SlideShare a Scribd company logo
1 of 22
Security Tips ,[object Object]
Ok, so you may know many of these already.
But it’s not something we talk about much.
Back Up your DATA ,[object Object],[object Object]
Don’t Leave  Your Screen Your Screen ,[object Object],[object Object]
Be Responsible and Be Aware ,[object Object],[object Object]
Password Choice ,[object Object],[object Object],[object Object],[object Object]
Surf Wisely ,[object Object],[object Object]
It’s all on the record ,[object Object]
Email Hoaxes ,[object Object],[object Object]
Practice Safe Access ,[object Object]
You never know what might be lurking to kill your computer
Protect your Identity ,[object Object],[object Object]
Phishing ,[object Object],[object Object],[object Object]
Compliance : Yes Privacy : No Privacy : No Compliance  with the school district's policies and rules concerning computer use is  mandatory . An  employee who violates this policy and/or any rules governing use of the school district's computers shall be  subject to disciplinary action , up to and including termination. Illegal uses of the school district's computers may also result in referral to law enforcement. Wiscasset School Department computers remain under the control, custody and supervision of the school district at all times. The school district reserves the right to monitor all computer and Internet activity by employees.  Employees have no expectation of privacy in their use of school computers.
Wiscasset’s EMPLOYEE  AUP AUP AUP ,[object Object],[object Object],[object Object],[object Object]
ACCESS B. Access to School Computers, Networks and Internet Services The level of employee access to school district computers, networks and Internet services is based upon specific job requirements and needs. Unauthorized access to secure areas of the school district's computers and networks is strictly prohibited.
C. Acceptable Use Wiscasset School Department's computers, networks and Internet services are provided to employees for  administrative ,  educational ,  communication  and  research  purposes consistent  with the school district's educational mission, curriculum and instructional goals. All Board policies, school rules and expectations for professional conduct and communications apply when employees are using the school district's computers,  networks and Internet services
Prohibited Examples of unacceptable uses which are expressly prohibited  include, but are not limited to , the following: 1. Any use that is illegal or which violates other Board policies, procedures or school rules, including harassing, discriminatory or threatening communications and behavior; violations of copyright laws, etc. The school district assumes no responsibility for illegal activities of employees while using school computers. 2. Any use involving materials that are obscene, pornographic, sexually explicit or sexually suggestive. 3. Any inappropriate communications with students or minors. 4. Any use for private financial gain, or commercial, advertising or solicitation purposes. 5. Any use as a forum for communicating by e-mail or any other medium with other school users or outside parties to solicit, proselytize, advocate or communicate the views of an individual or nonschool sponsored organization; to solicit membership in or support of any non-school sponsored organization; or to raise funds for any non-school sponsored purpose, whether profit or not-for-profit. No employee shall knowingly provide school e-mail addresses to outside parties whose intent is to communicate with school employees, students and/or their families for non-school purposes. Employees who are uncertain as to whether particular activities are acceptable should seek further guidance from the building principal or other appropriate administrator. 6. Any communication that represents an employee’s personal views as those of the school district or that could be misinterpreted as such. 7. Downloading or loading software or applications without permission from the system administrator. Unauthorized copying of software is illegal and may subject the copier to substantial civil and criminal penalties. The school district assumes no responsibility for illegal software copying by employees. 8. Sending mass e-mails to school users or outside parties for school or non-school purposes without the permission of the Technology Coordinator or building administrator. 9. Any malicious use or disruption of the school district's computers, networks and Internet services; any breach of security features; or misuse of computer passwords or accounts (the employee's or those of other users). 10. Any misuse or damage to the school district's computer equipment, including opening or forwarding e-mail attachments (executable files) from unknown sources and/or that may contain viruses; 11. Any attempt to access unauthorized sites, or any attempt to disable or circumvent the school district's filtering/blocking technology. 12. Failing to report a breach of computer security to the Technology Coordinator; 13. Using school computers, networks and Internet services after such access has been denied or revoked; and 14. Any attempt to delete, erase or otherwise conceal any information stored on a school computer that violates these rules or other Board policies or school rules, or refusing to return computer equipment issued to the employee upon request.
No Privacy F. No Expectation of Privacy Wiscasset School Department computers remain under the control, custody and supervision of the school district at all times. The school district reserves the right to monitor all computer and Internet activity by employees and other system users. Employees have no expectation of privacy in their use of school computers, including e-mail, stored files and Internet access logs.
Supervision of Kids H. Employee/Volunteer Responsibility to Supervise Student Computer Use Employees and volunteers who use school computers with students for instructional purposes have a duty of care to supervise such use. Teachers, staff members and volunteers are expected to be familiar with the school district's policies and rules concerning student computer and Internet use and to enforce them. When, in the course of their duties, employees or volunteers become aware of a student violation, they are expected to stop the activity and inform the building principal.
Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know.

