our Duty about Information System Security is Summarize a scientific article ( Guidelines for Acceptable Use of Technology Resources)
The Insurance:Dr.abdelnasser Abdelaal
Under the Higher Education Opportunity Act (HEOA), universities are required by July 1, 2010 to compile a written plan on how they will educate students on the dangers of file sharing and which procedures are in place to effectively combat illegal file sharing.
In preparation for the HEOA implementation and to more effectively educate the UNC community about the issues of copyright law and file sharing, the Information Security Office designed an online course combined with a follow-up survey. Come learn about UNC’s new online copyright education course.
Under the Higher Education Opportunity Act (HEOA), universities are required by July 1, 2010 to compile a written plan on how they will educate students on the dangers of file sharing and which procedures are in place to effectively combat illegal file sharing.
In preparation for the HEOA implementation and to more effectively educate the UNC community about the issues of copyright law and file sharing, the Information Security Office designed an online course combined with a follow-up survey. Come learn about UNC’s new online copyright education course.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
1. Kingdom of Saudi Arabia
King Faisal University
Faculty of Business Administration
MIS department
Guidelines for Acceptable Use of Technology Resources
Students: Nabatah Salem ALKulaib
216011944
Fatimah.ahmad.al.ali
216014482
Instructor: Dr. Abdelnasser Abdelaal
2. The Evergreen public schools (EPS) seek to apply rules designed to help of educate students about appropriate
behavior in interacting with other individuals on social networking sites or any other online means to ensure their
safety.
1.0 Public Records
1.1A public record is subject to detect at the request of anyone and may include records of online communication
activities.
2.0 User Responsibilities
2.1Lack of commitment with the rules about the use of electronic resources may restrict or prevent access to data over
the Internet.
2.2The use of electronic resources should be appropriate to evergreen public schools’ objectives.
2.3 Employees must maintain of the confidential students' data.
2.4You should not share your password with anyone and change it immediately if you suspect it might be stolen.
2.5 You should not share your device with anyone, and if this happens, sign out of your personal account first.
3.0 Digital Citizenship
It educates all students about the optimal use of technology and enables them to make good and appropriate
decisions.
conditions of Good Digital Citizenship:
3.1 Respect yourself by Knowing what you can and can’t publish.
3.2 Protect yourself and feel free to report any attacks or inappropriate behavior, and make sure that the published
information will not put you at risk.
3.4 Respect others by avoiding harassing them and do not infringe on their private space when using electronic
means.
3.5 Protect others by reporting abuse and not engaging in unacceptable conversations.
3.6 Respect and protect Intellectual Property by requesting permission when using sources and Cite it.
3. 4.0Acceptable Use
4.1 Participation in social media must be consistent with the educational mission.
4.2 Follow all copyrights of students' work with taking the parental permission.
4.3When any personal device is connected to the main network; it must comply all guidelines.
4.4The use of electronic accounts is only by the authorized owner.
5.0Unacceptable Use
is unauthorized publishing of personal information to students or employees or others
5.1The use of bad or racist words towards others and infringement of their rights.
5.2 Destruction or misuse of hardware and software.
5.3Use electronic resources to access inappropriate content or download files that pose a threat to network safety.
5.4Infringing and harming others' devices or using someone else's electronic account illegally.
5.5 Intervention and change the system without permission.
6.0Staff Responsibilities
6.1Employees monitor the use of electronic devices and resources, as well as to ensure that they comply with the
school's laws and objectives.
6.2 Staff should monitor, help and effective instructions when needed.
6.3 An employee can use his / her personal device for personal purposes outside of office hours.
7.0 District-Sponsored Social Media (Teacher-Student Electronic Communication):
7.1 The purpose of social networking sites is to promote the mission and objectives of the region, in addition to
supporting the educational mission.
7.2The content must be respectful and appropriate
otherwise it will be removed, for example:
4. •Comments that are not relevant to the subject under discussion.
•Sexual content, commercials, illegal activity or vulgar language.
•Content that is causing dangerous to public security system.
7.3 Employees should monitor comments continually and take appropriate action in case of violation.
7.4 Communication between students and teachers should be within the boundaries of the school or related matters.
Otherwise, parents should be informed.
8.0 Evergreen Public Schools Responsibilities
To promote safe online behavior for students and staff, the schools will use several measures, including:
•Monitor network activity
•Determine who will have access to electronic resources.
•Restrict or prevent those who do not comply with the laws of use.
•Notify the competent authorities when violations of laws.
•Provide guidelines and training for students and staff.
9.0 Legal Notices:
The District may, without prior notice or consent, post , dispense, monitor , tick, opinion or record the use of
District systems and network at any time.
All documents generated, acquired, transmitted, or maintained through district assets or networks are
issue to the disclosure laws of the State of Washington's Public Records Act, chapter forty- two. Fifty-
six RCW. nine.6 Backup is made of e mail for the purpose of public disclosure requests and disaster recovery.
Typically the Evergreen Public Schools tends to make no warranties with regard to: The information of any advice
obtained by a user or any fees or charges incurred as an effect of seeking or receiving any information.
5. 10.0 Personal Device Warning:
Users of district networks with personal devices understand that documents or records prepared, owned, used, or
retained by any local or public Agency-including the electronic communications of a public agency
are public records under Washington state law.
11.0 Violations of Acceptable Use:
Infractions of this policy easily constitute reasonable cause with regard to the limitation or overturning of
access privileges Delay of entry to Evergreen General public Schools electronic resources.
12.0 Challenging the Denial or Restriction of Access to District Electronic Resources:
When a person is denied entry or subject to constrained use the District's digital resources resulting
from a new determination how the person provides violated the District's appropriate use standards, the
refusal or restriction may become appealed.
13.0 District-Provided Mobile Devices:
A mobile device can be defined as, but is not limited to, all devices and accompanying media that fit the following
device classifications: Laptop/notebook/tablet computers Ultramobile PCs Mobile/cellular phones Smartphones PD
As Any mobile device capable of storing corporate data and connecting to an unmanaged network.
13.1 Security:
In the case a mobile device is definitely stolen or lost: Review the loss of device immediately for your
primary, supervisor and/or the region IT department in purchase that it can end up being disabled to
protect region information and initiate monitoring of the device.
6. 13.2 Receiving Your Mobile Device and Check-In: (fees for missing or damaged Mobile Devices.)
Fees for missing or damaged Mobile Devices If a student or a teacher fails to return the mobile device at t
he end of the school year or upon termination of enrollment with EPS or transfers within EPS, they are su
bject to financial liability until the device and its accessories are returned or associated fees are received.
13.3 Taking Care of Your Mobile Device:
:Mobile device Left at Home1/
Mobile device Left at Home If a student does not bring their device to school or class, they
are responsible for getting the course work completed as if they had their device present.
2/Charging Your Device / Battery
Charging Your Device / Battery When students are allowed to take their Mobile device
home the Mobile device must be brought to school each day fully charged.
13.4 Software on Mobile Device:
Inspection Students may be selected at random to provide their device for inspection.
Procedure for re-imaging a device If technical difficulties occur, illegal, or non-EPS
installed software are discovered, the device will be restored from backup.
The Evergreen Public Schools will try to guarantee the system is solid and
secure. Be that as it may, there is no assurance the system will be ready for
action of the time. In the uncommon case that the system is down, the District
won't be in charge of lost or missing information.
:14.0 Connectivity