SlideShare a Scribd company logo
Kingdom of Saudi Arabia
King Faisal University
Faculty of Business Administration
MIS department
Guidelines for Acceptable Use of Technology Resources
Students: Nabatah Salem ALKulaib
216011944
Fatimah.ahmad.al.ali
216014482
Instructor: Dr. Abdelnasser Abdelaal
The Evergreen public schools (EPS) seek to apply rules designed to help of educate students about appropriate
behavior in interacting with other individuals on social networking sites or any other online means to ensure their
safety.
1.0 Public Records
1.1A public record is subject to detect at the request of anyone and may include records of online communication
activities.
2.0 User Responsibilities
2.1Lack of commitment with the rules about the use of electronic resources may restrict or prevent access to data over
the Internet.
2.2The use of electronic resources should be appropriate to evergreen public schools’ objectives.
2.3 Employees must maintain of the confidential students' data.
2.4You should not share your password with anyone and change it immediately if you suspect it might be stolen.
2.5 You should not share your device with anyone, and if this happens, sign out of your personal account first.
3.0 Digital Citizenship
It educates all students about the optimal use of technology and enables them to make good and appropriate
decisions.
conditions of Good Digital Citizenship:
3.1 Respect yourself by Knowing what you can and can’t publish.
3.2 Protect yourself and feel free to report any attacks or inappropriate behavior, and make sure that the published
information will not put you at risk.
3.4 Respect others by avoiding harassing them and do not infringe on their private space when using electronic
means.
3.5 Protect others by reporting abuse and not engaging in unacceptable conversations.
3.6 Respect and protect Intellectual Property by requesting permission when using sources and Cite it.
4.0Acceptable Use
4.1 Participation in social media must be consistent with the educational mission.
4.2 Follow all copyrights of students' work with taking the parental permission.
4.3When any personal device is connected to the main network; it must comply all guidelines.
4.4The use of electronic accounts is only by the authorized owner.
5.0Unacceptable Use
is unauthorized publishing of personal information to students or employees or others
5.1The use of bad or racist words towards others and infringement of their rights.
5.2 Destruction or misuse of hardware and software.
5.3Use electronic resources to access inappropriate content or download files that pose a threat to network safety.
5.4Infringing and harming others' devices or using someone else's electronic account illegally.
5.5 Intervention and change the system without permission.
6.0Staff Responsibilities
6.1Employees monitor the use of electronic devices and resources, as well as to ensure that they comply with the
school's laws and objectives.
6.2 Staff should monitor, help and effective instructions when needed.
6.3 An employee can use his / her personal device for personal purposes outside of office hours.
7.0 District-Sponsored Social Media (Teacher-Student Electronic Communication):
7.1 The purpose of social networking sites is to promote the mission and objectives of the region, in addition to
supporting the educational mission.
7.2The content must be respectful and appropriate
otherwise it will be removed, for example:
•Comments that are not relevant to the subject under discussion.
•Sexual content, commercials, illegal activity or vulgar language.
•Content that is causing dangerous to public security system.
7.3 Employees should monitor comments continually and take appropriate action in case of violation.
7.4 Communication between students and teachers should be within the boundaries of the school or related matters.
Otherwise, parents should be informed.
8.0 Evergreen Public Schools Responsibilities
To promote safe online behavior for students and staff, the schools will use several measures, including:
•Monitor network activity
•Determine who will have access to electronic resources.
•Restrict or prevent those who do not comply with the laws of use.
•Notify the competent authorities when violations of laws.
•Provide guidelines and training for students and staff.
9.0 Legal Notices:
The District may, without prior notice or consent, post , dispense, monitor , tick, opinion or record the use of
District systems and network at any time.
All documents generated, acquired, transmitted, or maintained through district assets or networks are
issue to the disclosure laws of the State of Washington's Public Records Act, chapter forty- two. Fifty-
six RCW. nine.6 Backup is made of e mail for the purpose of public disclosure requests and disaster recovery.
Typically the Evergreen Public Schools tends to make no warranties with regard to: The information of any advice
obtained by a user or any fees or charges incurred as an effect of seeking or receiving any information.
10.0 Personal Device Warning:
Users of district networks with personal devices understand that documents or records prepared, owned, used, or
retained by any local or public Agency-including the electronic communications of a public agency
are public records under Washington state law.
11.0 Violations of Acceptable Use:
Infractions of this policy easily constitute reasonable cause with regard to the limitation or overturning of
access privileges Delay of entry to Evergreen General public Schools electronic resources.
12.0 Challenging the Denial or Restriction of Access to District Electronic Resources:
When a person is denied entry or subject to constrained use the District's digital resources resulting
from a new determination how the person provides violated the District's appropriate use standards, the
refusal or restriction may become appealed.
13.0 District-Provided Mobile Devices:
A mobile device can be defined as, but is not limited to, all devices and accompanying media that fit the following
device classifications: Laptop/notebook/tablet computers Ultramobile PCs Mobile/cellular phones Smartphones PD
As Any mobile device capable of storing corporate data and connecting to an unmanaged network.
13.1 Security:
In the case a mobile device is definitely stolen or lost: Review the loss of device immediately for your
primary, supervisor and/or the region IT department in purchase that it can end up being disabled to
protect region information and initiate monitoring of the device.
13.2 Receiving Your Mobile Device and Check-In: (fees for missing or damaged Mobile Devices.)
Fees for missing or damaged Mobile Devices If a student or a teacher fails to return the mobile device at t
he end of the school year or upon termination of enrollment with EPS or transfers within EPS, they are su
bject to financial liability until the device and its accessories are returned or associated fees are received.
13.3 Taking Care of Your Mobile Device:
:Mobile device Left at Home1/
Mobile device Left at Home If a student does not bring their device to school or class, they
are responsible for getting the course work completed as if they had their device present.
2/Charging Your Device / Battery
Charging Your Device / Battery When students are allowed to take their Mobile device
home the Mobile device must be brought to school each day fully charged.
13.4 Software on Mobile Device:
Inspection Students may be selected at random to provide their device for inspection.
Procedure for re-imaging a device If technical difficulties occur, illegal, or non-EPS
installed software are discovered, the device will be restored from backup.
The Evergreen Public Schools will try to guarantee the system is solid and
secure. Be that as it may, there is no assurance the system will be ready for
action of the time. In the uncommon case that the system is down, the District
won't be in charge of lost or missing information.
:14.0 Connectivity

