IT Policy for Business Academy Aarhus

 college_students.jpg

Welcome to Århus Købmandsskole and Business Academy Aarhus ' it-systems

 

Use of the IT facilities
We expect you to use the  IT facilities in an appropriate and responsible manner, as damage to the facilities can be a nuisance both to yourself and to other users of the IT facilities. If you find the IT facilities to be defective in any way, please report this to the Servicedesk. You may not move computers or any other IT devices (mouse, keyboard etc.) without prior arrangement with the Servicedesk.

Programs
Because all programs installed on the School/Academy’s IT devices are subject to licence conditions, you arenot allowed to copy these. Only the IT department may install programs on the Academy’s computers. Consequently, to the extent this is possible, the computers will be “locked” so that only the IT department can make installations. The head of the IT department may grant exemptions to this. You are not allowed to install games or any other programs on your own. You may only use the programs that the IT department has installed. If you are unsure whether a program or data is illegal, please enquire with the Servicedesk.

You may only engage in Internet-based games and similar games that do not require the installation of a program or a change in the computer settings. Game activities may only take place after 15.00/3 PM (in order not to overload the network) or with special permission from a teacher. Finally, we should like to emphasise that video streaming from YouTube or similar websites severely impacts the capacity of the network and can lead to speed reductions for everybody. As a result, you should limit video streaming for the sake of the other users.

You are not allowed to download or store MP3 music, original programs, games, videos, hacker programs or similar to the School/Academy’s IT equipment. The IT department regularly scans the user data areas for any illegal files.

Using the computer
Users may not make changes to the program and system settings of the computers. As a matter of routine, the IT department downloads and updates the programs on the computers, so that we ensure full functionality of the computers. All data on the computer hard disk drives will be deleted. If you wish to store your data, you must do so on your personal drive or on a USB drive. When you have finished working with the computer, you must log out and switch it off. There may be no documents or files of a threatening, offensive, pornographic, racist or obscene character stored on the computers/laptops.

Using the printers
You may not alter the printer configurations. You will typically make printouts using the printerlocated in the room, in the hallway or at the library. You may make printouts using other printers (in other classrooms) provided you have arranged this with a teacher or the Servicedesk. You can buy
extra printouts at the reception if you exceed your printing account, so please consider carefully whatyou print. 

Data
A user’s programs and data are considered private property – similar to personal papers. You can only read or copy a user’s programs and/or data from IT facilities and networks with the owner’s permission. Regular safety copies are taken of all data stored on the server. We do not make safety
copies of data on the computers’ hard drives. Therefore, please be sure to make a backup of data thatis not on the server.  

The user is responsible for keeping the user’s personal drive tidy and organised – for the sake of the School/Academy’s total computer capacity. This means you will have to delete all documents, databases, images etc. that you no longer have any use for. 

E- mail
You may not distribute jokes, image files etc. to a large number of recipients, for instance using distribution lists. Enquire with Servicedesk for permission if you would like to distribute to multiple recipients. Go to this website http://studsys.efif.dk if you would like your e-mail to be redirected to your own e-mail account. The website also allows you to enter your mobile phone number so that you can receive text notifications.

Communication with other IT systems
Communication between the School/Academy’s IT system and other IT systems may only take place via communication programs and communication lines installed on the School/Academy’s network by the IT department. When sending data (for instance e-mails and news) via networks, the sender must identify himself/herself. Sending general messages, greetings etc. to the screens of others is a nuisance and therefore not allowed. Attempting to break into the safety systems of the Academy or any other organisations is prohibited. It is considered theft if you acquire another person’s user rights or use another person’s IT resources.

Malicious damage and harassment of other users
You may not via the Academy’s network use programs that can cause another person’s machine to reboot, take control of other computers or similar actions.

Network
You may not connect devices to the Academy’s hardwired network. You may, however, connect your own laptop to the Academy’s wireless network. You log into the Academy’s wireless network and Fronter using the user ID and password you have been issued. Your laptop may not have any file
sharing programs installed, such as Limewire etc.; however, your laptop must have an antivirus program installed and the most recent Windows updates. 

Password
Access to multi-user systems is protected by user name and password. The password is strictly personal and for your use only. It identifies you as the user (to the system servers), so you may not transfer it or lend it to another person. Don’t ever give your password to others – you could then
easily become responsible for unpleasant e-mails written or sent by another person! Always log out or lock the screen whenever you leave the machine. Do not write down your password. If you do write it  down, keep it under lock and not in an electronic format. Also, you must make a cryptic access code that consists of small and capital letters and numbers plus special characters. And preferably a long access code, not fewer than 8 characters. Passwords must be changed every 12 months.

Virus
Viruses can destroy/delete your data, prevent the machine from logging onto the network etc. So, for your own sake, scan your USB keys for viruses with anti-virus software. If you are unsure of how to do  this, please contact the Servicedesk. If you suspect that a computer could be infected with a virus, please report this immediately to the Servicedesk.

Support and instructions
You are to report any defective IT facilities and any other IT issues you come across by sending an emailto: servicedesk@akademiaarhus.dk. You can also access http://servicedesk.akademiaarhus.dk, where  you can create cases and follow up on the cases you may already have created. In your communication with the Servicedesk please state your user ID, room number, machine number, if any, and the symptoms. You can find instructions on how to connect to the wireless network, the School/Academy' systems etc. at www.myservicedesk.dk. the Servicedesk will support you by responding to IT-related questions.

Personal websites
The website must clearly name the author of the site. You may not use the School/Academy’s logo onpersonal websites. Websites that are stored on the School/Academy’s server must live up to good standard  Internet ethics. This means that these websites must not contain images or any other items that could in any way appear offensive, pornographic, racist or of an obscene character.

Theft
You should note that keeping your computer safe is your responsibility. Do not leave your computer unattended. The Academy is not responsible for theft of computers from School/Academy premises. 

Changes to the regulations
All IT users have a duty to keep up-to-date with any changes to the regulations governing the use of IT. Any changes of the regulations will be published on myservicedesk.dk. 

Responsibility
These regulations apply to all students at Århus Købmandsskole and Business Academy Aarhus. If you do not comply with these regulations, you will be given a warning and you may be temporarily or permanently barred from access to the Academy’s IT systems. Very severe cases will be treated
according to the rules for disciplinary measures, which could result in expulsion from the Academy.

Extreme cases will be reported to the police.


Updated: 15. December 2016, 14:07