SlideShare a Scribd company logo
LEWIS APPLETON Unit 4 P5
Staff Newsletter
The Howard School
2012
LEGISLATION QUESTIONS
The data protection act was introduced so
that customers and anyone else with
information kept on them have protection in
regards to their personal information and the
way businesses use it so that they do not feel
vulnerable to other people knowing about
them.
The act states that any organization that
holds information on someone cannot use
the personal information held on the person
against their will or inan unfair and
unnecessary way.
We as a school keepinformation on our
students on a database and therefore we are
impacted on by this act.
This means that it is important us when
reviewinginformation kept on the students
to make sure that we do not distribute the
data. There are eight rules in this act and
they are;
The information has to be obtained lawfully
and fairly meaning the information has to be
obtained from the person and it has to be
obtained withthe person’s agreement.
The information may only be used for
specific purposes and the purposes can only
be those that were stated during the
collection of the information.
The information has to be adequate and
relevant to its purpose and it cannot be too
much information on the student in relation
to what the school needs to use it for.
The information has to be accurate and also
kept up to date where it is necessary to
ensure that the information on the student is
correct.
The information is only to be kept inthe
database while it is needed and must be
disposed of after it is no longer required.
The information must only be processed with
permission from the student’s guardian and
must be in coordination withtheir rights.
The information has to be protected from
unlawful processing, accidental loss of the
information and also any changes or damage
to the data.
Has it been broken?
ThisAct hasbeen broken beforeby NewsCorp in the
phonehacking scandal, it isimportant that staffdo not
hackor distributethedatabaseinformation including
student computer accounts.
What this means
If any staff memberswereto breakthisAct then they
could becomefired and even faceseriouscriminal
chargesdepending on howserioustheissueis. Ifthe
issueissmall you will bewarned first.
Data Protection Act 1998
LEWIS APPLETON | Unit 4 P5 2
The purpose of this act is to prevent access
that is unauthorized into the HowardSchool
computer systems whichcan also include the
internet in form of website domains.
The act is used to combat crimes but is also
applicable inthe school environment; it is not
acceptable to hack into any school
computers or the website.
There has been evidence to suggest a
member of staff hacking into a student’s
account which is against this Act. There are
three different definitions of this Act being
broken. These are on the right side of this
page.
Has it been broken?
This Act is currently being broken by a member
of staff at this school. That staff member is
currently unnamed and has a chance to not
continue withwhat they are doing before
further action is taken. This Act is being broken
because that member of staff has hacked a
student computer account without
authorization.
What this means
Staff members should only access what they
are given access to; they should not access the
accounts of other staff members or of
students.
Breaking the Act
1) A computer to access unauthorized
program or data held in a computer.
2) Unauthorized modification to contents of
any computer.
3) Impairment to operation of any computer.
The act means youcan be facing an
imprisonment sentence for up to 5 years for
breaking this act and you can be fined.
Staff do not have to do much to make sure
that they do not break this act, all that is
needed is to deter from accessing what is not
allowedto be accessed including other staff
accounts, computers, and student accounts
and to deter from modifying any database
information without authorization.
For example staff caneasily find information
that their account gives them access to but
they cannot use another staff member’s
account login to find out the information as
this breaks the act.
If you know someone or have suspicions of
any member of staff breaching this act then
please notify us immediately so that the
situation can be resolved.
What you can’t do
According to this act there are many things
that cannot be done; staff are not able to
access anything that they have not been
authorized to access. This includes things
such as student accounts; evenif the staff
member has suspicions of something such as
indecent content on the account they are not
to take matters into their own hands.
If a member of staff has these queries then
they should report to the IT staff as they have
the authorization to access and edit the
student accounts, this would stop you from
breaking the act and causing your job
position tobe threatened.
Finally you cannot access other staff member
accounts; this may be seen as a form of
fraud. Evenif they ask youto login to their
account for something such as marking the
register it is not acceptable and it breaks this
law. If you do this there may be
consequences.
Computer Misuse Act
LEWIS APPLETON | Unit 4 P5 3
EMAIL
Staff Login
Hereat theschool wehavean email system for useof
staff, theemail domain endsinthenameoftheschool