More Related Content

What's hot

Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
Angie Simmons
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy projectRachel Nachman
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010Barb Jansen
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
JISC RSC Eastern
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyKoolteechatechnology
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
bwcelearning
 
Staff training session
Staff training sessionStaff training session
Staff training sessionmander5208
 
Laptop Training Revised
Laptop Training RevisedLaptop Training Revised
Laptop Training Revised
Ramona Burkhart
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
Kristi DeRoche
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Online Copyright Education
Online Copyright EducationOnline Copyright Education
Online Copyright Education
Gary Wilhelm
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
Tech coderevised8 17-5
Tech coderevised8 17-5Tech coderevised8 17-5
Tech coderevised8 17-5juliamaguire29
 

What's hot (18)

Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy project
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Laptop Training Revised
Laptop Training RevisedLaptop Training Revised
Laptop Training Revised
 
AUP Student Edition 2011
AUP Student Edition 2011AUP Student Edition 2011
AUP Student Edition 2011
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
TUA Overview
TUA OverviewTUA Overview
TUA Overview
 
Social media policy
Social media policySocial media policy
Social media policy
 
Online Copyright Education
Online Copyright EducationOnline Copyright Education
Online Copyright Education
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Tech coderevised8 17-5
Tech coderevised8 17-5Tech coderevised8 17-5
Tech coderevised8 17-5
 
Technology acceptable use policy gr 7 day 1
Technology acceptable use policy   gr 7 day 1Technology acceptable use policy   gr 7 day 1
Technology acceptable use policy gr 7 day 1
 

