Managing Internet Access Sample Clauses

Managing Internet Access. 4.1 Internet access:  Internet access will be authorised once parents and students have returned the signed Acceptable Use Agreement (Appendix A).  A record will be kept of all students who have been granted internet access.  Students’ passwords will be changed on a regular basis and their activity is continuously monitored by the E-Safety Officer.  Management systems will be in place to allow teachers and members of staff to control workstations and monitor students’ activity.  Effective filtering systems will be established to eradicate any potential risks to students through access to, or trying to access, certain websites which are harmful or use inappropriate material.  Filtering systems will be used which are relevant to students’ age ranges, their frequency of use of ICT systems, and the proportionality of costs compared to risks.  The LGC will ensure that use of appropriate filters and monitoring systems does not lead to ‘over blocking’, such that there are unreasonable restrictions as to what students can be taught with regards to online teaching and safeguarding.  Any requests by staff for websites to be added or removed from the filtering list must be first authorised by the Headteacher/Principal.  All school systems will be protected by up-to-date virus software.  An agreed procedure will be in place for the provision of temporary users, e.g. volunteers. These will be applicable to a 24 hour access right, or a set period of time agreed with the School Business Manager, Site Services Manager or Headteacher/Principal.  Master users’ passwords will be available to the Headteacher/Principal for regular monitoring of activity.  Personal use will only be monitored by the E-Safety Officer for access to any inappropriate or explicit sites, where it is justifiable to be necessary and in doing so, would outweigh the need for privacy.
AutoNDA by SimpleDocs
Managing Internet Access. Information system security ➢ School ICT systems security will be reviewed regularly ➢ Virus protection will be updated regularly ➢ Security strategies will be discussed with the Local Authority E-mail ➢ Pupils and staff may only use approved e-mail accounts on the school system. ➢ Pupils must immediately tell a teacher if they receive offensive e-mail ➢ Pupils must not reveal personal details of themselves or others in e-mail communication, or arrange to meet anyone without specific permission. ➢ Staff to pupil email communication must only take place via a school email address or from within the learning platform and will be monitored. ➢ Incoming e-mail should be treated as suspicious and attachments not opened unless the author is known. ➢ The school will consider how e-mail from pupils to external bodies is presented and controlled. ➢ The forwarding of chain letters is not permitted. Published content and the school web site ➢ The contact details on the Web site should be the school address, e-mail and telephone number. Staff or pupils personal information will not be published. ➢ The Headteacher will take overall editorial responsibility and ensure that content is accurate and appropriate. Publishing photographs, images and work ➢ Photographs that include pupils will be selected carefully and will not enable individual pupils to be clearly identified. The school will look to seek to use group photographs rather than full-face photos of individual children. ➢ Pupils’ full names will be avoided on the Web site or learning platform, as appropriate, including in blogs, forums or wikis, particularly in association with photographs. ➢ Written permission from parents or carers will be obtained before photographs or images of pupils are published ➢ Written permission from adults will be obtained before their names, photographs or images of themselves are published ➢ Parents should be clearly informed of the school policy on image taking and publishing, both on school and independent electronic repositories Social networking and personal publishing on the school learning platform ➢ The school will control access to social networking sites, and consider how to educate pupils in their safe use e.g. use of passwords. ➢ Newsgroups will be blocked unless a specific use is approved. ➢ All users will be advised never to give out personal details of any kind which may identify them, anybody else or their location. ➢ Pupils must not place personal photos on any social ...
Managing Internet Access. The company will maintain a record of users who are granted access to the company’s devices and systems. All employees will read and sign the Code of Conduct and those individuals we support will sign The Acceptable Use Statement (see Appendix 1) before being given access to any company computer system, IT resources or internet. The following chart defines Student/Leaner access criteria in Schools Acceptable Acceptable at certain times Acceptable for nominated users Unacceptable Unacceptable and illegal Users shall Child sexual abuse images. The X not visit making, production or distribution internet sites, of indecent images of children. make, post, Contrary to the protection of download, Children Act 1978 upload, data Grooming incitement, arrangement X transfer, or facilitation of sexual acts against communicate children Contrary to the Sexual or pass on Offences Act 2003 material Possession of extreme X remarks pornographic image (grossly proposal or offensive, disgusting or otherwise comments of an absence character) Contrary that relate to; to the Criminal Justice and Immigration Act 2008 Criminally racist material in the UK X – to stir up religious hatred (or hatred on the grounds of sexual orientation contrary to the Public Order Act 1986 Pornography X Promotion of any kind of X discrimination Threatening behaviour, including X promotion of physical violence or Acceptable Acceptable at certain times Acceptable for nominated users Unacceptable Unacceptable and illegal mental harm Any other information which maybe offensive to colleagues or breaches the integrity of the ethos of the school/site or brings the service into disrepute. X Using school systems to run a private business X Using systems, applications, website or other mechanisms that bypass the filtering or other safeguards employed by the school/service X Infringing copyright X Revealing or publicising confidential or propriety information (e.g. financial/personal information, databases, computer/network access codes and passwords) X Creating or propagating computer viruses o other harmful files X Unfair usage (downloading/uploading large files that hinders others in their use of the internet X On-line gaming (educational) X On-line gaming (non-educational) X On-line gambling X On-line shopping commerce X File sharing X Use of Social media X Use of messaging Apps X Use of broadcasting (e.g. You Tube) X
Managing Internet Access. 4.1 Internet access: ● Internet access will be authorised once parents and pupils have returned the signed Acceptable Use Agreement (Appendix A). ● A record will be kept of all pupils who have been granted internet access. ● Pupils’ passwords will be changed on a regular basis and their activity is continuously monitored by the E-Safety Officer. ● Management systems will be in place to allow teachers and members of staff to control workstations and monitor pupils’ activity. ● Effective filtering systems will be established to eradicate any potential risks to pupils through access to, or trying to access, certain websites which are harmful or use inappropriate material. ● Filtering systems will be used which are relevant to pupils’ age ranges, their frequency of use of ICT systems, and the proportionality of costs compared to risks. ● The Trust will ensure that use of appropriate filters and monitoring systems does not lead to ‘over blocking’, such that there are unreasonable restrictions as to what pupils can be taught with regards to online teaching and safeguarding. ● Any requests by staff for websites to be added or removed from the filtering list must be first authorised by the Chief Operating Officer. ● All school systems will be protected by up-to-date virus software.
Managing Internet Access. 3.1 Information system security  School ICT systems capacity and security will be reviewed regularly  Virus protection will be updated regularly
Managing Internet Access. Information system security The Internet is an open communication medium, available to all, at all times. Anyone can view information, send messages, discuss ideas and publish material, which makes it both an invaluable resource for education, business and social interaction, as well as a potential risk to young and vulnerable people. • School ICT systems capacity and security will be reviewed regularly. • Virus protection will be updated regularly.
Managing Internet Access. Information system security
AutoNDA by SimpleDocs
Managing Internet Access 

