SlideShare a Scribd company logo
1 of 22
Security Tips ,[object Object]
Ok, so you may know many of these already.
But it’s not something we talk about much.
Back Up your DATA ,[object Object],[object Object]
Don’t Leave  Your Screen Your Screen ,[object Object],[object Object]
Be Responsible and Be Aware ,[object Object],[object Object]
Password Choice ,[object Object],[object Object],[object Object],[object Object]
Surf Wisely ,[object Object],[object Object]
It’s all on the record ,[object Object]
Email Hoaxes ,[object Object],[object Object]
Practice Safe Access ,[object Object]
You never know what might be lurking to kill your computer
Protect your Identity ,[object Object],[object Object]
Phishing ,[object Object],[object Object],[object Object]
Compliance : Yes Privacy : No Privacy : No Compliance  with the school district's policies and rules concerning computer use is  mandatory . An  employee who violates this policy and/or any rules governing use of the school district's computers shall be  subject to disciplinary action , up to and including termination. Illegal uses of the school district's computers may also result in referral to law enforcement. Wiscasset School Department computers remain under the control, custody and supervision of the school district at all times. The school district reserves the right to monitor all computer and Internet activity by employees.  Employees have no expectation of privacy in their use of school computers.
Wiscasset’s EMPLOYEE  AUP AUP AUP ,[object Object],[object Object],[object Object],[object Object]
ACCESS B. Access to School Computers, Networks and Internet Services The level of employee access to school district computers, networks and Internet services is based upon specific job requirements and needs. Unauthorized access to secure areas of the school district's computers and networks is strictly prohibited.
C. Acceptable Use Wiscasset School Department's computers, networks and Internet services are provided to employees for  administrative ,  educational ,  communication  and  research  purposes consistent  with the school district's educational mission, curriculum and instructional goals. All Board policies, school rules and expectations for professional conduct and communications apply when employees are using the school district's computers,  networks and Internet services
Prohibited Examples of unacceptable uses which are expressly prohibited  include, but are not limited to , the following: 1. Any use that is illegal or which violates other Board policies, procedures or school rules, including harassing, discriminatory or threatening communications and behavior; violations of copyright laws, etc. The school district assumes no responsibility for illegal activities of employees while using school computers. 2. Any use involving materials that are obscene, pornographic, sexually explicit or sexually suggestive. 3. Any inappropriate communications with students or minors. 4. Any use for private financial gain, or commercial, advertising or solicitation purposes. 5. Any use as a forum for communicating by e-mail or any other medium with other school users or outside parties to solicit, proselytize, advocate or communicate the views of an individual or nonschool sponsored organization; to solicit membership in or support of any non-school sponsored organization; or to raise funds for any non-school sponsored purpose, whether profit or not-for-profit. No employee shall knowingly provide school e-mail addresses to outside parties whose intent is to communicate with school employees, students and/or their families for non-school purposes. Employees who are uncertain as to whether particular activities are acceptable should seek further guidance from the building principal or other appropriate administrator. 6. Any communication that represents an employee’s personal views as those of the school district or that could be misinterpreted as such. 7. Downloading or loading software or applications without permission from the system administrator. Unauthorized copying of software is illegal and may subject the copier to substantial civil and criminal penalties. The school district assumes no responsibility for illegal software copying by employees. 8. Sending mass e-mails to school users or outside parties for school or non-school purposes without the permission of the Technology Coordinator or building administrator. 9. Any malicious use or disruption of the school district's computers, networks and Internet services; any breach of security features; or misuse of computer passwords or accounts (the employee's or those of other users). 10. Any misuse or damage to the school district's computer equipment, including opening or forwarding e-mail attachments (executable files) from unknown sources and/or that may contain viruses; 11. Any attempt to access unauthorized sites, or any attempt to disable or circumvent the school district's filtering/blocking technology. 12. Failing to report a breach of computer security to the Technology Coordinator; 13. Using school computers, networks and Internet services after such access has been denied or revoked; and 14. Any attempt to delete, erase or otherwise conceal any information stored on a school computer that violates these rules or other Board policies or school rules, or refusing to return computer equipment issued to the employee upon request.
No Privacy F. No Expectation of Privacy Wiscasset School Department computers remain under the control, custody and supervision of the school district at all times. The school district reserves the right to monitor all computer and Internet activity by employees and other system users. Employees have no expectation of privacy in their use of school computers, including e-mail, stored files and Internet access logs.
Supervision of Kids H. Employee/Volunteer Responsibility to Supervise Student Computer Use Employees and volunteers who use school computers with students for instructional purposes have a duty of care to supervise such use. Teachers, staff members and volunteers are expected to be familiar with the school district's policies and rules concerning student computer and Internet use and to enforce them. When, in the course of their duties, employees or volunteers become aware of a student violation, they are expected to stop the activity and inform the building principal.
Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know.

