TwitterFacebookMy-School

Network Usage Rules Policy

VIOLATION OF SAINT JOSEPH’S RULES

The usage policy has been put in place to protect users and ensure the network remains functional. Any violation of the policy will result in appropriate action being taken. The school reserves the right to examine or delete any files held on its computer system or to monitor any internet sites visited.

 

GENERAL POINTS ON USE OF C2K IT SYSTEM

St Joseph’s IT C2k System is monitored and it is the users’ responsibilities for security of C2k user names and passwords and for appropriate use of email and the Internet. Parents shall be responsible for their children’s out-of-school online use of Learning NI (full terms and conditions are available on Learning NI).  All users must be aware that attempts to bypass filtering, or to access inappropriate or illegal material will be reported to the school authority. All school users are now informed that email messages held by the filtering policy are accessible to the person nominated by the principal to release mail.

 

C2K NETWORKS

No additional devices may be connected to computers on the C2k network without the specific agreement of C2k; random checks will be carried out to identify such violations.

 

a) General

USERS MUST:

  • Always use their own UID – never log on as someone else!
  • Log off properly after using equipment
  • Change their password regularly
  • Report any flaw or bypass of computer network security to IT staff
  • Use virus checkers regularly
  • Use equipment for legal and educational purposes only
  • Keep back ups of their own work
  • Respect copyright of material

 

USERS MUST NOT:

  • Interfere with other users’ files or work
  • Use the system irresponsibly, or needlessly affect the work of others. This includes transmitting or making any accessible offensive, annoying or harassing material; intentionally damaging information not belonging to you
  • Print outside lesson time, or without the permission of a teacher.
  • Print duplicate/multiple documents
  • Attempt to install software of any nature onto the network drives or on to any St Joseph’s machine disk drive at any time for whatever reason
  • Use Hotmail, Facebook or any other social network sites
  • Use the network for any matter which is not educational
  • Attempt to access restricted or classified information
  • Attempt to use information obtained over the internet for financial gain
  • Develop and distribute software or information across the internet from St Joseph’s equipment
  • Use the internet in a manner which disrupts the educational and administrative goals of the school.

 

b) E-Mail:

USERS MUST:

  • Use appropriate language when constructing messages
  • Regularly clear their mail boxes.

 

USERS MUST NOT:

  • Distribute chain mail letters (internally or externally)
  • Send attached files larger than 2MB without prior permission
  • Broadcast messages to large numbers of users without prior permission
  • Send messages needlessly, for example pupils sat beside each other need not send one another messages!
  • Access e-mail in class unless given the permission of the member of staff teaching them and have signed THE ACCEPTABLE INTERNET USE STATEMENT for return to the I.C.T. Co-ordinator.