More Related Content

What's hot

Sample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper GradesSample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper Gradescck008
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990missstevenson01
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTBenandro Palor
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schoolsPaul Chamberlain
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEUsman Ahmed
 
One on one learning program
One on one learning programOne on one learning program
One on one learning programlosyork1
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Et5083 module 3 application ppt
Et5083 module 3 application pptEt5083 module 3 application ppt
Et5083 module 3 application pptswahl123
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYChano Alfornon
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 

What's hot (19)

Sample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper GradesSample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper Grades
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990
 
D33 AUP
D33 AUPD33 AUP
D33 AUP
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Protect
ProtectProtect
Protect
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cs3254
Cs3254Cs3254
Cs3254
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
 
P7 unit 3
P7 unit 3 P7 unit 3
P7 unit 3
 
One on one learning program
One on one learning programOne on one learning program
One on one learning program
 
Social media policy
Social media policySocial media policy
Social media policy
 
Et5083 module 3 application ppt
Et5083 module 3 application pptEt5083 module 3 application ppt
Et5083 module 3 application ppt
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 

Viewers also liked

Digital Cameras In the Classroom
Digital Cameras In the ClassroomDigital Cameras In the Classroom
Digital Cameras In the ClassroomSarah Sutter
 
I S L A M, C H R I S T I A N I T Yand J U D A I S M
I S L A M, C H R I S T I A N I T Yand J U D A I S MI S L A M, C H R I S T I A N I T Yand J U D A I S M
I S L A M, C H R I S T I A N I T Yand J U D A I S Mguestdc311f
 
Graphic design intro2
Graphic design intro2Graphic design intro2
Graphic design intro2Sarah Sutter
 
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuus
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuusPerttu Monthan - Tervetuloa ja Intranetien tulevaisuus
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuusguest388107
 
Intro To Digital Photo
Intro To Digital PhotoIntro To Digital Photo
Intro To Digital PhotoSarah Sutter
 
Coincidence Or A Sign
Coincidence Or A SignCoincidence Or A Sign
Coincidence Or A Signguestdc311f
 
Islam A Rational Perspective
Islam  A  Rational  PerspectiveIslam  A  Rational  Perspective
Islam A Rational Perspectiveguestdc311f
 

Viewers also liked (8)

Design Intro
Design IntroDesign Intro
Design Intro
 
Digital Cameras In the Classroom
Digital Cameras In the ClassroomDigital Cameras In the Classroom
Digital Cameras In the Classroom
 
I S L A M, C H R I S T I A N I T Yand J U D A I S M
I S L A M, C H R I S T I A N I T Yand J U D A I S MI S L A M, C H R I S T I A N I T Yand J U D A I S M
I S L A M, C H R I S T I A N I T Yand J U D A I S M
 
Graphic design intro2
Graphic design intro2Graphic design intro2
Graphic design intro2
 
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuus
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuusPerttu Monthan - Tervetuloa ja Intranetien tulevaisuus
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuus
 
Intro To Digital Photo
Intro To Digital PhotoIntro To Digital Photo
Intro To Digital Photo
 
Coincidence Or A Sign
Coincidence Or A SignCoincidence Or A Sign
Coincidence Or A Sign
 
Islam A Rational Perspective
Islam  A  Rational  PerspectiveIslam  A  Rational  Perspective
Islam A Rational Perspective
 

Similar to Safety Presentation

11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreementPaula Naugle
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Paula Naugle
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use PolicyBarb Jansen
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Security
SecuritySecurity
SecurityNabatah
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy donekgrosvenor
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditTamir Harper
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreementPaula Naugle
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010Barb Jansen
 

Similar to Safety Presentation (20)

11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630
 
Aup david.sayago
Aup david.sayagoAup david.sayago
Aup david.sayago
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
AUP
AUPAUP
AUP
 
Security
SecuritySecurity
Security
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Staff newsletter
Staff newsletterStaff newsletter
Staff newsletter
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 

More from Sarah Sutter

Maine Visual & Performing Arts
Maine Visual & Performing Arts Maine Visual & Performing Arts
Maine Visual & Performing Arts Sarah Sutter
 
Bio design presentation
Bio design presentationBio design presentation
Bio design presentationSarah Sutter
 
Digital Photography at SummerTech Belfast 2009
Digital Photography at SummerTech Belfast 2009Digital Photography at SummerTech Belfast 2009
Digital Photography at SummerTech Belfast 2009Sarah Sutter
 
Family History in American History
Family History in American HistoryFamily History in American History
Family History in American HistorySarah Sutter
 
Backchannel Chat in the Classroom
Backchannel Chat in the ClassroomBackchannel Chat in the Classroom
Backchannel Chat in the ClassroomSarah Sutter
 
MLTI Castine 08 Digital Cameras in the Classroom
MLTI Castine 08 Digital Cameras in the ClassroomMLTI Castine 08 Digital Cameras in the Classroom
MLTI Castine 08 Digital Cameras in the ClassroomSarah Sutter
 

More from Sarah Sutter (9)

PDF demo magazine
PDF demo magazinePDF demo magazine
PDF demo magazine
 
Maine Visual & Performing Arts
Maine Visual & Performing Arts Maine Visual & Performing Arts
Maine Visual & Performing Arts
 
