This Directive applies to persons who use the Ministry`s ICT resources, including, but not limited to: the objective of this Directive is to define a standard for the creation of strong passwords, the protection of such passwords and the frequency of changes. Secure-24 will not intentionally monitor the content of private email messages sent or received by its subscribers, unless required by law or government authorities, public safety is at stake, or the customer requires it. Automated monitoring of e-mails by security tools for virus scanners, blocking of spam and other security measures, including recording of message traffic and monitoring of communication with known or suspected `botnets`, or other suspicious sites, domains or IP addresses, is subject to a derogation from this Directive. Secure-24 can also monitor its service electronically to determine if its facilities are functioning satisfactorily. The scope of this Directive covers any staff member who has an account (or any form of access that supports or requires a password) on a system located in a [name of the organisation] which has access to the network [name of the organisation] or which does not retain [name of organisation]. Generally speaking, AUP statements/documents often begin with an explanation of the philosophy of the sponsored organization and why the use of the Internet is offered to users of that organization`s network. For example, the carrier organization follows a philosophy of self-regulation and offers the user a connection to the local network as well as a connection to the Internet, provided that the user agrees that he is personally responsible for the actions carried out when connecting to the network or the Internet. This may mean that the organisation will not provide an alert system if the user violates the directive and claims that it is up to the user to know when their actions are contrary to the directive. Often, acceptable use policy documents contain a statement about the use of the network and/or the Internet and its use and benefits to the company, school or other organization sponsoring the Connection to the Internet. Unacceptable behavior may include the creation and transmission of offensive, obscene or indecent materials or images, the creation and transfer of material intended to cause nuisance, inconvenience or fear, the production of defamatory material, the creation and transmission that infringes another person`s copyright, the transfer of unwanted commercial or advertising material and intentional unauthorized access to other services accessible through the network/Internet connection. Then there is the type of activity that the network uses to waste time of technical staff to solve a problem for which the user is the cause of damaging or destroying the data of other users, violating the privacy of others online, using the network to deny service to others, continue to use software or other system whose use the user has already been warned about, and any other abuse of the network such as the introduction of viruses. Schools are responsible for writing their own guidelines on the acceptable use of students.
Templates and instructions for working with students can be found at Bullystoppers: Agreement for Acceptable Use by Students.