Similar to Security

E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy donekgrosvenor
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditTamir Harper
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
Paula Naugle
 
Fcpsbyodaup
FcpsbyodaupFcpsbyodaup
Fcpsbyodaupmclardy
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
Sarah Sutter
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2guest594ea
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813jennifer_lawrence
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreementPaula Naugle
 
Case study 2 policy tech class-1
Case study 2 policy  tech class-1Case study 2 policy  tech class-1
Case study 2 policy tech class-1
DMHS
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
Diana Benner
 
Saint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own TechnologySaint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own Technologytcitrano
 
D33 AUP
D33 AUPD33 AUP
D33 AUP
Dave Venchus
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
C qlocal HCISD AUP
C qlocal HCISD AUPC qlocal HCISD AUP
C qlocal HCISD AUPsecretsvicky
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
shakti755479
 

Similar to Security (20)

E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
Aup
AupAup
Aup
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
Fcpsbyodaup
FcpsbyodaupFcpsbyodaup
Fcpsbyodaup
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 
Case study 2 policy tech class-1
Case study 2 policy  tech class-1Case study 2 policy  tech class-1
Case study 2 policy tech class-1
 
CES BYOT Agreement
CES BYOT AgreementCES BYOT Agreement
CES BYOT Agreement
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Saint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own TechnologySaint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own Technology
 
D33 AUP
D33 AUPD33 AUP
D33 AUP
 
AUP
AUPAUP
AUP
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
C qlocal HCISD AUP
C qlocal HCISD AUPC qlocal HCISD AUP
C qlocal HCISD AUP
 
AUP
AUPAUP
AUP
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
AUP
AUPAUP
AUP
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Security

