SlideShare a Scribd company logo
1 of 22
Security Tips ,[object Object]
Ok, so you may know many of these already.
But it’s not something we talk about much.
Back Up your DATA ,[object Object],[object Object]
Don’t Leave  Your Screen Your Screen ,[object Object],[object Object]
Be Responsible and Be Aware ,[object Object],[object Object]
Password Choice ,[object Object],[object Object],[object Object],[object Object]
Surf Wisely ,[object Object],[object Object]
It’s all on the record ,[object Object]
Email Hoaxes ,[object Object],[object Object]
Practice Safe Access ,[object Object]
You never know what might be lurking to kill your computer
Protect your Identity ,[object Object],[object Object]
Phishing ,[object Object],[object Object],[object Object]
Compliance : Yes Privacy : No Privacy : No Compliance  with the school district's policies and rules concerning computer use is  mandatory . An  employee who violates this policy and/or any rules governing use of the school district's computers shall be  subject to disciplinary action , up to and including termination. Illegal uses of the school district's computers may also result in referral to law enforcement. Wiscasset School Department computers remain under the control, custody and supervision of the school district at all times. The school district reserves the right to monitor all computer and Internet activity by employees.  Employees have no expectation of privacy in their use of school computers.
Wiscasset’s EMPLOYEE  AUP AUP AUP ,[object Object],[object Object],[object Object],[object Object]
ACCESS B. Access to School Computers, Networks and Internet Services The level of employee access to school district computers, networks and Internet services is based upon specific job requirements and needs. Unauthorized access to secure areas of the school district's computers and networks is strictly prohibited.
C. Acceptable Use Wiscasset School Department's computers, networks and Internet services are provided to employees for  administrative ,  educational ,  communication  and  research  purposes consistent  with the school district's educational mission, curriculum and instructional goals. All Board policies, school rules and expectations for professional conduct and communications apply when employees are using the school district's computers,  networks and Internet services
Prohibited Examples of unacceptable uses which are expressly prohibited  include, but are not limited to , the following: 1. Any use that is illegal or which violates other Board policies, procedures or school rules, including harassing, discriminatory or threatening communications and behavior; violations of copyright laws, etc. The school district assumes no responsibility for illegal activities of employees while using school computers. 2. Any use involving materials that are obscene, pornographic, sexually explicit or sexually suggestive. 3. Any inappropriate communications with students or minors. 4. Any use for private financial gain, or commercial, advertising or solicitation purposes. 5. Any use as a forum for communicating by e-mail or any other medium with other school users or outside parties to solicit, proselytize, advocate or communicate the views of an individual or nonschool sponsored organization; to solicit membership in or support of any non-school sponsored organization; or to raise funds for any non-school sponsored purpose, whether profit or not-for-profit. No employee shall knowingly provide school e-mail addresses to outside parties whose intent is to communicate with school employees, students and/or their families for non-school purposes. Employees who are uncertain as to whether particular activities are acceptable should seek further guidance from the building principal or other appropriate administrator. 6. Any communication that represents an employee’s personal views as those of the school district or that could be misinterpreted as such. 7. Downloading or loading software or applications without permission from the system administrator. Unauthorized copying of software is illegal and may subject the copier to substantial civil and criminal penalties. The school district assumes no responsibility for illegal software copying by employees. 8. Sending mass e-mails to school users or outside parties for school or non-school purposes without the permission of the Technology Coordinator or building administrator. 9. Any malicious use or disruption of the school district's computers, networks and Internet services; any breach of security features; or misuse of computer passwords or accounts (the employee's or those of other users). 10. Any misuse or damage to the school district's computer equipment, including opening or forwarding e-mail attachments (executable files) from unknown sources and/or that may contain viruses; 11. Any attempt to access unauthorized sites, or any attempt to disable or circumvent the school district's filtering/blocking technology. 12. Failing to report a breach of computer security to the Technology Coordinator; 13. Using school computers, networks and Internet services after such access has been denied or revoked; and 14. Any attempt to delete, erase or otherwise conceal any information stored on a school computer that violates these rules or other Board policies or school rules, or refusing to return computer equipment issued to the employee upon request.
No Privacy F. No Expectation of Privacy Wiscasset School Department computers remain under the control, custody and supervision of the school district at all times. The school district reserves the right to monitor all computer and Internet activity by employees and other system users. Employees have no expectation of privacy in their use of school computers, including e-mail, stored files and Internet access logs.
Supervision of Kids H. Employee/Volunteer Responsibility to Supervise Student Computer Use Employees and volunteers who use school computers with students for instructional purposes have a duty of care to supervise such use. Teachers, staff members and volunteers are expected to be familiar with the school district's policies and rules concerning student computer and Internet use and to enforce them. When, in the course of their duties, employees or volunteers become aware of a student violation, they are expected to stop the activity and inform the building principal.
Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know.

