Information Security and ICT Acceptable Use Policy

Information Security and ICT Acceptable Use Policy

“The Talentum Learning Trust” comprises of Churnet View Middle School, Leek High School, and Westwood College. This Acceptable Use Policy, and Rules for ICT Systems Use applies to ALL establishments within the Talentum Learning Trust.

The Talentum Learning Trust computer systems provide Internet access to students for learning. This E-mail and Internet Use Good Practice statement will help protect students and The Talentum Learning Trust by clearly stating what is acceptable and what is not.

  • The Talentum Learning Trust computer and Internet use must be appropriate for your education or professional use.
  • Access must only be made via your authorised user account and password, which must NOT be given to any other person.
  • Users must make and keep multiple backups of their important data, using USB flash drive(s), portable hard disk, cloud Storage, or CD/DVD. Users should also make use of the Skydrive/OneDrive storage, supplied as part of the Talentum Learning Trust, Office 365 tenancy.
  • The Talentum Learning Trust cannot be held responsible
    for the loss or corruption of ANY data.
  • Copyright and intellectual property rights must be respected.
  • Users must respect the work of others which might be stored in shared/common areas on the system. Conversely, users should always try and store their files and data in their own secure area or on removable media. Files and data stored on the shared/common areas of the system must be transferred before the end of the Academic Year at which point they will be treated as temporary files and deleted.
  • Users are responsible for the e-mail they send and for contacts made. E-mail should be written carefully and politely. As messages may be forwarded, e-mail is best regarded as public property. Anonymous messages, chain letters, hate inciting emails must not be sent.
  • Users should report any unpleasant material or messages received. The report will be confidential and will help protect others.
  • The use of public chat rooms is not allowed.
  • The Talentum Learning Trust ICT systems may not be used for private business purposes, unless explicit written permission has been given by the Executive Principal. Use for personal financial gain, gambling, political purposes or advertising is also forbidden.
  • The security of any ICT system(s) must not be compromised, whoever they belong to.
  • Irresponsible use may result in the loss of Internet access, or Permanent/Temporary Exclusion from the College, or Criminal Conviction.
  • This Agreement also applies to any member of staff, or student using ICT systems whilst on Work Placement, Work Experience, or Secondment outside the Talentum Learning Trust.
The Talentum Learning Trust will exercise its right by electronic means to monitor the use of the Talentum Learning Trust’s computer systems, including but not restricted to; remote monitoring of Talentum Learning Trust provided devices, the monitoring of web-sites, the interception of E-mails and the deletion of inappropriate materials in circumstances where it believes unauthorised use of the Talentum Learning Trust computer system(s) is or may be taking place, or the system is or may be being used for criminal purposes or for storing text or imagery which is unauthorised or unlawful.

1. You must not use, or try to use, the Talentum Learning Trust’s e-mail and internet facilities to create, distribute or display in any form any material that is or may be considered to be illegal, offensive or unacceptable under our rules and policies. It is impossible to give a complete list of what is considered offensive or unacceptable, but the following are included (and in some cases may also be illegal).

Anything that:
· is pornographic or obscene, or includes any form of sexually explicit humour;
· is intimidating, discriminatory (for example, racist, sexist or homophobic)
· is defamatory, encourages violence or strong feelings;
· is hateful;
· is fraudulent;
· shows or encourages violence or criminal acts;
· may give the Talentum Learning Trust a bad name; or
· is a deliberate harmful attack on any systems the Talentum Learning Trust use, own or manage.
2. Attempts to access unacceptable internet content will be treated the same whether the attempt was successful or not. Terms entered into search engines such as “Google” are recorded and they will be considered as seriously as the content that would result from the search even if the content is blocked.

3. You must not use the e-mail or internet facilities for time-wasting activities, such as chain letters, or for sending private e-mails to everyone on the global address list.

4. When using Talentum Learning Trust e-mail facilities for private purposes to reduce the likelihood of Talentum Learning Trust being targeted by spam, phishing or potential malicious activities. You must not use your Talentum Learning Trust email address when buying personal goods online.

5. You must not use or try to use Talentum Learning Trust systems to access, without permission, any e-mail that is intended for another member of staff or an e-mail account of another member of staff.