  • 1. Kingdom of Saudi Arabia King Faisal University Faculty of Business Administration MIS department Guidelines for Acceptable Use of Technology Resources Students: Nabatah Salem ALKulaib 216011944 Fatimah.ahmad.al.ali 216014482 Instructor: Dr. Abdelnasser Abdelaal
  • 2. The Evergreen public schools (EPS) seek to apply rules designed to help of educate students about appropriate behavior in interacting with other individuals on social networking sites or any other online means to ensure their safety. 1.0 Public Records 1.1A public record is subject to detect at the request of anyone and may include records of online communication activities. 2.0 User Responsibilities 2.1Lack of commitment with the rules about the use of electronic resources may restrict or prevent access to data over the Internet. 2.2The use of electronic resources should be appropriate to evergreen public schools’ objectives. 2.3 Employees must maintain of the confidential students' data. 2.4You should not share your password with anyone and change it immediately if you suspect it might be stolen. 2.5 You should not share your device with anyone, and if this happens, sign out of your personal account first. 3.0 Digital Citizenship It educates all students about the optimal use of technology and enables them to make good and appropriate decisions. conditions of Good Digital Citizenship: 3.1 Respect yourself by Knowing what you can and can’t publish. 3.2 Protect yourself and feel free to report any attacks or inappropriate behavior, and make sure that the published information will not put you at risk. 3.4 Respect others by avoiding harassing them and do not infringe on their private space when using electronic means. 3.5 Protect others by reporting abuse and not engaging in unacceptable conversations. 3.6 Respect and protect Intellectual Property by requesting permission when using sources and Cite it.
  • 3. 4.0Acceptable Use 4.1 Participation in social media must be consistent with the educational mission. 4.2 Follow all copyrights of students' work with taking the parental permission. 4.3When any personal device is connected to the main network; it must comply all guidelines. 4.4The use of electronic accounts is only by the authorized owner. 5.0Unacceptable Use is unauthorized publishing of personal information to students or employees or others 5.1The use of bad or racist words towards others and infringement of their rights. 5.2 Destruction or misuse of hardware and software. 5.3Use electronic resources to access inappropriate content or download files that pose a threat to network safety. 5.4Infringing and harming others' devices or using someone else's electronic account illegally. 5.5 Intervention and change the system without permission. 6.0Staff Responsibilities 6.1Employees monitor the use of electronic devices and resources, as well as to ensure that they comply with the school's laws and objectives. 6.2 Staff should monitor, help and effective instructions when needed. 6.3 An employee can use his / her personal device for personal purposes outside of office hours. 7.0 District-Sponsored Social Media (Teacher-Student Electronic Communication): 7.1 The purpose of social networking sites is to promote the mission and objectives of the region, in addition to supporting the educational mission. 7.2The content must be respectful and appropriate otherwise it will be removed, for example:
  • 4. •Comments that are not relevant to the subject under discussion. •Sexual content, commercials, illegal activity or vulgar language. •Content that is causing dangerous to public security system. 7.3 Employees should monitor comments continually and take appropriate action in case of violation. 7.4 Communication between students and teachers should be within the boundaries of the school or related matters. Otherwise, parents should be informed. 8.0 Evergreen Public Schools Responsibilities To promote safe online behavior for students and staff, the schools will use several measures, including: •Monitor network activity •Determine who will have access to electronic resources. •Restrict or prevent those who do not comply with the laws of use. •Notify the competent authorities when violations of laws. •Provide guidelines and training for students and staff. 9.0 Legal Notices: The District may, without prior notice or consent, post , dispense, monitor , tick, opinion or record the use of District systems and network at any time. All documents generated, acquired, transmitted, or maintained through district assets or networks are issue to the disclosure laws of the State of Washington's Public Records Act, chapter forty- two. Fifty- six RCW. nine.6 Backup is made of e mail for the purpose of public disclosure requests and disaster recovery. Typically the Evergreen Public Schools tends to make no warranties with regard to: The information of any advice obtained by a user or any fees or charges incurred as an effect of seeking or receiving any information.
  • 5. 10.0 Personal Device Warning: Users of district networks with personal devices understand that documents or records prepared, owned, used, or retained by any local or public Agency-including the electronic communications of a public agency are public records under Washington state law. 11.0 Violations of Acceptable Use: Infractions of this policy easily constitute reasonable cause with regard to the limitation or overturning of access privileges Delay of entry to Evergreen General public Schools electronic resources. 12.0 Challenging the Denial or Restriction of Access to District Electronic Resources: When a person is denied entry or subject to constrained use the District's digital resources resulting from a new determination how the person provides violated the District's appropriate use standards, the refusal or restriction may become appealed. 13.0 District-Provided Mobile Devices: A mobile device can be defined as, but is not limited to, all devices and accompanying media that fit the following device classifications: Laptop/notebook/tablet computers Ultramobile PCs Mobile/cellular phones Smartphones PD As Any mobile device capable of storing corporate data and connecting to an unmanaged network. 13.1 Security: In the case a mobile device is definitely stolen or lost: Review the loss of device immediately for your primary, supervisor and/or the region IT department in purchase that it can end up being disabled to protect region information and initiate monitoring of the device.
  • 6. 13.2 Receiving Your Mobile Device and Check-In: (fees for missing or damaged Mobile Devices.) Fees for missing or damaged Mobile Devices If a student or a teacher fails to return the mobile device at t he end of the school year or upon termination of enrollment with EPS or transfers within EPS, they are su bject to financial liability until the device and its accessories are returned or associated fees are received. 13.3 Taking Care of Your Mobile Device: :Mobile device Left at Home1/ Mobile device Left at Home If a student does not bring their device to school or class, they are responsible for getting the course work completed as if they had their device present. 2/Charging Your Device / Battery Charging Your Device / Battery When students are allowed to take their Mobile device home the Mobile device must be brought to school each day fully charged. 13.4 Software on Mobile Device: Inspection Students may be selected at random to provide their device for inspection. Procedure for re-imaging a device If technical difficulties occur, illegal, or non-EPS installed software are discovered, the device will be restored from backup. The Evergreen Public Schools will try to guarantee the system is solid and secure. Be that as it may, there is no assurance the system will be ready for action of the time. In the uncommon case that the system is down, the District won't be in charge of lost or missing information. :14.0 Connectivity