Jump to content

Follow Riverdale Country School's Acceptable Use Policy (AUP): Difference between revisions

no edit summary
(Created page with "{{abox | name = Follow Riverdale Country School's Acceptable Use Policy (AUP)? | summary = Electronic Information Systems Acceptable Use Policy at Riverdale C...")
 
No edit summary
(2 intermediate revisions by the same user not shown)
Line 5: Line 5:
  | for_students  = y
  | for_students  = y
  | for_parents  =  
  | for_parents  =  
  | cat1          = RCS software and services
  | cat1          = RCS Software and Services
  | cat2          =
  | cat2          =
  | maintained    = MR
  | maintained    = MR
  | year          = 2018-2019}}
  | year          = 2021-2022}}


Like all businesses and educational institutions, Riverdale Country School (the “School”) must monitor the use of the School’s information systems to ensure compliance with institutional policies, protect the security and maintain the efficiency of its systems, and discourage inappropriate use. All students, employees, and other authorized users (“Users”) must use the School's information technology resources (“IT Resources”) in ethical and acceptable ways to ensure that all members of the School community have access to reliable, robust IT Resources that are safe from unauthorized or malicious use. At any time, and for any lawful purpose, the School may monitor, intercept and search any communication or data transmitted or stored on the IT Resources, including any personal information.
Like all businesses and educational institutions, Riverdale Country School (the “School”) must monitor the use of the School’s information systems to ensure compliance with institutional policies, protect the security and maintain the efficiency of its systems, and discourage inappropriate use. All students, employees, and other authorized users (“Users”) must use the School's information technology resources (“IT Resources”) in ethical and acceptable ways to ensure that all members of the School community have access to reliable, robust IT Resources that are safe from unauthorized or malicious use. At any time, and for any lawful purpose, the School may monitor, intercept and search any communication or data transmitted or stored on the IT Resources, including any personal information.
2,227

edits