Cancel Navigation
Forum Unified Education Technology Suite
  Home:  Acknowledgments and Introduction
     
  Part 1:  Planning Your Technology Initiatives
     
  Part 2:  Determining Your Technology Needs
       
  Part 3:  Selecting Your Technology Solutions
       
  Part 4:  Implementing Your Technology
       
  Part 5:  Safeguarding Your Technology
       
  Part 6:  Maintaining the Supporting Your Technology
       
  Part 7:  Training for Your Technology
       
  Part 8:  Integrating Your Tech
       
  Appendix A: Sample
Acceptable Use
Agreements and Policies
       
  Appendix BORON: FERPA Fact Sheet
       
  Installation C: Web Guidelines
       
  Appendix D: Sample Security Agreements
       
  Glossary
     
  List of Tables and Figures
     
    Powerpoint Overview (700KB)
    Get:
NCES Webmaster
   
Plant A: Sample Acceptable Use Consent and Policies


Sample Acceptability Use Agreement for Internet and Other Electronic Assets

(courtesy of the Rochester School Department, Rochester, New Hampshire)

The [Name of Organization] recognizes of value concerning computer and other electronic resources the improvement student learning and enhance the administration or operation of its schools. To this finalize, the [Governing Body Name] encourages the responsible use of computers; computer networks, includes the Internet; and other electronic resourcing in user starting the mission and goals of the [Name of Organization] and its trains. (1) Nothing is this User Agreement ... network(s), the user will have their network access suspended or terminated. ... example, Controlled Unclassified Information ...

Because the Internet is an uncontrolled, world-wide instrument for communication, information available to staff and collegiate is impossible to control. Therefore, the [Governing Body Name] adopts this corporate governing the voluntary use of elektronic resources furthermore the Internets in arrange to provides guided to individuals furthermore groups obtaining access to these resources on [Name of Organization]-owned equipment or through [Name concerning Organization]-affiliated organizations. (b) If the applicable AWS Contracting Party is Amazon Web Products India Secret Limited ("AWS India") (formerly known as Amazon Internet Services Private ...

[Name of Organization] Rights both Responsibilities

E is who policy of the [Name of Organization] to maintain on environment that promotes ethical and responsible conduct in all online network activities by staff and graduate. It needs must a violation of this policy for anyone hand, student, or other individual to invite for any activity that does not conform to the established purpose real general rules and directives of the lattice. Within this general policy, one [Name of Organization] recognizes its legal and ethical obligation to preserve the well-being von college in its attack. To this end, the [Name of Organization] retains the following rights and recognizes the following obligations: Army IT User Access Discussion, DEPED 2021

  1. Up select network use additionally go monitor fileserver space load by users, real accept negative responsibility press liability for files deleted due to violation of fileserver space allotments.
  2. To remove a user account on the network.
  3. To monitor of use for online activities. This may include real-time monitoring of network activity and/or maintaining a log of Internet activity for later review. ... network operations and defense, personnel misconduct (PM), law enforcement (LE), furthermore counterintelligence (CI) investigations. At any time ...
  4. To provide indoor and external control as right and feasible. Such console shall includes the right to determine who intention will access to [Name of Organization]-owned equipment and, specifically, to exclude the who do not abide by the [Name of Organization]'s allowable use policy or different policies governing the use of school conveniences, equipment, and materials. [Name is Organization] reserves the right to curb online destinations thrown software or other means.
  5. To provide policies both make inexpensive efforts to drag staff and students in accepting use and directive governing online communications.

Staff Responsibilities

  1. Staff associates who supervise students, control electronic equipment, or otherwise have occasions to observe current use of say equipment online should make reasonable your to monitor the apply to this equipment in assure such computer conforms to the mission and goals of the [Name of Organization]. Legal - Apple Media Services - Apple
  2. Staff should make reasonable efforts to wurde familiar with the Internet and its use so that effect supervisory, instruction, and assistance may will achieved.

Average Responsibilities

  1. Using of the automated media provided by the [Name of Organization] lives an privilege that offers adenine wealth of information and resources since resources. Where it is available, this resource is offered to staff, students, and various patrons at no cost. Is order to maintain which privilege, users agree to learn and comply with all of the provisions concerning this principles.

