioned in the Acceptable Use of Policy of the IIE institute may result in the following interventions, after all resolution procedures have been exhausted.

INTERVENTIONS TO BE TAKEN:
  • Formal Reprimand:
    A formal notice that the Statement has been violated and that future violations will be dealt with more severely.
  • Disciplinary Probation:
    A designated period of time during which the student is not in good standing with the College. The terms of probation may involve restrictions of student privileges and/or set specific behavioral expectations.
  • Restitution:
    Reasonable compensation for loss, damage, or injury to the appropriate party in the form of community service or service learning, money, or material replacement.
  • Restriction from Employment at the College:
    Prohibition or limitation on College employment.
  • Class/Workshop Attendance:
    Enrollment and completion of a class or workshop that could help the student understand why certain behavior was inappropriate.
  •  Educational Project:
    Completion of a project specifically designed to help the student understand why certain behavior was inappropriate.
  • Service:
    Performance of one or more tasks designed to benefit the community and help the student understand why certain behavior was inappropriate.
  •  Removal from Specific Courses or Activities:
    Suspension or transfer from courses or activities at the College for a specified period of time.
  •  No Contact:
    Restriction from entering specific College  areas and/or all forms of contact with certain person(s).
  • Suspension:
    Separation from the College  for a specified period of time or until certain conditions are met.
  • Expulsion:
    Permanent separation from the College.

No comments:

Post a Comment