RickMorales W5A2 Essay examples

Submitted By mturboz913
Words: 1299
Pages: 6

Write an Acceptable Use Policy
Rick Morales
ITT Tech
Jan 20, 2015
I have to create an acceptable use policy (AUP) that addresses student, faculty, and employee use of computers, the network, and Internet access at the technical school. An AUP is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet for South Harmon Institute of Technology. Many businesses and educational facilities require that employees or students sign an AUP before being granted a network ID (Rouse, 2014).
Technology Acceptable Use Policy for Students
South Harmon Institute of Technology provides students with a wide range of information technology for educational purposes. The use of these technologies is a privilege, not a right, and students are responsible for using them legally, appropriately, responsibly, and kindly (LARK). The school sets terms and conditions upon technology use, and students should have no expectation of privacy or anonymity while using equipment or software provided or established by the school. Use of information technology is governed by the same core values and behavioral expectations set forth in the Student Handbook, and that apply to all other aspects of life within the Packer community.
Rules:
Respect and protect the privacy of other.
Respect and Protect the Integrity, Availability, and Security of all Electronic Resources
Respect and Protect the Intellectual Property of Others
Respect and Protect the Practices of the Community
Additional Restrictions for Middle School Students
Packer’s Rights and Responsibilities
Consequences for Violations
Reporting Computing Abuse and Irresponsible Behavior
Reminders for Safer Internet Use
Technology Acceptable Use Policy for Faculty and Staff
This policy of South Harmon Institute of Technology views administrative data, third party proprietary information, and college information systems as critical business assets. Misuse or damage of administrative data, third party proprietary information, or college information systems may be as costly to the college as misuse or damage of physical property. College employees are responsible for the protection and proper use of College administrative data, third party proprietary information, and information systems according to the policy provisions set forth below. In addition to this policy, individuals and departments are required to abide by the Data Classification and Protection policy which details the minimum security requirements for the administration of sensitive data (Acceptable Use Policy for Faculty and Staff, n.d.).
1. Restricted College administrative data and third-party proprietary information (e.g., licensed software and designated portions of vendor contracts) in the custody of College staff members shall be used only for official College business and as necessary for the performance of assigned duties. Restricted College information includes student records that are confidential under the Family Educational Rights and Privacy Act (FERPA 1974, as amended), personnel records, and other data to which limited access is subject to prior administrative approval.
2. College administrative data or third-party proprietary information shall not be altered or changed in any way except as authorized in the appropriate performance of assigned duties.
3. College administrative data or third-party proprietary information shall not be divulged to anyone unless their relationship with the College as an employee, customer, vendor, or contracted temporary employee warrants disclosure and is authorized or required by law and College policy.
4. Any user IDs and passwords assigned to a staff member shall be used only by that staff member and shall not be divulged to persons not authorized by the College.
5. Failure to comply with any of the above stated policies may result in a staff member being disciplined or terminated from his or her position, in accordance with…