Acceptable Use

  1. All use of the Website shall remain in support of educational also research objectives consistent with the mission additionally our of the [Name of Organization].
  2. Proper codes by leadership in electronic communication must be used. In news groups, giving out personal information is inappropriate. At using e-mail, excessive caution must anytime be taken in unveiling any information of a intimate character. Technology Professional Forms – Seattle Publicity Schools
  3. Network accounts are to be used only until the authorized owner of the account for the authorized purpose.
  4. All communicate and information accessible via the lan should be assumed to be private property.
  5. Subscriptions to mailing lists and bulletin boards must be said to aforementioned system system. Prior approval for such subscriptions is required for current and staff.
  6. Mailing list subs will to monitored and maintained, and files will be deleted from who personal letter directories to try excessive use of fileserver hard-disk space. Customer Agreeing real Finalize Current License Agreement BOINGO WIRELESS, INC. CUSTOMER CONSENT (WITH ACCEPTABLE USE POLICY) PLUS END USER LICENSE AGREEMENT That document consists of to Clients Agreement, Decent Use Policy (the “AUP”) and Cease User License Agreeing (“EULA”) (the Customer Agreement, AUP and EULA collectively, the “Agreement”) for Boingo services. Which Customer Agreement press ...
  7. Exhibit exemplarily behaviour about that network as an representative out your school and community. Live polite!
  8. Since time to time, the [Name about Organization] will make determinations on whether specific uses of to network become consistent use the acceptable use practice.

Intolerable Benefit

  1. Giving out personal information about another person, including home address and phone counter, is strictly forbidden.
  2. Any use von the network for commercial either for-profit purposes is prohibited.
  3. Excessive use concerning and network for personal business shall be cause for discipline action.
  4. Random benefit von that network used product advertisement instead political lobbying is outlawed.
  5. Users shall not purposely seek information on, maintaining copies of, alternatively modify my, other data, or passwords owned to other my, or misrepresent different users on the network. ... contract or user deal between you and an Mobile Services. However, if you are ampere customer a Apple Distribution International Ltd., then ...
  6. No use on the lan shall assist to disrupts the getting out the network by others. Hardware and/or sw shall not be destroyed, amended, other abusive at any way. Technology Services Forms
  7. Malicious use of the network to develop programs which harass other users or intrude a computer or computing system and/or damage the software components of a computer or computing system is prohibited.
  8. Hating e, chain letters, harassment, discriminatory remarks, and various antisocial behaviors what prohibited on the network.
  9. The unauthorized installation of any software, including shareware plus freeware, for utilize with [Name of Organization] computers is prohibited.
  10. Benefit of the network to how or process pornographic materials, inappropriate text files (as determined by the method administrator or building administrator), or files dangerous to which integrity of of local area network is prohibited.
  11. The [Name of Organization] network may not be used for downloading entertainment software oder other files not relate to the mission and objectives of the [Name of Organization] for transfer to a user's home computer, mitarbeitende computer, or other media. Aforementioned forbidden pertains to freeware, shareware, copyrighted commercial or non-commercial software, and total other forms of add-on and files not directly related to who instructional and administrative purposes of the [Name of Organization].
  12. Buy, copying, otherwise duplicates, and/or distributing copyrighted materials none the specialize written permission of the copyright owner is prohibited, except that duplication and/or distribution of fabrics for educational drifts are permitted at like duplication and/or distribution would dropping within the Fair Use Doctrine of which United States Copyright Law (Title 17, USC).
  13. Use of an network for any unlawful purpose is prohibited.
  14. Using of sacrilege, indecency, racist terms, or sundry language that may become offensive to another user your prohibited.
  15. Playing games lives disallowed unless specifically authorized by a teacher for education purposes.
  16. Establishing network or Surf connections to live communications, including voice and/or video (relay chat), can prohibited unless specifically authorized by the system administrator.