Photo workshop
Photo workshopPhoto workshop
Photo workshop
 
Bio design presentation
Bio design presentationBio design presentation
Bio design presentation
 
Blogging Intro
Blogging IntroBlogging Intro
Blogging Intro
 
Digital Photography at SummerTech Belfast 2009
Digital Photography at SummerTech Belfast 2009Digital Photography at SummerTech Belfast 2009
Digital Photography at SummerTech Belfast 2009
 
Family History in American History
Family History in American HistoryFamily History in American History
Family History in American History
 
Backchannel Chat in the Classroom
Backchannel Chat in the ClassroomBackchannel Chat in the Classroom
Backchannel Chat in the Classroom
 
MLTI Castine 08 Digital Cameras in the Classroom
MLTI Castine 08 Digital Cameras in the ClassroomMLTI Castine 08 Digital Cameras in the Classroom
MLTI Castine 08 Digital Cameras in the Classroom
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Safety Presentation

  • 1.
  • 2. Ok, so you may know many of these already.
  • 3. But it’s not something we talk about much.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. You never know what might be lurking to kill your computer
  • 13.
  • 14.
  • 15. Compliance : Yes Privacy : No Privacy : No Compliance with the school district's policies and rules concerning computer use is mandatory . An employee who violates this policy and/or any rules governing use of the school district's computers shall be subject to disciplinary action , up to and including termination. Illegal uses of the school district's computers may also result in referral to law enforcement. Wiscasset School Department computers remain under the control, custody and supervision of the school district at all times. The school district reserves the right to monitor all computer and Internet activity by employees. Employees have no expectation of privacy in their use of school computers.
  • 16.
  • 17. ACCESS B. Access to School Computers, Networks and Internet Services The level of employee access to school district computers, networks and Internet services is based upon specific job requirements and needs. Unauthorized access to secure areas of the school district's computers and networks is strictly prohibited.
  • 18. C. Acceptable Use Wiscasset School Department's computers, networks and Internet services are provided to employees for administrative , educational , communication and research purposes consistent with the school district's educational mission, curriculum and instructional goals. All Board policies, school rules and expectations for professional conduct and communications apply when employees are using the school district's computers, networks and Internet services
  • 19. Prohibited Examples of unacceptable uses which are expressly prohibited include, but are not limited to , the following: 1. Any use that is illegal or which violates other Board policies, procedures or school rules, including harassing, discriminatory or threatening communications and behavior; violations of copyright laws, etc. The school district assumes no responsibility for illegal activities of employees while using school computers. 2. Any use involving materials that are obscene, pornographic, sexually explicit or sexually suggestive. 3. Any inappropriate communications with students or minors. 4. Any use for private financial gain, or commercial, advertising or solicitation purposes. 5. Any use as a forum for communicating by e-mail or any other medium with other school users or outside parties to solicit, proselytize, advocate or communicate the views of an individual or nonschool sponsored organization; to solicit membership in or support of any non-school sponsored organization; or to raise funds for any non-school sponsored purpose, whether profit or not-for-profit. No employee shall knowingly provide school e-mail addresses to outside parties whose intent is to communicate with school employees, students and/or their families for non-school purposes. Employees who are uncertain as to whether particular activities are acceptable should seek further guidance from the building principal or other appropriate administrator. 6. Any communication that represents an employee’s personal views as those of the school district or that could be misinterpreted as such. 7. Downloading or loading software or applications without permission from the system administrator. Unauthorized copying of software is illegal and may subject the copier to substantial civil and criminal penalties. The school district assumes no responsibility for illegal software copying by employees. 8. Sending mass e-mails to school users or outside parties for school or non-school purposes without the permission of the Technology Coordinator or building administrator. 9. Any malicious use or disruption of the school district's computers, networks and Internet services; any breach of security features; or misuse of computer passwords or accounts (the employee's or those of other users). 10. Any misuse or damage to the school district's computer equipment, including opening or forwarding e-mail attachments (executable files) from unknown sources and/or that may contain viruses; 11. Any attempt to access unauthorized sites, or any attempt to disable or circumvent the school district's filtering/blocking technology. 12. Failing to report a breach of computer security to the Technology Coordinator; 13. Using school computers, networks and Internet services after such access has been denied or revoked; and 14. Any attempt to delete, erase or otherwise conceal any information stored on a school computer that violates these rules or other Board policies or school rules, or refusing to return computer equipment issued to the employee upon request.
  • 20. No Privacy F. No Expectation of Privacy Wiscasset School Department computers remain under the control, custody and supervision of the school district at all times. The school district reserves the right to monitor all computer and Internet activity by employees and other system users. Employees have no expectation of privacy in their use of school computers, including e-mail, stored files and Internet access logs.
  • 21. Supervision of Kids H. Employee/Volunteer Responsibility to Supervise Student Computer Use Employees and volunteers who use school computers with students for instructional purposes have a duty of care to supervise such use. Teachers, staff members and volunteers are expected to be familiar with the school district's policies and rules concerning student computer and Internet use and to enforce them. When, in the course of their duties, employees or volunteers become aware of a student violation, they are expected to stop the activity and inform the building principal.
  • 22. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know.