and isonly to beused for school businessand not asa
personal email address. Themail sent and received by
theseemail addresses ismonitored.
Email Uses
Theemail loginsprovided to you from theschoolare
only to beused for schoolbusinesssuch asupdating
guardiansof studentsand other teachersof anything
that will involvethem. Theemail system isnot tobe
used to send maliciousor disturbing emailsand ifthisis
donethen theperson willberesponsiblefor
consequences.
SECURITY
73%73% of secondary schoolsusesecurity camerasto
ensuremaximum safety.
63%63% of staff are required tohaveIDbadgesor asimilar
form of recognitionin schoolsto preventpeople
claiming they arestaff.
ALSO
In termsof security many thingsaremonitored
includingemail systems, schoolcomputerusers
and staff may bechecked on whilst teachingor
carrying out their duties.
A staff member was recently found to be
circulating pornographic material through
the school email as found from our
monitoring. This staff member has been
suspended and is currently at risk of being
removed from their position.
One of the reasons why the school email
system is not to be used for this is because it
is dangerous to students, whilst teaching a
class you may read your emails but if a
student witnesses something as serious as
pornographic content then it can have
serious consequences.
It is alsopossible that a student may manage
to hack the school email account and
therefore they are alsoat risk of seeing the
content.
If you feel the need to send such content
make sure that youdo it from your own
personal email and not whilst working.
As we are able to monitor, anything illegal
will alsobe noticed and therefore you could
be at risk of facing criminal charges as well as
losing your job.
The staff member that has been suspended
may return and this should be seen as a
warning to not use the school email system
for personal use as the emails sent and
receivedare regularly monitored.
The Howard School does not accept any
illegal or unfair activities. This is why the staff
member has been suspended; for the safety
of the students.
Use of the internet
Whilst working inthe school there is
restricted use tothe internet, this means that
certain material is not allowedto be accessed
during the school day. The computers used
at the school are regularly monitored as well
as the history of staff logins on the internet
to see which websites are visited.
Certain sites such as YouTube may be
accessed as they can be used for educational
purposes as long as only appropriate content
is displayed. YouTube may not be used to
show disturbing material or to listento
music.
Students have restrictions on what they can
access, whereas staff have no limitations and
therefore are responsible for what
they access.
If a staff member was to
access malicious or
pornographic material
they will be caught and
there would be a likely
chance of being fired
therefore it is highly
unadvisable.
The internet may not
be used for things that
are unrelated to the school
work, a member of staff has been found to
be running their own webdesign business
from the school internet system. This is not
allowed, although it is harmless it is using
school computers for personal uses and to
that member of staff we recommend they no
longer run the organization within our
organization.
Consequences
LEWIS APPLETON | Unit 4 P5 4
It isencouraged to makesurethat theschool
working environment is enjoyed by alland that
lawsand rulesarefollowed so theschoolcan
operatecorrectly. For thispurposewehaveseveral
policiesthat areto befollowed by school staff and
thereareconsequencesfor not following.
Oneof thepolicieswehaveisthat you cannot use
theschool email system for yourownpersonal use;
it isstrictly forschool businesssuch asinforming
other staff or student’sguardiansabout concerns
and isnot to beused for unrelated emails. To
ensurethisisfollowed weregularly monitorthe
email systems and if found to bebreaking this
policy therewillbeconsequences.
Another policy wehaveisto only spend thetimeat
workon work, the
internet cannot beused
for personal
entertainment or to run
another business, thisis
acceptablewithin your
own homebut not here.
To makesurethat people
follow thisweregularly
monitor theweb history
on staff computersand it
isstill visibleeven if
deleted. However it isperfectly acceptableto use
theinternet for educational purposessuch asusing
YouTubeto teach part of alesson.
Another policy that wehaveisthat staffareonly
ableto accesswhat isgiven to them, they arenot
allowed to useanother staffmember’saccount
and they cannot accessstudent accountsdespite
what they may suspect. If thestaff havequeries
about astudent’saccount it isadvisabletonotify
theIT staff rather than findout illegally. To make
surethat peoplefollow thiswemonitor when a
student isin and when they are accessing their
account, sameappliesto staff. If weseeastudent
account being accessed when they areabsent, we
will investigate.
Wehavean internet policy which limitswhat staff
and studentsareableto accessthrough theschool
internet system. Thepolicy statesall actionsneed
permission unlessapproved by theteacher, games
cannot beplayed, emailssent need permission,no
chat sitescan beused, not to modify other peoples
filesand that thecomputerswill bemonitored.
School Policies