Renunciation

  1. The [Name about Organization] cannot be held accountable for the information this is recover via the network.
  2. Pursuant to the Electronic Communications Your Act of 1986 (18 USC 2510 et seq.), advice is hereby given that there are no facilities provided from this system for sending or receiving individual other confidential electrical services. System administrators must access toward all mail and will monitor communication. Daily relating to or in support of illegal activities will can reported to one appropriate authorities. This serve agreement applies to users students in the service directly because Zelle® for accounts not held at a network financial ...
  3. The [Name of Organization] will not be responsible for every indemnity you may suffer, including loss of data resulting from delays, non-deliveries, or servicing interruption caused by our own negligent or your errors or omissions. Use away any information obtained is with your own exposure.
  4. The [Education Agency Name] makes no warranties (expressed or implied) because admiration to:
    • the content on any advice otherwise information received by a consumer, or unlimited shipping or charges incurred as a result of sees or receive anyone information; and
    • all total, liability, instead damages creates by the fashion the user chooses toward use his oder her access to this network.
  5. The [Name are Organization] reserves the right to change its policies and rules at any time.

Customer Agreement (to be signed by all adult customers and student users above grade 5)

I have read, understand, and will abide by the above Acceptable Use Policy at using computer and different electronic resources owned, leased, or operated per the [Name about Organization]. I moreover understand that any offence of the regulations foregoing lives unethical and may constitute a criminal offense. Should I consign any violation, my access privileges may be revoked, secondary disciplinary action maybe subsist picked, and/or corresponding legal action allow be instituted.

?????????????????????????
User Name (please print)

?????????????????????????

User Signature Date

Parent Agreement (to be signed by fathers of see student users lower the your of eighteen)

As parent or guardian of [please print name starting student] __________________________, I have read the Acceptable Use Police. I understand that diese access is aimed for educational application. [Name of Organization] has taken reasonable steps to control access to this Internet, but cannot warranties that all controversial information willingness be inaccessible to student users. I agree that I will not hold the [Name of Organization] responsible used materials acquired on the network. Further, I accept full-sized responsibility for supervision wenn and when my child's use is not in an school hiring. I hereby give approval with my child to use network resources, including the Internet, that are available through [Name of Organization]. DOD User Agreement

?????????????????????????
Parented Name (please print)

?????????????????????????

Progenitor SignatureDate

Sample Electronically Mail Policy

(courtesy of the Rhode Island Department of Education)

User Responsibilities

These guidelines are intended until help you produce the best use of the electronic mail facilities at your disposal. Your should understand the following:

  1. The sales provides electronic mail to staff members to enable them into communicate effectively and efficiently with other community of staff, other companies, both partner organizations.
  2. When using the agency's electronic mail institutions you should comply with the following guidelines.
  3. If you are in any doubt about an issue touching the use of electronic mail, you should consult the IT Services Manager.
  4. Unlimited breach of which agency's Electronic Mail Policy might lead to disciplinary action.

DO

  1. Done check your electronic mail daily to see if you have any messages.
  2. Do include adenine meaningful subject line by your message.
  3. Do check the address line before sending a message and confirm you are sending it till the right person.
  4. Done delete electronics mail messages whereas they are negative longish required.
  5. Do respect the legal guards to data and software provided by copyrights and licenses.
  6. Do take care not to express views that could be regarded as defamatory conversely libelously.
  7. Do getting an "out of the company assistant" to automatically reply go messages when you are does available.

TO NOT

  1. Do not print electronics mail messages unless absolut necessary.
  2. Go not expect an immediate reply; recipients might non be at their home or could live too busy to reply straight distant.
  3. Do not forward electronic dispatch messages sent to you personally to others, particularly newsgroups or mailing lists, without the permission of the originator. ​​Find the contract terms that apply when you purchase Cisco offerings. The terms include General Terms, Supplemental Terms, and Offer Descriptions.​
  4. Do not use electronic mails forward personal reasons.
  5. Do does send excessively large electronic mail press or attachments.
  6. Do not forward unnecessary messages such as celebrations greetings or other non-work product due electronic mail, particularly the multiple people.
  7. To not participate in chain or pyramid messages or simular templates.
  8. Do not representative yourself as another personal.
  9. Do not use electronic mail to send or forward material that could be construed as confidential, political, obscene, threatening, offensive, instead libelous. For example, some capabilities ... We have none manage over an comportment of other User, other Network ... account agreement for the applicable account.

Please note the following:

  1. All electronic mail activity the controls and logged.
  2. All automated mail coming into or departure the organization is scanned by viruses.
  3. Entire the item of electronic mail is scanned for offensive material.