More Related Content

What's hot

Sample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper GradesSample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper Gradescck008
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990missstevenson01
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTBenandro Palor
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schoolsPaul Chamberlain
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEUsman Ahmed
 
One on one learning program
One on one learning programOne on one learning program
One on one learning programlosyork1
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Et5083 module 3 application ppt
Et5083 module 3 application pptEt5083 module 3 application ppt
Et5083 module 3 application pptswahl123
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYChano Alfornon
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 

What's hot (19)

Sample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper GradesSample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper Grades
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990
 
D33 AUP
D33 AUPD33 AUP
D33 AUP
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Protect
ProtectProtect
Protect
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cs3254
Cs3254Cs3254
Cs3254
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
 
P7 unit 3
P7 unit 3 P7 unit 3
P7 unit 3
 
One on one learning program
One on one learning programOne on one learning program
One on one learning program
 
Social media policy
Social media policySocial media policy
Social media policy
 
Et5083 module 3 application ppt
Et5083 module 3 application pptEt5083 module 3 application ppt
Et5083 module 3 application ppt
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 

Viewers also liked

Digital Cameras In the Classroom
Digital Cameras In the ClassroomDigital Cameras In the Classroom
Digital Cameras In the ClassroomSarah Sutter
 
I S L A M, C H R I S T I A N I T Yand J U D A I S M
I S L A M, C H R I S T I A N I T Yand J U D A I S MI S L A M, C H R I S T I A N I T Yand J U D A I S M
I S L A M, C H R I S T I A N I T Yand J U D A I S Mguestdc311f
 
Graphic design intro2
Graphic design intro2Graphic design intro2
Graphic design intro2Sarah Sutter
 
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuus
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuusPerttu Monthan - Tervetuloa ja Intranetien tulevaisuus
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuusguest388107
 
Intro To Digital Photo
Intro To Digital PhotoIntro To Digital Photo
Intro To Digital PhotoSarah Sutter
 
Coincidence Or A Sign
Coincidence Or A SignCoincidence Or A Sign
Coincidence Or A Signguestdc311f
 
Islam A Rational Perspective
Islam  A  Rational  PerspectiveIslam  A  Rational  Perspective
Islam A Rational Perspectiveguestdc311f
 

Viewers also liked (8)

Design Intro
Design IntroDesign Intro
Design Intro
 
Digital Cameras In the Classroom
Digital Cameras In the ClassroomDigital Cameras In the Classroom
Digital Cameras In the Classroom
 
I S L A M, C H R I S T I A N I T Yand J U D A I S M
I S L A M, C H R I S T I A N I T Yand J U D A I S MI S L A M, C H R I S T I A N I T Yand J U D A I S M
I S L A M, C H R I S T I A N I T Yand J U D A I S M
 
Graphic design intro2
Graphic design intro2Graphic design intro2
Graphic design intro2
 
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuus
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuusPerttu Monthan - Tervetuloa ja Intranetien tulevaisuus
Perttu Monthan - Tervetuloa ja Intranetien tulevaisuus
 
Intro To Digital Photo
Intro To Digital PhotoIntro To Digital Photo
Intro To Digital Photo
 
Coincidence Or A Sign
Coincidence Or A SignCoincidence Or A Sign
Coincidence Or A Sign
 
Islam A Rational Perspective
Islam  A  Rational  PerspectiveIslam  A  Rational  Perspective
Islam A Rational Perspective
 

Similar to Safety Presentation

11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreementPaula Naugle
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Paula Naugle
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use PolicyBarb Jansen
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Security
SecuritySecurity
SecurityNabatah
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy donekgrosvenor
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditTamir Harper
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreementPaula Naugle
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010Barb Jansen
 

Similar to Safety Presentation (20)

11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630
 
Aup david.sayago
Aup david.sayagoAup david.sayago
Aup david.sayago
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
AUP
AUPAUP
AUP
 
Security
SecuritySecurity
Security
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Staff newsletter
Staff newsletterStaff newsletter
Staff newsletter
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 

More from Sarah Sutter

Maine Visual & Performing Arts
Maine Visual & Performing Arts Maine Visual & Performing Arts
Maine Visual & Performing Arts Sarah Sutter
 
Bio design presentation
Bio design presentationBio design presentation
Bio design presentationSarah Sutter
 
Digital Photography at SummerTech Belfast 2009
Digital Photography at SummerTech Belfast 2009Digital Photography at SummerTech Belfast 2009
Digital Photography at SummerTech Belfast 2009Sarah Sutter
 
Family History in American History
Family History in American HistoryFamily History in American History
Family History in American HistorySarah Sutter
 
Backchannel Chat in the Classroom
Backchannel Chat in the ClassroomBackchannel Chat in the Classroom
Backchannel Chat in the ClassroomSarah Sutter
 
MLTI Castine 08 Digital Cameras in the Classroom
MLTI Castine 08 Digital Cameras in the ClassroomMLTI Castine 08 Digital Cameras in the Classroom
MLTI Castine 08 Digital Cameras in the ClassroomSarah Sutter
 

More from Sarah Sutter (9)

PDF demo magazine
PDF demo magazinePDF demo magazine
PDF demo magazine
 
Maine Visual & Performing Arts
Maine Visual & Performing Arts Maine Visual & Performing Arts
Maine Visual & Performing Arts
 
Photo workshop
Photo workshopPhoto workshop
Photo workshop
 
Bio design presentation
Bio design presentationBio design presentation
Bio design presentation
 