More Related Content

What's hot

Assignment 1
Assignment 1Assignment 1
Assignment 1jarad27
 
5 Reasons to Use Social Media in the Classroom
5 Reasons to Use Social Media in the Classroom5 Reasons to Use Social Media in the Classroom
5 Reasons to Use Social Media in the Classroom
LiveTiles
 
Cellphones09 29
Cellphones09 29Cellphones09 29
Cellphones09 29elizkeren
 
Chilton mobile
Chilton mobileChilton mobile
Chilton mobileelizkeren
 
Cellphones09 11
Cellphones09 11Cellphones09 11
Cellphones09 11elizkeren
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
Paul Chamberlain
 
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyHello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Tifanija
 
Final Assignment
Final AssignmentFinal Assignment
Final Assignmenttxagman
 
Smartphones
SmartphonesSmartphones
Smartphonessmaq1
 
how internet helping us during lockdown
how internet helping us during lockdownhow internet helping us during lockdown
how internet helping us during lockdown
sourav mathur
 
Topic 5 Aup
Topic 5  AupTopic 5  Aup
Topic 5 AupBlair E
 
Rules, regulations and recommendations on social media in HE
Rules, regulations and recommendations on social media in HERules, regulations and recommendations on social media in HE
Rules, regulations and recommendations on social media in HE
Inger-Marie Christensen
 
Privacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalPrivacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation final
thsieh
 
Internet publication
Internet publicationInternet publication
Internet publication
linamccoach
 
Learning 2.0 workshop 2009
Learning 2.0 workshop 2009Learning 2.0 workshop 2009
Learning 2.0 workshop 2009Janet Martin
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethicallyLinda Long
 

What's hot (19)

Assignment 1
Assignment 1Assignment 1
Assignment 1
 
5 Reasons to Use Social Media in the Classroom
5 Reasons to Use Social Media in the Classroom5 Reasons to Use Social Media in the Classroom
5 Reasons to Use Social Media in the Classroom
 
Is
IsIs
Is
 
Cellphones09 29
Cellphones09 29Cellphones09 29
Cellphones09 29
 
Chilton mobile
Chilton mobileChilton mobile
Chilton mobile
 
Cellphones09 11
Cellphones09 11Cellphones09 11
Cellphones09 11
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
 
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyHello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad Kaminsky
 
Final Assignment
Final AssignmentFinal Assignment
Final Assignment
 
Smartphones
SmartphonesSmartphones
Smartphones
 
how internet helping us during lockdown
how internet helping us during lockdownhow internet helping us during lockdown
how internet helping us during lockdown
 
Topic 5 Aup
Topic 5  AupTopic 5  Aup
Topic 5 Aup
 
Rules, regulations and recommendations on social media in HE
Rules, regulations and recommendations on social media in HERules, regulations and recommendations on social media in HE
Rules, regulations and recommendations on social media in HE
 
Privacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalPrivacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation final
 
Internet publication
Internet publicationInternet publication
Internet publication
 
AUP Student Edition 2011
AUP Student Edition 2011AUP Student Edition 2011
AUP Student Edition 2011
 
Learning 2.0 workshop 2009
Learning 2.0 workshop 2009Learning 2.0 workshop 2009
Learning 2.0 workshop 2009
 
igbo tochukwu CV
igbo tochukwu CVigbo tochukwu CV
igbo tochukwu CV
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 

Similar to Staff newsletter

Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
Gary Chambers
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
susanschei
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
Sarah Sutter
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereKelly Savage
 
10 questions for LAFOIP in the classroom
10 questions for LAFOIP in the classroom10 questions for LAFOIP in the classroom
10 questions for LAFOIP in the classroom
kmuench
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docxM3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
smile790243
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward F. T. Charfauros
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
hassan777898
 
MONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKSMONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKS
SinuSaji1
 
Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008
JulieRen141
 
Social media
Social mediaSocial media
Social mediaSheila A
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workShankar Myadharaveni
 
Employees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal RightsEmployees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal RightsSaad Mazhar
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
The Pathway Group
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
Matthew Charles
 

