Managing Internet Access Sample Clauses

The 'Managing Internet Access' clause defines the rules and responsibilities regarding how internet connectivity is provided, controlled, and monitored within a particular environment, such as a workplace or service location. This clause typically outlines who is authorized to access the internet, any restrictions on usage (such as blocking certain websites or limiting bandwidth), and the procedures for monitoring or auditing internet activity. Its core practical function is to ensure secure, appropriate, and efficient use of internet resources, thereby reducing risks related to security breaches, misuse, or network congestion.
Managing Internet Access. 4.1 Internet access:  Internet access will be authorised once parents and students have returned the signed Acceptable Use Agreement (Appendix A).  A record will be kept of all students who have been granted internet access.  Students’ passwords will be changed on a regular basis and their activity is continuously monitored by the E-Safety Officer.  Management systems will be in place to allow teachers and members of staff to control workstations and monitor students’ activity.  Effective filtering systems will be established to eradicate any potential risks to students through access to, or trying to access, certain websites which are harmful or use inappropriate material.  Filtering systems will be used which are relevant to students’ age ranges, their frequency of use of ICT systems, and the proportionality of costs compared to risks.  The LGC will ensure that use of appropriate filters and monitoring systems does not lead to ‘over blocking’, such that there are unreasonable restrictions as to what students can be taught with regards to online teaching and safeguarding.  Any requests by staff for websites to be added or removed from the filtering list must be first authorised by the Headteacher/Principal.  All school systems will be protected by up-to-date virus software.  An agreed procedure will be in place for the provision of temporary users, e.g. volunteers. These will be applicable to a 24 hour access right, or a set period of time agreed with the School Business Manager, Site Services Manager or Headteacher/Principal.  Master users’ passwords will be available to the Headteacher/Principal for regular monitoring of activity.  Personal use will only be monitored by the E-Safety Officer for access to any inappropriate or explicit sites, where it is justifiable to be necessary and in doing so, would outweigh the need for privacy. 4.2 Information system securitySchool ICT systems security will be reviewed regularly.  Security strategies will be discussed with the Trust and their appointed Strategic IT Partner.  Network profiles for each pupil and staff member are created, in which the individual must enter a username and personal password when accessing the ICT systems within the school.  Passwords have a minimum and maximum length, to prevent ‘easy’ passwords or mistakes when creating passwords. These will be alpha-numeric and must contain a symbol.  Passwords will expire after 90 days to ensure maximum security for pupil and staff...
Managing Internet Access. 3.1 Information system security
Managing Internet Access. Information system security E-mail Published content and the school web site Publishing pupil’s images and work Photographs taken by parents/carers for personal use Social networking and personal publishing
Managing Internet Access. The company will maintain a record of users who are granted access to the company’s devices and systems. All employees will read and sign the Code of Conduct and those individuals we support will sign The Acceptable Use Statement (see Appendix 1) before being given access to any company computer system, IT resources or internet. The following chart defines Student/Leaner access criteria in Schools Acceptable Acceptable at certain times Acceptable for nominated users Unacceptable Unacceptable and illegal Users shall Child sexual abuse images. The X not visit making, production or distribution internet sites, of indecent images of children. make, post, Contrary to the protection of download, Children Act 1978 upload, data Grooming incitement, arrangement X transfer, or facilitation of sexual acts against communicate children Contrary to the Sexual or pass on Offences Act 2003 material Possession of extreme X remarks pornographic image (grossly proposal or offensive, disgusting or otherwise comments of an absence character) Contrary that relate to; to the Criminal Justice and Immigration Act 2008 Criminally racist material in the UK X – to stir up religious hatred (or hatred on the grounds of sexual orientation contrary to the Public Order Act 1986 Pornography X Promotion of any kind of X discrimination Threatening behaviour, including X promotion of physical violence or Acceptable Acceptable at certain times Acceptable for nominated users Unacceptable Unacceptable and illegal mental harm Any other information which maybe offensive to colleagues or breaches the integrity of the ethos of the school/site or brings the service into disrepute. X Using school systems to run a private business X Using systems, applications, website or other mechanisms that bypass the filtering or other safeguards employed by the school/service X Infringing copyright X Revealing or publicising confidential or propriety information (e.g. financial/personal information, databases, computer/network access codes and passwords) X Creating or propagating computer viruses o other harmful files X Unfair usage (downloading/uploading large files that hinders others in their use of the internet X On-line gaming (educational) X On-line gaming (non-educational) X On-line gambling X On-line shopping commerce X File sharing X Use of Social media X Use of messaging Apps X Use of broadcasting (e.g. You Tube) X
Managing Internet Access. Information system security 2.1. School ICT systems security will be reviewed regularly. 2.2. Virus protection will be updated regularly. 2.3. Security strategies will be discussed with the LA. 2.4. Pupils may only use approved email accounts on the school system. 2.5. Pupils must immediately tell a teacher if they receive an offensive email. 2.6. In email communication, pupils must not reveal their personal details or those of others or arrange to meet anyone without specific permission. 2.7. Incoming emails will be treated as suspicious and attachments not opened unless the author is known. 2.8. The school will consider how emails from pupils to external bodies are presented and controlled. 2.9. The forwarding of chain letters is not permitted. 2.10. The school: • Provides staff with an email account for their professional use (Microsoft 365) and makes clear personal email should be through a separate account. • Does not publish personal email addresses of pupils or staff on the school website. • Will contact the police if one of our staff or pupils receives an email that it considers is particularly disturbing or breaks the law. • Will ensure that email accounts are maintained and up-to-date. • Reports messages relating to or in support of illegal activities to the relevant authority and if necessary to the police. • Knows that spam, phishing and virus attachments can make emails dangerous. 2.11. Staff or pupil personal contact information will not be published. The contact details given online should be the school office. 2.12. The headteacher will take overall editorial responsibility and ensure that content is accurate and appropriate, and the quality of presentation is maintained. 2.13. Uploading of information is restricted to our website authorisers. 2.14. The school website complies with the following statutory DfE guidelines for publications: • What academies, free schools and colleges should publish online 2.15. Most material is the school’s own work; where others’ work is published or linked to, we credit the sources used and state clearly the author's identity or status. 2.16. The point of contact on the website is the school address and telephone number. The school uses a general email contact address; ▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇.▇▇▇▇▇.▇▇▇.▇▇. Home information or individual email identities will not be published. 2.17. Photographs published on the web do not have full names attached. 2.18. The school does not use pupils’ names when saving images in the...
Managing Internet Access. Information system security E-mail Published content and the school web site Publishing photographs, images and work Social networking and personal publishing on the school learning platform Managing filtering
Managing Internet Access