6. Ensure you know who is in charge of the ICT system you use, i.e. the System Manager.

7. You must be aware that any infringement of the current legislation relating to the use of ICT systems :-

Data Protection Acts 1984 & 1998 or any subsequent revision
Computer Misuse Act 1990 or any subsequent revision
Copyright, Designs and Patents Act 1988 or any subsequent revision
The Telecommunications Act 1984 or any subsequent revision
Any additional legislation implemented by the UK Government

Breaches of this legislation may result in disciplinary, civil and/or criminal action.

8. You must follow any local rules determined by the Executive Principal in relation to the use of private equipment and software.
All software must be used strictly in accordance the terms of its licence and may only be used if approved by the Systems Manager.

9. You must ensure that wherever possible your display screen cannot be viewed by persons not authorised to see the information. This includes if you are accessing systems from outside of any Federation establishment including at home.
Do not leave your computer logged on, i.e. where data can be directly accessed without password control, when not in attendance.

10. You must not leave any computer unattended if you are accessing The Talentum Learning Trust systems on it unless the screen is locked i.e. it requires a password to gain access. This includes if you are accessing systems from outside any Talentum Learning Trust establishment including at home.

11. You must not exceed any access rights to systems or limitations on the use of data imposed on you by the System Manager. The ability to access information or systems is not the same as having authorisation to do so.

12. The System Manager will advise you on the frequency of your password changes. In some cases these will be enforced by the system in use.
You should not re-use the same password and make sure it is a minimum of 6 alpha/numeric characters, ideally a mix of upper and lower case text based on a “made up” word, but not obvious or guessable, e.g. surname; date of birth, establishment name.

13. You must not share your user name and password with ANYONE (this includes but not restricted to family members and friends) unless specifically authorised to do so by the System Manager, e.g. in cases of shared access

14. Do not write your password down. You will be directly accountable for any network activity including internet and email use by your account.

15. The System Manager will advise you on what “backups” you need to make of the data and programs you use and the regularity and security of those backups.

16. You must ensure that newly received USB memory sticks, CD ROMs and emails have been checked for computer viruses.
Any suspected or actual computer virus infection must be reported immediately to the System Manager.

17. You must be vigilant for any suspicious ICT activity. You must immediately report any suspected or actual breach of ICT security to the System Manager or, in exceptional cases, the Executive Principal.

18. You must be aware that the data you create with Talentum Learning Trust equipment and systems remains the property of The Talentum Learning Trust. All data must be handled in accordance with any Protective Marking Scheme that may be in place.

19. You must keep all business-related data on the Talentum Learning Trust network(s) and not on the hard drive of your PC where practicably possible. Data that is stored on The Talentum Learning Trust network(s) will be backed up on a regular basis.

20. You must lock sensitive data (hard copy and disks) away when not in use to comply with the Data Protection Act.

21. You must ensure that sensitive data, both paper-based and electronic is disposed of properly – shred hardcopies and destroy disks to comply with the Data Protection Act.

22. You must not store personal data (non-Talentum Learning Trust work) files including but not limited to personal MP3 files, personal photographs, personal music files and personal documents on the Talentum Learning Trust network(s), or Talentum Learning Trust provided device (Laptop, Notebook, Tablet, iPad, Phone, Desktop), or storage media including the personal home folder/drives. The Talentum Learning Trust will not be held responsible for the deletion of any personal data.

23. You must make yourself aware of the contents of all other ICT related policies such as the Talentum Learning Trust’s e-Safety, Data Protection, and Social Networking policies.

24. You must not copy files that are accessible centrally on the Talentum Learning Trust network(s) onto your personal home folder/drive on the network unless for amendment after which they must be deleted from the home drive. Wherever possible, work must be kept on shared network folder/drives and not on your home folder/drive.

25. You must ensure that any data you take off site be it on a notebook, Laptop, Tablet, iPad, USB storage device or any other media is encrypted.

26. The Talentum Learning Trust will exercise its right by electronic means to monitor the use of the Talentum Learning Trust’s computer systems, including but not restricted to; remote monitoring of Talentum Learning Trust provided devices, the monitoring of web-sites, the interception of E-mails and the deletion of inappropriate materials in circumstances where it believes unauthorised use of the Talentum Learning Trust’s computer system is or may be taking place, or the system is or may be being used for criminal purposes or for storing text or imagery which is unauthorised or unlawful.

Comments are closed.