Similar to Staff newsletter (20)

Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
 
10 questions for LAFOIP in the classroom
10 questions for LAFOIP in the classroom10 questions for LAFOIP in the classroom
10 questions for LAFOIP in the classroom
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docxM3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
 
MONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKSMONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKS
 
Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008
 
Social media
Social mediaSocial media
Social media
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_work
 
Aup david.sayago
Aup david.sayagoAup david.sayago
Aup david.sayago
 
Employees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal RightsEmployees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal Rights
 
Social media policy
Social media policySocial media policy
Social media policy
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 

More from Lewis Appleton

SWOT report - Sainsbury (2013)
SWOT report - Sainsbury (2013)SWOT report - Sainsbury (2013)
SWOT report - Sainsbury (2013)
Lewis Appleton
 
Accruals and the going concern concept
Accruals and the going concern conceptAccruals and the going concern concept
Accruals and the going concern concept
Lewis Appleton
 
Benefits of credit for the economy and SME's
Benefits of credit for the economy and SME'sBenefits of credit for the economy and SME's
Benefits of credit for the economy and SME's
Lewis Appleton
 
The problem of scarcity
The problem of scarcityThe problem of scarcity
The problem of scarcity
Lewis Appleton
 
Website launch plan
Website launch planWebsite launch plan
Website launch plan
Lewis Appleton
 
Website testing
Website testingWebsite testing
Website testing
Lewis Appleton
 
Website specification
Website specificationWebsite specification
Website specification
Lewis Appleton
 
Business website analysis
Business website analysisBusiness website analysis
Business website analysis
Lewis Appleton
 
Usability of websites
Usability of websitesUsability of websites
Usability of websites
Lewis Appleton
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
Lewis Appleton
 
Health and safety improvements
Health and safety improvementsHealth and safety improvements
Health and safety improvements
Lewis Appleton
 
Safety procedures
Safety proceduresSafety procedures
Safety procedures
Lewis Appleton
 
Health and safety responsibilities
Health and safety responsibilitiesHealth and safety responsibilities
Health and safety responsibilities
Lewis Appleton
 
Health and safety in the physical environment
Health and safety in the physical environmentHealth and safety in the physical environment
Health and safety in the physical environment
Lewis Appleton
 
Health and safety legislation
Health and safety legislationHealth and safety legislation
Health and safety legislation
Lewis Appleton
 
Team effectiveness (further)
Team effectiveness (further)Team effectiveness (further)
Team effectiveness (further)
Lewis Appleton
 
Team development
Team developmentTeam development
Team development
Lewis Appleton
 
Team roles
Team rolesTeam roles
Team roles
Lewis Appleton
 
Three circles approach
Three circles approachThree circles approach
Three circles approach
Lewis Appleton
 
Team effectiveness
Team effectivenessTeam effectiveness
Team effectiveness
Lewis Appleton
 

More from Lewis Appleton (20)

SWOT report - Sainsbury (2013)
SWOT report - Sainsbury (2013)SWOT report - Sainsbury (2013)
SWOT report - Sainsbury (2013)
 
Accruals and the going concern concept
Accruals and the going concern conceptAccruals and the going concern concept
Accruals and the going concern concept
 
Benefits of credit for the economy and SME's
Benefits of credit for the economy and SME'sBenefits of credit for the economy and SME's
Benefits of credit for the economy and SME's
 
The problem of scarcity
The problem of scarcityThe problem of scarcity
The problem of scarcity
 
Website launch plan
Website launch planWebsite launch plan
Website launch plan
 
Website testing
Website testingWebsite testing
Website testing
 
Website specification
Website specificationWebsite specification
Website specification
 
Business website analysis
Business website analysisBusiness website analysis
Business website analysis
 
Usability of websites
Usability of websitesUsability of websites
Usability of websites
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Health and safety improvements
Health and safety improvementsHealth and safety improvements
Health and safety improvements
 
Safety procedures
Safety proceduresSafety procedures
Safety procedures
 
Health and safety responsibilities
Health and safety responsibilitiesHealth and safety responsibilities
Health and safety responsibilities
 
Health and safety in the physical environment
Health and safety in the physical environmentHealth and safety in the physical environment
Health and safety in the physical environment
 
Health and safety legislation
Health and safety legislationHealth and safety legislation
Health and safety legislation
 