Blogging Intro
Blogging IntroBlogging Intro
Blogging Intro
 
Digital Photography at SummerTech Belfast 2009
Digital Photography at SummerTech Belfast 2009Digital Photography at SummerTech Belfast 2009
Digital Photography at SummerTech Belfast 2009
 
Family History in American History
Family History in American HistoryFamily History in American History
Family History in American History
 
Backchannel Chat in the Classroom
Backchannel Chat in the ClassroomBackchannel Chat in the Classroom
Backchannel Chat in the Classroom
 
MLTI Castine 08 Digital Cameras in the Classroom
MLTI Castine 08 Digital Cameras in the ClassroomMLTI Castine 08 Digital Cameras in the Classroom
MLTI Castine 08 Digital Cameras in the Classroom
 

Recently uploaded

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 

Recently uploaded (20)

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Safety Presentation

  • 1.
  • 2. Ok, so you may know many of these already.
  • 3. But it’s not something we talk about much.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. You never know what might be lurking to kill your computer
  • 13.
  • 14.
  • 15. Compliance : Yes Privacy : No Privacy : No Compliance with the school district's policies and rules concerning computer use is mandatory . An employee who violates this policy and/or any rules governing use of the school district's computers shall be subject to disciplinary action , up to and including termination. Illegal uses of the school district's computers may also result in referral to law enforcement. Wiscasset School Department computers remain under the control, custody and supervision of the school district at all times. The school district reserves the right to monitor all computer and Internet activity by employees. Employees have no expectation of privacy in their use of school computers.
  • 16.
  • 17. ACCESS B. Access to School Computers, Networks and Internet Services The level of employee access to school district computers, networks and Internet services is based upon specific job requirements and needs. Unauthorized access to secure areas of the school district's computers and networks is strictly prohibited.
  • 18. C. Acceptable Use Wiscasset School Department's computers, networks and Internet services are provided to employees for administrative , educational , communication and research purposes consistent with the school district's educational mission, curriculum and instructional goals. All Board policies, school rules and expectations for professional conduct and communications apply when employees are using the school district's computers, networks and Internet services
  • 19. Prohibited Examples of unacceptable uses which are expressly prohibited include, but are not limited to , the following: 1. Any use that is illegal or which violates other Board policies, procedures or school rules, including harassing, discriminatory or threatening communications and behavior; violations of copyright laws, etc. The school district assumes no responsibility for illegal activities of employees while using school computers. 2. Any use involving materials that are obscene, pornographic, sexually explicit or sexually suggestive. 3. Any inappropriate communications with students or minors. 4. Any use for private financial gain, or commercial, advertising or solicitation purposes. 5. Any use as a forum for communicating by e-mail or any other medium with other school users or outside parties to solicit, proselytize, advocate or communicate the views of an individual or nonschool sponsored organization; to solicit membership in or support of any non-school sponsored organization; or to raise funds for any non-school sponsored purpose, whether profit or not-for-profit. No employee shall knowingly provide school e-mail addresses to outside parties whose intent is to communicate with school employees, students and/or their families for non-school purposes. Employees who are uncertain as to whether particular activities are acceptable should seek further guidance from the building principal or other appropriate administrator. 6. Any communication that represents an employee’s personal views as those of the school district or that could be misinterpreted as such. 7. Downloading or loading software or applications without permission from the system administrator. Unauthorized copying of software is illegal and may subject the copier to substantial civil and criminal penalties. The school district assumes no responsibility for illegal software copying by employees. 8. Sending mass e-mails to school users or outside parties for school or non-school purposes without the permission of the Technology Coordinator or building administrator. 9. Any malicious use or disruption of the school district's computers, networks and Internet services; any breach of security features; or misuse of computer passwords or accounts (the employee's or those of other users). 10. Any misuse or damage to the school district's computer equipment, including opening or forwarding e-mail attachments (executable files) from unknown sources and/or that may contain viruses; 11. Any attempt to access unauthorized sites, or any attempt to disable or circumvent the school district's filtering/blocking technology. 12. Failing to report a breach of computer security to the Technology Coordinator; 13. Using school computers, networks and Internet services after such access has been denied or revoked; and 14. Any attempt to delete, erase or otherwise conceal any information stored on a school computer that violates these rules or other Board policies or school rules, or refusing to return computer equipment issued to the employee upon request.
  • 20. No Privacy F. No Expectation of Privacy Wiscasset School Department computers remain under the control, custody and supervision of the school district at all times. The school district reserves the right to monitor all computer and Internet activity by employees and other system users. Employees have no expectation of privacy in their use of school computers, including e-mail, stored files and Internet access logs.
  • 21. Supervision of Kids H. Employee/Volunteer Responsibility to Supervise Student Computer Use Employees and volunteers who use school computers with students for instructional purposes have a duty of care to supervise such use. Teachers, staff members and volunteers are expected to be familiar with the school district's policies and rules concerning student computer and Internet use and to enforce them. When, in the course of their duties, employees or volunteers become aware of a student violation, they are expected to stop the activity and inform the building principal.
  • 22. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know. Just thought you might like to know.