Related to Managing Internet Access

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • Market Access 1. With respect to market access through the modes of supply identified in the "trade in services" definition of Article 104 (Definitions), each Party shall accord to services and service suppliers of the other Party treatment no less favourable than that provided for under the terms, limitations and conditions agreed and specified in its Schedule (7). 2. In sectors where market access commitments are undertaken, the measures which a Party shall not maintain or adopt either on the basis of a regional subdivision or on the basis of its entire territory, unless otherwise specified in its Schedule, are defined as: (a) limitations on the number of service suppliers whether in the form of numerical quotas, monopolies, exclusive service suppliers or the requirements of an economic needs test; (b) limitations on the total value of service transactions or assets in the form of numerical quotas or the requirement of an economic needs test; (c) limitations on the total number of service operations or on the total quantity of service output expressed in terms of designated numerical units in the form of quotas or the requirement of an economic needs test; (8) (d) limitations on the total number of natural persons that may be employed in a particular service sector or that a service supplier may employ and who are necessary for, and directly related to, the supply of a specific service in the form of numerical quotas or the requirement of an economic needs test; (e) measures which restrict or require specific types of legal entity or joint venture through which a service supplier may supply a service; or (f) limitations on the participation of foreign capital in terms of maximum percentage limit on foreign shareholding or the total value of individual or aggregate foreign investment.

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Availability of Verizon Telecommunications Services 3.1 Verizon will provide a Verizon Telecommunications Service to Reconex for resale pursuant to this Attachment where and to the same extent, but only where and to the same extent, that such Verizon Telecommunications Service is provided to Verizon’s Customers.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.