Team effectiveness (further)
Team effectiveness (further)Team effectiveness (further)
Team effectiveness (further)
 
Team development
Team developmentTeam development
Team development
 
Team roles
Team rolesTeam roles
Team roles
 
Three circles approach
Three circles approachThree circles approach
Three circles approach
 
Team effectiveness
Team effectivenessTeam effectiveness
Team effectiveness
 

Recently uploaded

Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 

Recently uploaded (20)

Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 

Staff newsletter

  • 1. LEWIS APPLETON Unit 4 P5 Staff Newsletter The Howard School 2012 LEGISLATION QUESTIONS The data protection act was introduced so that customers and anyone else with information kept on them have protection in regards to their personal information and the way businesses use it so that they do not feel vulnerable to other people knowing about them. The act states that any organization that holds information on someone cannot use the personal information held on the person against their will or inan unfair and unnecessary way. We as a school keepinformation on our students on a database and therefore we are impacted on by this act. This means that it is important us when reviewinginformation kept on the students to make sure that we do not distribute the data. There are eight rules in this act and they are; The information has to be obtained lawfully and fairly meaning the information has to be obtained from the person and it has to be obtained withthe person’s agreement. The information may only be used for specific purposes and the purposes can only be those that were stated during the collection of the information. The information has to be adequate and relevant to its purpose and it cannot be too much information on the student in relation to what the school needs to use it for. The information has to be accurate and also kept up to date where it is necessary to ensure that the information on the student is correct. The information is only to be kept inthe database while it is needed and must be disposed of after it is no longer required. The information must only be processed with permission from the student’s guardian and must be in coordination withtheir rights. The information has to be protected from unlawful processing, accidental loss of the information and also any changes or damage to the data. Has it been broken? ThisAct hasbeen broken beforeby NewsCorp in the phonehacking scandal, it isimportant that staffdo not hackor distributethedatabaseinformation including student computer accounts. What this means If any staff memberswereto breakthisAct then they could becomefired and even faceseriouscriminal chargesdepending on howserioustheissueis. Ifthe issueissmall you will bewarned first. Data Protection Act 1998
  • 2. LEWIS APPLETON | Unit 4 P5 2 The purpose of this act is to prevent access that is unauthorized into the HowardSchool computer systems whichcan also include the internet in form of website domains. The act is used to combat crimes but is also applicable inthe school environment; it is not acceptable to hack into any school computers or the website. There has been evidence to suggest a member of staff hacking into a student’s account which is against this Act. There are three different definitions of this Act being broken. These are on the right side of this page. Has it been broken? This Act is currently being broken by a member of staff at this school. That staff member is currently unnamed and has a chance to not continue withwhat they are doing before further action is taken. This Act is being broken because that member of staff has hacked a student computer account without authorization. What this means Staff members should only access what they are given access to; they should not access the accounts of other staff members or of students. Breaking the Act 1) A computer to access unauthorized program or data held in a computer. 2) Unauthorized modification to contents of any computer. 3) Impairment to operation of any computer. The act means youcan be facing an imprisonment sentence for up to 5 years for breaking this act and you can be fined. Staff do not have to do much to make sure that they do not break this act, all that is needed is to deter from accessing what is not allowedto be accessed including other staff accounts, computers, and student accounts and to deter from modifying any database information without authorization. For example staff caneasily find information that their account gives them access to but they cannot use another staff member’s account login to find out the information as this breaks the act. If you know someone or have suspicions of any member of staff breaching this act then please notify us immediately so that the situation can be resolved. What you can’t do According to this act there are many things that cannot be done; staff are not able to access anything that they have not been authorized to access. This includes things such as student accounts; evenif the staff member has suspicions of something such as indecent content on the account they are not to take matters into their own hands. If a member of staff has these queries then they should report to the IT staff as they have the authorization to access and edit the student accounts, this would stop you from breaking the act and causing your job position tobe threatened. Finally you cannot access other staff member accounts; this may be seen as a form of fraud. Evenif they ask youto login to their account for something such as marking the register it is not acceptable and it breaks this law. If you do this there may be consequences. Computer Misuse Act