More Related Content

What's hot

Sample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper GradesSample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper Gradescck008
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990missstevenson01
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTBenandro Palor
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schoolsPaul Chamberlain
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEUsman Ahmed
 
One on one learning program
One on one learning programOne on one learning program
One on one learning programlosyork1
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Et5083 module 3 application ppt
Et5083 module 3 application pptEt5083 module 3 application ppt
Et5083 module 3 application pptswahl123
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYChano Alfornon
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 

What's hot (19)

Sample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper GradesSample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper Grades
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990
 
D33 AUP
D33 AUPD33 AUP
D33 AUP
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Protect
ProtectProtect
Protect
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cs3254
Cs3254Cs3254
Cs3254
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
 
P7 unit 3
P7 unit 3 P7 unit 3
P7 unit 3
 
One on one learning program
One on one learning programOne on one learning program
One on one learning program
 
Social media policy
Social media policySocial media policy
Social media policy
 
Et5083 module 3 application ppt
Et5083 module 3 application pptEt5083 module 3 application ppt
Et5083 module 3 application ppt
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 

Viewers also liked

Digital Cameras In the Classroom
Digital Cameras In the ClassroomDigital Cameras In the Classroom
Digital Cameras In the ClassroomSarah Sutter
 
I S L A M, C H R I S T I A N I T Yand J U D A I S M
I S L A M, C H R I S T I A N I T Yand J U D A I S MI S L A M, C H R I S T I A N I T Yand J U D A I S M
I S L A M, C H R I S T I A N I T Yand J U D A I S Mguestdc311f
 
Graphic design intro2
Graphic design intro2Graphic design intro2
Graphic design intro2Sarah Sutter
 
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuus
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuusPerttu Monthan - Tervetuloa ja Intranetien tulevaisuus
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuusguest388107
 
Intro To Digital Photo
Intro To Digital PhotoIntro To Digital Photo
Intro To Digital PhotoSarah Sutter
 
Coincidence Or A Sign
Coincidence Or A SignCoincidence Or A Sign
Coincidence Or A Signguestdc311f
 
Islam A Rational Perspective
Islam  A  Rational  PerspectiveIslam  A  Rational  Perspective
Islam A Rational Perspectiveguestdc311f
 

Viewers also liked (8)

Design Intro
Design IntroDesign Intro
Design Intro
 
Digital Cameras In the Classroom
Digital Cameras In the ClassroomDigital Cameras In the Classroom
Digital Cameras In the Classroom
 
I S L A M, C H R I S T I A N I T Yand J U D A I S M
I S L A M, C H R I S T I A N I T Yand J U D A I S MI S L A M, C H R I S T I A N I T Yand J U D A I S M
I S L A M, C H R I S T I A N I T Yand J U D A I S M
 
Graphic design intro2
Graphic design intro2Graphic design intro2
Graphic design intro2
 
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuus
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuusPerttu Monthan - Tervetuloa ja Intranetien tulevaisuus
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuus
 
Intro To Digital Photo
Intro To Digital PhotoIntro To Digital Photo
Intro To Digital Photo
 
Coincidence Or A Sign
Coincidence Or A SignCoincidence Or A Sign
Coincidence Or A Sign
 
Islam A Rational Perspective
Islam  A  Rational  PerspectiveIslam  A  Rational  Perspective
Islam A Rational Perspective
 

Similar to Safety Presentation

11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreementPaula Naugle
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Paula Naugle
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use PolicyBarb Jansen
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Security
SecuritySecurity
SecurityNabatah
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy donekgrosvenor
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditTamir Harper
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreementPaula Naugle
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010Barb Jansen
 

Similar to Safety Presentation (20)

11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630
 
Aup david.sayago
Aup david.sayagoAup david.sayago
Aup david.sayago
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
AUP
AUPAUP
AUP
 
Security
SecuritySecurity
Security
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Staff newsletter
Staff newsletterStaff newsletter
Staff newsletter
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 

More from Sarah Sutter

Maine Visual & Performing Arts
Maine Visual & Performing Arts Maine Visual & Performing Arts
Maine Visual & Performing Arts Sarah Sutter
 
Bio design presentation
Bio design presentationBio design presentation
Bio design presentationSarah Sutter
 
Digital Photography at SummerTech Belfast 2009
Digital Photography at SummerTech Belfast 2009Digital Photography at SummerTech Belfast 2009
Digital Photography at SummerTech Belfast 2009Sarah Sutter
 
Family History in American History
Family History in American HistoryFamily History in American History
Family History in American HistorySarah Sutter
 
Backchannel Chat in the Classroom
Backchannel Chat in the ClassroomBackchannel Chat in the Classroom
Backchannel Chat in the ClassroomSarah Sutter
 
MLTI Castine 08 Digital Cameras in the Classroom
MLTI Castine 08 Digital Cameras in the ClassroomMLTI Castine 08 Digital Cameras in the Classroom
MLTI Castine 08 Digital Cameras in the ClassroomSarah Sutter
 

More from Sarah Sutter (9)

PDF demo magazine
PDF demo magazinePDF demo magazine
PDF demo magazine
 
Maine Visual & Performing Arts
Maine Visual & Performing Arts Maine Visual & Performing Arts
Maine Visual & Performing Arts
 
