2,234
edits
(Created page with "{{abox | name = Follow Riverdale Country School's Acceptable Use Policy (AUP)? | summary = Electronic Information Systems Acceptable Use Policy at Riverdale C...") Â |
No edit summary |
||
(2 intermediate revisions by the same user not shown) | |||
Line 5: | Line 5: | ||
 | for_students = y |  | for_students = y | ||
 | for_parents =  |  | for_parents =  | ||
 | cat1     = RCS |  | cat1     = RCS Software and Services | ||
 | cat2     = |  | cat2     = | ||
 | maintained  = MR |  | maintained  = MR | ||
 | year     = |  | year     = 2021-2022}} | ||
Like all businesses and educational institutions, Riverdale Country School (the âSchoolâ) must monitor the use of the Schoolâs information systems to ensure compliance with institutional policies, protect the security and maintain the efficiency of its systems, and discourage inappropriate use. All students, employees, and other authorized users (âUsersâ) must use the School's information technology resources (âIT Resourcesâ) in ethical and acceptable ways to ensure that all members of the School community have access to reliable, robust IT Resources that are safe from unauthorized or malicious use. At any time, and for any lawful purpose, the School may monitor, intercept and search any communication or data transmitted or stored on the IT Resources, including any personal information. | Like all businesses and educational institutions, Riverdale Country School (the âSchoolâ) must monitor the use of the Schoolâs information systems to ensure compliance with institutional policies, protect the security and maintain the efficiency of its systems, and discourage inappropriate use. All students, employees, and other authorized users (âUsersâ) must use the School's information technology resources (âIT Resourcesâ) in ethical and acceptable ways to ensure that all members of the School community have access to reliable, robust IT Resources that are safe from unauthorized or malicious use. At any time, and for any lawful purpose, the School may monitor, intercept and search any communication or data transmitted or stored on the IT Resources, including any personal information. |
edits