List of active policies
|Acceptable Use Policy||Site policy||Authenticated users|
By using NEW College IT services, you are agreeing to and are bound by the terms set out in this document and agree with that all college devices and systems can be monitored for security and safety reasons.
I agree that I will:
- Be responsible for all the ICT activity in my area and so will not give my username and password to anybody else and not attempt to log on using another person's username and password or access another person's files.
- Be responsible for any activity performed using my computer. I will lock or logout of my computer when not using it.
- Not attempt to gain unauthorised access to any part of the NEW College network that is not available from my personal logon, either via the network or the Internet.
- Personal computer equipment must not be connected to the college network without prior consent of the IT Manager.
- Not attempt to use or load programs, files, tools or shortcuts to gain access to either the hard drive of the NEW College workstations or any other part of the network and not attempt to store any computer software on the college network that the college has no license for, and not attempt to store any free software on the college network without prior consent of the IT Manager.
- Not attempt to store any computer software on the college network that the college has no license for.
- Not attempt to store any free software on the college network without prior consent of the IT Manager.
- Immediately report any instance where I have inadvertently gained access to restricted areas to a member of staff.
- Only visit websites, which are appropriate to my work at the time and only use the Internet to help me with my work when using a College computer.
- Will Not visit websites that contain unsuitable material. If I am unsure if a site is suitable, I will ask a member of staff.
- Not visit websites that contain unsuitable material. If I am unsure if a site is suitable, I will ask a member of staff.
- be responsible when setting a new password, minimum of 8 characters, include the following uppercase characters (A through to Z) lowercase (a through to z) Numbers (0 through 9), Special characters (example _, -, =, + ,!, @, *, /,)
- Not click/open unknown links and files in the interest of reducing exploit risk.
- Not attempt to set-up or use any proxy by-pass software, in order to by-pass the College Internet filter.
- Not meet anyone whom I have made contact with on the Internet without discussing this first with my parents/carers.
- Not take information from the Internet and pass it off as my own work. If any work is found to have been plagiarised it will be given a Zero mark.
- Report any misuse of the Internet immediately to a member of staff.
- Be responsible in my use of email. I will not include in an email any material that is inappropriate. I will not use offensive or threatening language in my emails or in any other communication on the Internet. I understand that any email going out from the College will carry the College address and so represents the College.
- Always keep my personal details private.
- Staff data is not to be removed from the College Network under any circumstances, without prior authorisation, access to the Staff Network externally VDI is available.
- Staff data is not to be removed from the College Network using external devices, access to the Staff Network externally VDI is available.
- Only copy pictures or text into my area on the network. I will not download any other type of file, for example software, games, screen savers, Music, Films, etc.
- Use the Wireless or Guest Wireless network to the same responsible ways listed in this policy.
- Not abuse the Printing and Copying services around College, all printing, copying and scanning is monitored and logged for abuse of use over and above normal practice.
- Abide by The Code of Conduct for the ICT Rooms, which are displayed on the walls in each computer room.
- Not post any defamatory remarks relating to NEW College, Staff or Students to any Public Web sites either inside or outside College, including Facebook, Twitter, Google +, and other websites where public users have access to view posts.
- Additionally, all college devices and systems can be monitored for security and safety reasons.
- All users accessing the BYOD wireless network do so under the agreement of New College's ICT Acceptable Use Policy and agree to adhere to conditions set out in this policy documentation. Students choosing to bring personal devices into college do so at their own risk.
- Treat College IT equipment with care and attention and accept that if I deliberately damage deface or vandalise IT equipment I will be charged the full cost and will be placed on contract.
- Use the IT Systems only within the bounds of UK law and must not use the IT Systems for any purpose or activity, which is likely to contravene any UK, law whether now or in the future in force.
- Ensure I attend all training sessions and continually update my general awareness about IT security issues.
I accept that:
- The IT systems are provided to allow you to perform your work and study related duties, whilst the College provides a reasonable level of privacy, users should be aware that any usage of the Colleges IT systems remains the property of the College; this may be stored data, emails images etc.
- The College may monitor any aspects of its computer systems that are made available to any user and may also monitor intercept and/or record any communications made, including telephones email or internet communications. The College will ensure compliance in line with the Regulation of Investigatory Powers Act (RIPA) 2000, and the Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000.
- For business continuity purposes, the College may need to check the emails of employees who are absent.
- Sensitive information should be protected against theft or unauthorised access through security measures such as encryption. Access should be restricted, and limited to relevant members of staff and key individuals.
- All data, and in particular personal data, should be stored securely using passwords and data encryption.
- All data stored electronically on physical media, and in particular personal data, should be stored securely in a locked box, drawer, cabinet, or similar.
- No personal data should be stored on any mobile device (including, but not limited to, laptops, tablets, and smartphones), whether such device belongs to the Trust or otherwise without the formal written approval of the Data Protection Officer. In the event of such approval, strictly in accordance with all instructions and limitations described at the time the approval is given, and for no longer than is absolutely necessary.
- No data, and in particular personal data, should be transferred to any computer or device personally belonging to a User. Unless the User in question is a contractor or sub-contractor working on behalf of the Trust and that User has agreed to comply fully with the Trust's Data Protection Policy and Data Protection legislation.
Criminal Conduct / Radicalisation and Extremism
Criminal Conduct/Radicalisation and Extremism a number of activities related to the use of the Internet or email are covered by law, by College policy or regulations and are otherwise clearly unacceptable. These will be regarded by the College as constituting misconduct and any student involved will be subject to disciplinary action up to expulsion. These include: terrorist activities, on-line stalking, grooming, internet luring, soliciting of children by computer, defamation, retention of offensive screen savers, fraud, software theft, damage to College systems, retention of other people's personal details/information, drug-related activities, or any other illegal activity.
In addition, Section 26 of the Counter-Terrorism and Security Act 2015 places a duty on the College to have, in the exercise of its functions, due regard to the need to prevent people from being drawn into terrorism. This means that the College will place an appropriate amount of weight on the need to prevent people being drawn into terrorism in the application of this policy.
Social media advice and policy:
Please refer to the Social Media Policy located on the College website which clearly outlines the disciplinary procedures for students who use social media inappropriately.
All deliberate or negligent breaches of the Acceptable User Policy by Users will be handled as appropriate under the Trusts disciplinary procedures.
Future updates to this document
This policy may be updated or modified at any time should the college deem it necessary. Sections of the acceptable usage policy will be displayed on your computer and must be accepted from time to time before web usage is allowed. The college reserves the right to administer these rules in a fair and unbiased way, which may result in a student's access to either the internet or the college network being removed or other appropriate sanction being taken.