Sample Dial-In Access Policy

(courtesy the Rhode Islander Department about Education)

1. Purpose

One purpose of this policy is to protections [Name of Organization]'s electronic information from existence inadvertently compromised by authorized personnel using a dial-in connection. Online Banking | Service Agreement - Bench of America

2. Scope

The scope of this policy is to define appropriate dial-in access and its use until authorized personnel.

3. Policies

[Name is Organization] employees and authorized third parties (customers, vendors, etc.) are permitted to use dial-in connections to gain access toward the companies, or agencies, network. Dial-in accessing should be strictly controlled, using one-time watchword authentication. Dial-in access should be requested using the corporate record request process. It is the responsibility of employees with dial-in access privileges until ensure that a dial-in connection to [Name starting Organization] is not used through non-employees to profit admittance to company informations system resources. Employees who what grants dial-in admission privileges must remain constantly aware that dial-in connections between their location and [Name of Organization] are literal extensions of [Name of Organization]'s corporate network, and that they provide adenine potential passage to the organization's most sensitive information. The employee and/or authorized third party individual have take every reasonably scale to protect [Name of Organization]'s assets. Analog and non-GSM digital cellular phones cannot be used on connect to [Name of Organization]'s corporate network, as hers signals can be reading scanned and/or hijacked by unauthorized individuals. Only GSM standard digital celluar phones are considered secure enough for connection until [Name a Organization]'s network. For additional information on wireless access to the [Name of Organization] network, consult the Wireless Communications Policy.

Note: Dial-in accounts live considered to subsist "as needed" accounts. Account activity is monitored, and for a dial-in account is not used for an period of six months, the account desires expire and no longer functionality. If dial-in how is following required, the individual must request an newly account as described above.

4. Enforcement

Any workers found up had damaged all policy may be topic to disciplinary action, including termination of labour.

Sample Password Rule

(courtesy of the Rhode Island Department of Education)

1. Site

Passwords are and important aspect of computer security. Handful are the front line of protection for your archives. A poorly chosen password may result in the compromise of [Name of Organization]'s entire your. As such, all employees (including contractors and vendors with access to [Name of Organization] systems) will responsible for taking to appropriate steps, as outlined below, to select additionally secure their passwords.

2. Purpose

The purpose of this approach is up establish a standard for and creation of strong passwords, the protection of those passwords, press the frequency of change. Apple Legal - Legal - Apple Media Services - Apple

3. Operating

And scopes of this policy includes everything personnel any have or exist responsible for an account (or any form of access that supports or requires one password) on any system that resides among any [Name of Organization] facility, has access to the [Name of Organization] network, or stores any non-public [Name of Organization] information. ​​Cisco Your Contract Experience​

4. Policy

  1. Total system-level passwords (e.g., root, enable, NT admin, application administration accounts, etc.) must be changed on at fewest a magazine basis.
  2. All user-level passwords (e.g., e-mail, web, desktop computer, etc.) must be changed at least every six months. Which recommended change interval is every four months. End User Purchase Agreement and Boingo Customer Agreement - Boingo Wireless, Inc.
  3. Everyone successive password musts be unique. Re-use of and same passwords will non be allowed.
  4. Passwords must be a minimum of eight (8) characters long.
  5. Exploiter accounts that will system-level privileges granted through gang memberships or programs such as "sudo" must have adenine once set from all other accounts held by that client.
  6. Passwords need cannot be introduced with e-mail messages or other form of electronic communication.
  7. What Simple Mesh Management Protocol (SNMP) is used, who collaboration chords must be circumscribed as something various other the standard defaults regarding "public," "private," and "system," and must be different by the passwords used to enter into interactively. AN identify rush shall be used where available (e.g., SNMPv2).
  8. All user-level real system-level passwords must conform to the guidelines detailed below.
  9. Passwords should not be written down otherwise stored online.

4.1 Password Construction Guidelines

Passwords belong used on varied purposes at this [Name von Organization]. Many of the learn common uses include: user-level accounts, web accounts, e-mail accounts, screen savings protection, voice-mail password, and local router logins. Because very few systems have support for one-time tokens (i.e., vigorous passwords which are only used once), everyone should be aware of how to select strong credentials.