Photo workshop
Photo workshopPhoto workshop
Photo workshop
 
Bio design presentation
Bio design presentationBio design presentation
Bio design presentation
 
Blogging Intro
Blogging IntroBlogging Intro
Blogging Intro
 
Digital Photography at SummerTech Belfast 2009
Digital Photography at SummerTech Belfast 2009Digital Photography at SummerTech Belfast 2009
Digital Photography at SummerTech Belfast 2009
 
Family History in American History
Family History in American HistoryFamily History in American History
Family History in American History
 
Backchannel Chat in the Classroom
Backchannel Chat in the ClassroomBackchannel Chat in the Classroom
Backchannel Chat in the Classroom
 
MLTI Castine 08 Digital Cameras in the Classroom
MLTI Castine 08 Digital Cameras in the ClassroomMLTI Castine 08 Digital Cameras in the Classroom
MLTI Castine 08 Digital Cameras in the Classroom
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Safety Presentation

  • 1.
  • 2. Ok, so you may know many of these already.
  • 3. But it’s not something we talk about much.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. You never know what might be lurking to kill your computer
  • 13.
  • 14.
  • 15. Compliance : Yes Privacy : No Privacy : No Compliance with the school district's policies and rules concerning computer use is mandatory . An employee who violates this policy and/or any rules governing use of the school district's computers shall be subject to disciplinary action , up to and including termination. Illegal uses of the school district's computers may also result in referral to law enforcement. Wiscasset School Department computers remain under the control, custody and supervision of the school district at all times. The school district reserves the right to monitor all computer and Internet activity by employees. Employees have no expectation of privacy in their use of school computers.
  • 16.
  • 17. ACCESS B. Access to School Computers, Networks and Internet Services The level of employee access to school district computers, networks and Internet services is based upon specific job requirements and needs. Unauthorized access to secure areas of the school district's computers and networks is strictly prohibited.
  • 18. C. Acceptable Use Wiscasset School Department's computers, networks and Internet services are provided to employees for administrative , educational , communication and research purposes consistent with the school district's educational mission, curriculum and instructional goals. All Board policies, school rules and expectations for professional conduct and communications apply when employees are using the school district's computers, networks and Internet services
  • 19. Prohibited Examples of unacceptable uses which are expressly prohibited include, but are not limited to , the following: 1. Any use that is illegal or which violates other Board policies, procedures or school rules, including harassing, discriminatory or threatening communications and behavior; violations of copyright laws, etc. The school district assumes no responsibility for illegal activities of employees while using school computers. 2. Any use involving materials that are obscene, pornographic, sexually explicit or sexually suggestive. 3. Any inappropriate communications with students or minors. 4. Any use for private financial gain, or commercial, advertising or solicitation purposes. 5. Any use as a forum for communicating by e-mail or any other medium with other school users or outside parties to solicit, proselytize, advocate or communicate the views of an individual or nonschool sponsored organization; to solicit membership in or support of any non-school sponsored organization; or to raise funds for any non-school sponsored purpose, whether profit or not-for-profit. No employee shall knowingly provide school e-mail addresses to outside parties whose intent is to communicate with school employees, students and/or their families for non-school purposes. Employees who are uncertain as to whether particular activities are acceptable should seek further guidance from the building principal or other appropriate administrator. 6. Any communication that represents an employee’s personal views as those of the school district or that could be misinterpreted as such. 7. Downloading or loading software or applications without permission from the system administrator. Unauthorized copying of software is illegal and may subject the copier to substantial civil and criminal penalties. The school district assumes no responsibility for illegal software copying by employees. 8. Sending mass e-mails to school users or outside parties for school or non-school purposes without the permission of the Technology Coordinator or building administrator. 9. Any malicious use or disruption of the school district's computers, networks and Internet services; any breach of security features; or misuse of computer passwords or accounts (the employee's or those of other users). 10. Any misuse or damage to the school district's computer equipment, including opening or forwarding e-mail attachments (executable files) from unknown sources and/or that may contain viruses; 11. Any attempt to access unauthorized sites, or any attempt to disable or circumvent the school district's filtering/blocking technology. 12. Failing to report a breach of computer security to the Technology Coordinator; 13. Using school computers, networks and Internet services after such access has been denied or revoked; and 14. Any attempt to delete, erase or otherwise conceal any information stored on a school computer that violates these rules or other Board policies or school rules, or refusing to return computer equipment issued to the employee upon request.
  • 20. No Privacy F. No Expectation of Privacy Wiscasset School Department computers remain under the control, custody and supervision of the school district at all times. The school district reserves the right to monitor all computer and Internet activity by employees and other system users. Employees have no expectation of privacy in their use of school computers, including e-mail, stored files and Internet access logs.
  • 21. Supervision of Kids H. Employee/Volunteer Responsibility to Supervise Student Computer Use Employees and volunteers who use school computers with students for instructional purposes have a duty of care to supervise such use. Teachers, staff members and volunteers are expected to be familiar with the school district's policies and rules concerning student computer and Internet use and to enforce them. When, in the course of their duties, employees or volunteers become aware of a student violation, they are expected to stop the activity and inform the building principal.
  • 22. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know.