ICT Access Poilcy

 

Rationale

This policy establishes principles and procedures for the effective use and safe management of Wyndham College’s Information Communication Technology (ICT) services.

This policy is to be considered in conjunction with the policies and memoranda of DEC

Rules For Acceptable Use
Use of ICT services must be in support of responsible educational and research purposes and be consistent with the College curriculum objectives. Inappropriate use will subject a student to College disciplinary action, which may include short or long term periods of probation, suspension or termination of independent access to technology.

The following acts are specifically prohibited:

  1. Illegal Activities
    1. Sending or displaying offensive messages or pictures, or accessing, uploading, downloading or distributing pornographic, obscene or sexually explicit material;
    2. Violating copyright laws (including copying and transmitting documents, software, music and/or video files without license; and plagiarising the work of others found on the  Internet or Intranet);
    3. Accessing, downloading or transmitting any material in violation of any law of the Commonwealth of Australia or the State of New South Wales; or distributing material protected by state or federal laws;
    4. Hacking or attempting to gain unauthorised access to the files or network services of any organisation or individual;
  2. Inappropriate Language & Harassment (in any electronic communication – including email, chat or web pages)
    1. Using vulgar or obscene language in any electronic communication;
    2. Harassing, insulting, defaming, or attacking others;
    3. “Spamming” other users by sending unsolicited junk email;
  3. Endangering Personal Safety
    1. Revealing your own or someone else’s personal contact information (full name, home address, telephone number, photographs etc.) to other individuals over the Internet;
    2. Arranging to meet people contacted over the Internet without parental approval;
  4. Breaching System Security
    1. Intentionally spreading viruses, worms, chain letters, or trojans;
    2. Vandalising any computers or peripheral equipment, computer systems or computer networks;
    3. Altering, moving or deleting the files belonging to others;
    4. Using another user's password, or providing your password to another person;
    5. Gaining unauthorised access to the network, including use of the network on someone else’s login;
    6. Accessing unauthorised chat lines;
    7. Using storage media on the College network that have not been checked for viruses;
    8. Installing software on a College computer without permission from the system administrator;
  5. Invading Privacy
    1. Trespassing in another user's folders, work or files;
    2. Reposting a message that was sent to you privately, without permission of the original sender;
  6. Misuse of Resources
    1. Employing the network for commercial purposes or political lobbying;
    2. Use of email accounts for other than educational purposes during class time;

Additionally, you must not submit assignments electronically in emails or as attachments, unless specifically requested to do so by your teacher. You may lodge assignments electronically only where requested in writing.

The College community makes no warranties of any kind, either express or implied, concerning the ICT services it provides. The College or its agents will not be responsible for any losses which an individual user may suffer, including but not limited to, loss of data, non-deliveries, misdeliveries or service interruptions, regardless of the cause. The College denies any responsibility for the accuracy or quality of information obtained through its services. Further, the College cannot guarantee that persons will not make improper and/or inappropriate use of such communications access, but upon discovery will apply the appropriate sanctions.

right click to download the Information Communication Technology Access Policy as a PDF or Word document