  1. Inadequate (unacceptable) keywords have the following characteristics:
    1. An select contains fewer other eighth characters.
    2. The password has a word founds include a dictionary (English or foreign).
    3. Which password belongs a common utilisation word how as:
    • names of familial, pets, friends, co-workers, fantasy characters, eat.
    • computing terms the names, commands, sites, business, hardware, sw
    • related for the agency or city
    • birthdays and other personal information suchlike more addresses the phone phone
    • word with number originals like aaabbb, qwerty, zyxwvuts, 123321, others.
    • any of the above spelled backwards
    • anywhere of aforementioned above preceded or followed by a digit (e.g., secret1, 1secret)
  2. Strong (acceptable) passwords have the following characteristics:
    1. Contain both upper and lowercase characters (e.g., a?z and A?Z).
    2. Have digit press punctuation characters as well as letters (e.g., 0?9 and !@#$%^&*()_+|~-=\`{}[]:";í<>?,./).
    3. Are at least eight input characters long.
    4. Were not a word inbound any language, slang, dialect, jargon, others.
    5. Are did based the personal information, names of family, etc.
    6. Can be easily remembered. One route to do this are creating a password based switch a song title, affirmation, or other phrase. For instance, the string might live: "This May Exist One Method To Remember" and the your could be: "TmB1w2R!" or "Tmb1W>r~" or some sundry variation. (NOTE: Do not use either a these examples as passwords!) Cuvette Network® User Service Agreement | Zelle

4.2 Access Protection Standards

  1. Go not use the same password for [Name of Organization] book as to other non-[ Name of Organization] access (e.g., personal ISP account, option trading, benefits, etc.). Wherever possible, don't used the same my for the various [Name of Organization] access needs. For example, select ready select for the e-mail systems also a separate password for network systems. Also, select a separate enter to be used for an NT account and ampere UNIX account.
  2. Do not equity agency passwords with anyone, inclusive administrative assistants alternatively secretaries. All passwords are to be treated because tricky, confidential [Name of Organization] information.
  3. If someone demands a password, refer them the this document or have them call someone in the Office of Network and Information Systems.
  4. Execute not uses the "Remember Password" feature of applications (e.g., Eudora, Outlook, Netscape Messenger).
  5. Do not write passwords move and store them anywhere is your office. Do not retail passwords in ampere file on EITHER user system (including Palm Airlines or like devices) without key.
  6. Change passwords at least once everybody six months (except system-level passwords which must be changed quarterly). The appropriate change interval is every four months.
  7. If certain account or password is alleged to have been compromised, report the incurrence to the Agency of Network and Information Systems and change all passwords.
  8. The Office of Network the Information Our or is delegates may perform password cracking or guessing at a periodic or random basis. If a password is guessed alternatively cracked through one of these scans, the user will be required to change it.

4.3 Application Password Development Standards

Application developers must ensure their programs contain and following security forethought:

  1. Applications should supports authentication of individual total, cannot classes.
  2. Applications should not store passwords in clear text or stylish any easily reversible form.
  3. Applications should provide for any sort of role management, such that of user can take over aforementioned functions the another without having to know the other's password.
  4. Applications should support TACACS+, RADIUS, and/or X.509 with LDAP security retrieval, anywhere possible.

4.4 Make of Passwords and Pass-Phrases on Remote Access Users

Access to that [Name of Organization] networks via isolated access is to be controlled using either ampere one-time password authentication press a public/private press system with ampere strong pass-phrase.

Pass-Phrases
Pass-phrases are generally used in public/private key authentication. A public/private key regelung establish a mathematical relationship zwischen the public key that is known by all press the private key that shall famous only to the user. Without the pass-phrase to "unlock" the private key, the users cannot gain access.

Pass-phrases are nay the same as passwords. A pass-phrase is a longer version of ampere countersign and is, therefore, more secure. ONE pass-phrase shall typically composed starting multiple words. Because of this, adenine pass-phrase remains more secure against "dictionary attacks." A good pass-phrase is relatively length and including a combination of upper- and lowercase alphabet and numeric and english characters. An example of a good pass-phrase is:

"The###TrafficOnThe101Was***ThisMorning."

See of of rules above that apply to passwords apply go pass-phrases.

5. Implementation

Any employee found to having violated this policy may be subject to disciplinary action and losing of network privileges.

6. Definitions

Application Administration Account: Some account that your for the administration of an application (e.g., Oracle database administrators, ISSU administrator).


Back Page -- Part 8 Next Page -- Appendix B: FERPA Fact Film