Acceptable Use Policy

Horbury Rules

Network User Guidelines

Internet User Guidelines

Network Security

Internet Security

Computer Laws

Data Protection Act 1998

Computer Misuse Act 1990

Copyright, Designs & Patents Act 1988

Obscene Publications Act 1959/1964.

 

Network Security

The school network is a valuable resource that is freely available to all students and staff from most computers situated throughout the school. Due to the wide variety of uses by well over a thousand users, a number of precautions have to be taken to help ensure that the system is kept available and in full working order:

Supervision

  • The use of the network should be supervised as closely as is reasonably possible during timetabled lessons. It should be realized however, that all users do have access to the network at other times and with very little supervision beyond the restrictions outlined below.
  • ICT staff can view a computer screen at any time from anywhere on the school network without the user knowing about it.
  • Normal classroom rules apply, and prohibitions such as eating, drinking, grooming and spraying aerosols are strictly reinforced due to the serious damage that may be caused to the equipment.

Network User Access

  • Access to the school network is available from any network station during the normal school day. Staff are responsible to ensure that the stations in their classrooms and work areas are turned off at the end of the day. Prior arrangements must be made for access during school vacations.
  • All users are required to log on with their own personal username, which will remain with them throughout their time at this school.
  • All users have their own password to allow them to log on, which should not be made available to anyone else.
  • Passwords are restricted to at least five characters.
  • The repeatedly incorrect entry of a password will result in the user being locked out until reset by an administrator.
  • Accounts not used within a full academic year will be deleted, including all work saved.
  • All network system and administration passwords are recorded and kept in a secure place.
  • Time spent on the network is continually audited for each user.

File Security

  • All users have their own area for storing their work on the network server hard disk (the "my work" folder). This means that they can access their work from any network station.
  • To reduce the chances of the server hard disk filling up and crashing the whole network, the amount of disk space for each user is limited to normally 5 MB. Overflowing this limit will cause the user to be locked out until sufficient files have been deleted or moved to a floppy disk.
  • Users do not have access to station and network drives nor are they able to alter or save files outside their own area (except in the authorized shared topic areas).
  • Precautions are taken to reduce the chances of infection by computer viruses via the Internet, email, or floppy disk.
  • The antivirus software, which is installed on all school network stations and servers, is updated daily.
  • An automatic daily search is made for any executable program and zip files stored in user areas. These are automatically logged against the user then deleted.
  • The system performs an automatic backup of each server hard disk to tape every night. A different tape is used for each night and then reused the following week. Occasional backup tapes taken at key points (end-of-term, pre-upgrades, etc) are kept in the school safe for longer periods of time before reuse.
  • students should also be encouraged to perform backups of their own files on their own floppy disks.
  • Station backups are not required. A faulty station can be quickly rebuilt with all the necessary software via files stored centrally on the server.
  • The network servers are located within an office within a computer room. This office is kept locked when not under direct supervision.

Software Inventory

  • An inventory should be maintained containing a record for each item of software that is available for use on the network and the number of licences held.
  • Licences and invoices must be sent to the ICT department for filing in case proof of ownership is required.

Access to Software

  • All users receive desktop icons and start-menu-shortcuts to all the main application programs and common utilities.
  • Users are guided onto the network via "topics" set up for each of the curriculum subjects and chosen at log on. This provides shortcuts/icons to programs that are relevant to the study of that subject as well as any shared documents provided by the subject teachers. students have read-only access to these shared documents but may copy them for their own use.
  • Users can only access software and other resources as made available to them through these "topics". For example, students do not have access to the Staff topic. Access to certain resources such as Internet software may also be removed for certain network users, where found to be necessary.
  • Use of the main software packages is continually audited for each user.
  • Sites visited on the Internet are also audited, and filtered - see our Internet Security Policy.

Access to Printers

  • To encourage good management and reduce wastage of ink and paper, the number of pages for each user is currently limited to 6-10 sheets and is reinstated each week.
  • Attempts to print beyond this credit limit are automatically denied by the system.
  • students may ask for more credits on production of the evidence or wait until the following week.
  • Use of printer credits is continually audited for each user and for each printer on the network.
  • Each main ICT suite has access to one laser printer.
  • Most ICT suites contain one workstation that has a colour printer connected to it. This is for special printouts only, and users should ask for permission before using it.
  • Laser printed pages are worth one printer credit, colour pages are worth 10 printer credits.

Hardware Security

  • An inventory must be maintained of all equipment together with make, model, serial number, date of purchase and location.
  • Items between 1 and approximately 5 years old and having significant value are registered on a service contract to insure against major repairs.
  • Rooms with computers must be locked overnight. Computers in the more vulnerable areas are permanently bolted to the desks.
  • Keys to computer rooms must be recorded and monitored.
  • All external visitors are required to report to the office and wear identification at all times.
  • All computer rooms and corridors are monitored by the school alarm system after school hours.
  • All major items are security marked to identify them as the property of the school.
  • Mouse balls may be sealed permanently to prevent tampering. Mice and headphones are security tagged to the computer in order to discourage their removal.

Electrical Safety

  • All equipment attached to the main electrical supply is safety tested annually.
  • A fully isolated mains switch is provided in all main computer rooms and staff should ensure that they know where it is.
  • The servers operate from an Uninterruptable Power Supply (UPS) to protect against power surges and blackouts.

Fire Protection Measures

  • Waste material should be frequently removed from the computer areas.
  • A carbon dioxide (CO2) fire extinguisher is required in all main computer rooms and staff should ensure that they know where it is and how to use it.

Adapted from IT Security & Privacy Guidelines for Users, Oxfordshire County Council © 1997