ICT ACCEPTABLE USE Sunrise School Division Computer Network
ICT ACCEPTABLE USE Sunrise School Division
Computer & Network Privileges • Everyone is expected to exercise appropriate, respectful & responsible use of computers! • Sunrise has the right to examine files, programs, passwords, printouts, and all and any computing material without notice! • Innapropriate use can result in cancellation of these privileges and other disciplinary action as determined by the Sunrise School Division
Your Responsibilities • All users must have a valid authorized account and may only use those computer, network, and internet resources that are specifically authorized. • All users are responsible to safeguard their own computer use account. • Users may not change, copy, delete, read, or otherwise access files or software without permission of the owners of the files or the system administrator.
More Responsibilities… • A user may neither prevent others from accessing the system, nor unreasonably slowing down the system by deliberate running wasteful jobs, playing games, etc. • Attempts to log into the system as any other user will result in cancellation of user privileges
Etiquette (behaviour) • Be respectful • Use appropriate language • Keep personal information confidential • Refrain from posting personal pictures • Do NOT install or run unauthorized software • Do not abuse Internet Use!
Privacy VIOLATION of PRIVACY includes: • Attempting to access another user’s computer files without permission. • Supplying or attempting to supply false or misleading information or identification in order to access another user’s account.
Theft… (it’s bad) • Abusing specific computer resources, or removing any computer equipment without authorization • Copying, or attempting to copy, data or software without proper authorization
Harassment • Interfering with the legitimate work of another computer user. • Sending abusive of obscene messages via the computer to anyone. • Using computer resources to engage in above of computer personnel or other users.
Other rules (Oh Goodie…. ) • Unauthorized and time-consuming recreational game playing is a violation of your terms of agreement for SSD computer usage. • Using computer accounts for work not authorized for that account violates terms of use. • Pretending to be someone else in an e-mail, message, social media, or chat - “spoofing” violates terms of use.
Consequences… Violating the terms of use can result in any of the following consequences: • Suspension or a complete revoke of computer usage privileges. • Denial of access to all computing facilities and systems within SSD • Requirement of reimbursement to SSD, or applicable institution.
- Slides: 10