List of active policies
|Acceptable Use Policy||Site policy||Authenticated users|
By using NEW College IT services, you are agreeing to and are bound by the terms set out in this document and agree with that all college devices and systems can be monitored for security and safety reasons.
I agree that I will:
- Be responsible for all the ICT activity in my area and so will not give my username and password to anybody else and not attempt to log on using another person's username and password or access another person's files.
- Not attempt to gain unauthorised access to any part of the NEW College network that is not available from my personal logon, either via the network or the Internet.
- Personal computer equipment must not be connected to the college network without prior consent of the IT Manager.
- Not attempt to use or load programs, files, tools or shortcuts to gain access to either the hard drive of the NEW College workstations or any other part of the network and not attempt to store any computer software on the college network that the college has no license for, and not attempt to store any free software on the college network without prior consent of the IT Manager.
- Not attempt to store any computer software on the college network that the college has no license for.
- Not attempt to store any free software on the college network without prior consent of the IT Manager.
- Immediately report any instance where I have inadvertently gained access to restricted areas to a member of staff.
- Only visit websites, which are appropriate to my work at the time and only use the Internet to help me with my work when using a College computer.
- Will Not visit websites that contain unsuitable material. If I am unsure if a site is suitable, I will ask a member of staff.
- Not visit websites that contain unsuitable material. If I am unsure if a site is suitable, I will ask a member of staff.
- be responsible when setting a new password, minimum of 8 characters, include the following uppercase characters (A through to Z) lowercase (a through to z) Numbers (0 through 9), Special characters (example _, -, =, + ,!, @, *, /,)
- Not click/open unknown links and files in the interest of reducing exploit risk.
- Not attempt to set-up or use any proxy by-pass software, in order to by-pass the College Internet filter.
- Not meet anyone whom I have made contact with on the Internet without discussing this first with my parents/careerâ€™s.
- Not take information from the Internet and pass it off as my own work. If any work is found to have been plagiarised it will be given a Zero mark.
- Report any misuse of the Internet immediately to a member of staff.
- Be responsible in my use of email. I will not include in an email any material that is inappropriate. I will not use offensive or threatening language in my emails or in any other communication on the Internet. I understand that any email going out from the College will carry the College address and so represents the College.
- Always keep my personal details private.
- Staff data is not to be removed from the College Network under any circumstances, without prior authorisation, access to the Staff Network externally VDI is available.
- Staff data is not to be removed from the College Network using external devices, access to the Staff Network externally VDI is available.
- Only copy pictures or text into my area on the network. I will not download any other type of file, for example software, games, screen savers, Music, Films, etc.
- Use the Wireless or Guest Wireless network to the same responsible ways listed in this policy.
- Not abuse the Printing and Copying services around College, all printing, copying and scanning is monitored and logged for abuse of use over and above normal practice.
- Abide by The Code of Conduct for the ICT Rooms, which are displayed on the walls in each computer room.
- Not post any defamatory remarks relating to NEW College, Staff or Students to any Public Web sites either inside or outside College, including Facebook, Twitter, Google +, and other websites where public users have access to view posts.
- Additionally, all college devices and systems can be monitored for security and safety reasons.
- All users accessing the BYOD wireless network do so under the agreement of New College's ICT Acceptable Use Policy and agree to adhere to conditions set out in this policy documentation. Students choosing to bring personal devices into college do so at their own risk.
- Treat College IT equipment with care and attention and accept that if I deliberately damage deface or vandalise IT equipment I will be charged the full cost and will be placed on contract.
Criminal Conduct / Radicalisation and Extremism
Criminal Conduct/Radicalisation and Extremism a number of activities related to the use of the Internet or email are covered by law, by College policy or regulations and are otherwise clearly unacceptable. These will be regarded by the College as constituting misconduct and any student involved will be subject to disciplinary action up to expulsion. These include: terrorist activities, on-line stalking, grooming, internet luring, soliciting of children by computer, defamation, retention of offensive screen savers, fraud, software theft, damage to College systems, retention of other people's personal details/information, drug-related activities, or any other illegal activity.
In addition, Section 26 of the Counter-Terrorism and Security Act 2015 places a duty on the College to have, in the exercise of its functions, due regard to the need to prevent people from being drawn into terrorism. This means that the College will place an appropriate amount of weight on the need to prevent people being drawn into terrorism in the application of this policy.
Social media advice and policy:
- Do not post images or videos of staff or students in a College situation on your social media profile or pages.
- Remember that any posts that you make using social media sites are generally in the public domain for a long time and can be accessible by future university's or employers and may hinder your future progression.
- If your social media profile lists the College as your employer or that you are a student at the College, it should also state that any views expressed are your own and do not represent the College.
- Set your profiles to "private" to ensure control over who is able to access / view your information.
- Be aware that Social Networking websites are a public forum, particularly if you are a part of a network. You should not assume that entries on any website will remain private and you are strongly advised to use the appropriate privacy settings.
- Ensure conduct on sites could not be seen as detrimental to the College or bring the College into disrepute.
- Ensure any comments made on sites could not constitute bullying, harassment or discrimination.
- Take care not to allow interaction on websites that may cause to damage working relationships, for instance â€˜likingâ€™ a Facebook group with views that could be deemed as extremist.
- Be security conscious and take steps to protect you from identity theft, for example by restricting the amount of personal information given out. Social Media websites allow people to post detailed personal information such as date of birth, place of birth and favorite football team, which can form the basis of security questions and passwords.
- Change your social media password often. The IT Helpdesk can provide advice concerning password security if required.
Future updates to this document
This policy may be updated or modified at any time should the college deem it necessary. Sections of the acceptable usage policy will be displayed on your computer and must be accepted from time to time before web usage is allowed. The college reserves the right to administer these rules in a fair and unbiased way, which may result in a student's access to either the internet or the college network being removed or other appropriate sanction being taken.