  • 3. LEWIS APPLETON | Unit 4 P5 3 EMAIL Staff Login Hereat theschool wehavean email system for useof staff, theemail domain endsinthenameoftheschool and isonly to beused for school businessand not asa personal email address. Themail sent and received by theseemail addresses ismonitored. Email Uses Theemail loginsprovided to you from theschoolare only to beused for schoolbusinesssuch asupdating guardiansof studentsand other teachersof anything that will involvethem. Theemail system isnot tobe used to send maliciousor disturbing emailsand ifthisis donethen theperson willberesponsiblefor consequences. SECURITY 73%73% of secondary schoolsusesecurity camerasto ensuremaximum safety. 63%63% of staff are required tohaveIDbadgesor asimilar form of recognitionin schoolsto preventpeople claiming they arestaff. ALSO In termsof security many thingsaremonitored includingemail systems, schoolcomputerusers and staff may bechecked on whilst teachingor carrying out their duties. A staff member was recently found to be circulating pornographic material through the school email as found from our monitoring. This staff member has been suspended and is currently at risk of being removed from their position. One of the reasons why the school email system is not to be used for this is because it is dangerous to students, whilst teaching a class you may read your emails but if a student witnesses something as serious as pornographic content then it can have serious consequences. It is alsopossible that a student may manage to hack the school email account and therefore they are alsoat risk of seeing the content. If you feel the need to send such content make sure that youdo it from your own personal email and not whilst working. As we are able to monitor, anything illegal will alsobe noticed and therefore you could be at risk of facing criminal charges as well as losing your job. The staff member that has been suspended may return and this should be seen as a warning to not use the school email system for personal use as the emails sent and receivedare regularly monitored. The Howard School does not accept any illegal or unfair activities. This is why the staff member has been suspended; for the safety of the students. Use of the internet Whilst working inthe school there is restricted use tothe internet, this means that certain material is not allowedto be accessed during the school day. The computers used at the school are regularly monitored as well as the history of staff logins on the internet to see which websites are visited. Certain sites such as YouTube may be accessed as they can be used for educational purposes as long as only appropriate content is displayed. YouTube may not be used to show disturbing material or to listento music. Students have restrictions on what they can access, whereas staff have no limitations and therefore are responsible for what they access. If a staff member was to access malicious or pornographic material they will be caught and there would be a likely chance of being fired therefore it is highly unadvisable. The internet may not be used for things that are unrelated to the school work, a member of staff has been found to be running their own webdesign business from the school internet system. This is not allowed, although it is harmless it is using school computers for personal uses and to that member of staff we recommend they no longer run the organization within our organization. Consequences
  • 4. LEWIS APPLETON | Unit 4 P5 4 It isencouraged to makesurethat theschool working environment is enjoyed by alland that lawsand rulesarefollowed so theschoolcan operatecorrectly. For thispurposewehaveseveral policiesthat areto befollowed by school staff and thereareconsequencesfor not following. Oneof thepolicieswehaveisthat you cannot use theschool email system for yourownpersonal use; it isstrictly forschool businesssuch asinforming other staff or student’sguardiansabout concerns and isnot to beused for unrelated emails. To ensurethisisfollowed weregularly monitorthe email systems and if found to bebreaking this policy therewillbeconsequences. Another policy wehaveisto only spend thetimeat workon work, the internet cannot beused for personal entertainment or to run another business, thisis acceptablewithin your own homebut not here. To makesurethat people follow thisweregularly monitor theweb history on staff computersand it isstill visibleeven if deleted. However it isperfectly acceptableto use theinternet for educational purposessuch asusing YouTubeto teach part of alesson. Another policy that wehaveisthat staffareonly ableto accesswhat isgiven to them, they arenot allowed to useanother staffmember’saccount and they cannot accessstudent accountsdespite what they may suspect. If thestaff havequeries about astudent’saccount it isadvisabletonotify theIT staff rather than findout illegally. To make surethat peoplefollow thiswemonitor when a student isin and when they are accessing their account, sameappliesto staff. If weseeastudent account being accessed when they areabsent, we will investigate. Wehavean internet policy which limitswhat staff and studentsareableto accessthrough theschool internet system. Thepolicy statesall actionsneed permission unlessapproved by theteacher, games cannot beplayed, emailssent need permission,no chat sitescan beused, not to modify other peoples filesand that thecomputerswill bemonitored. School Policies