Computer Policy


Jul 11, 2011 - ...

3 downloads 122 Views 161KB Size

Computer Policy The privilege of using IFSS’s computing facilities is accompanied by the responsibility of exercising high standards of honesty and considerate behaviour. In particular, students are expected to use the computing facilities only for their academic work, to show consideration to others, to refrain from providing access to unauthorised users, to respect the privacy of all other users, and to obey all relevant laws. IFSS reserves the right to withdraw services from all students if services are generally misused, and to deny access to services, and to take other disciplinary action against individual students who misuse computing facilities. IFSS is a professional film school embedded in real-world professional practice. The aim is to educate future filmmakers as working professionals with a strong sense of ‘professionalism’ in their approach to the work they undertake. In this regard, the responsibility for the safe digital storage and transport of student created projects rests entirely on the individual student responsible for the work. All students must possess a personal external hard drive of at least 500gb capacity (preferably 1000gb) - A 500gb drive can hold approx 40hours of DV or HDV footage. Such a drive should have a 7200rpm disc speed and have both USB2 and Firewire 400 interface connections. This drive will be used for all student work. 1.

School Specific rules • No student work, projects, documents or data is to be stored locally on school computers. All student work should be stored on the students’ own portable hard drive or USB memory device. • Remove projects off computers when projects have been completed and assessment results have been received. • Students must not send or receive personal emails, use Instant Messenger, Smart chat, YouTube, MySpace or any other recreational computer use between 9:30am and 12:30pm, and 1:30pm and 4:30pm.

2. Guidelines for Acceptable Use The main principles defining "acceptable use" are • to use computing facilities only for the academic purpose for which they are provided, • to show consideration to other users, • to refrain from providing access to unauthorised users, • to respect the privacy of all other users, and • to obey all relevant guidelines. You may use the facilities available in any of the computer rooms, if the rooms are not being used for a class, and if you are not unreasonably depriving other students of access. Do not occupy a terminal for excessive periods if other people are waiting.

Owner: Head of School

Policy: Computer

Version: 2

Approved: General Manager Date of approval: 11 July 2011



If you have an account on a computing system, you are responsible for the use of that account. You must not allow other users to use your account. If you observe a person using someone else's account, you should inform a member of staff. Passwords are the most important aspect of systems security. These are the important points to remember about choosing a password: • Choose a password that is easy to remember but hard to guess. • Never write down your password. • Never tell your password to another person. • Never let another person see you enter your password. Generally, all users share responsibility for the integrity and security of the computer system they use. If you observe any breach of system or network security, you should immediately inform a member of staff. 3. Unacceptable Use Activities which obviously violate the above principles of acceptable use are unacceptable. Disciplinary action may be taken against students found to be using computing facilities in an unacceptable manner. The following examples illustrate different forms of unacceptable behaviour. Generally. It is considered unacceptable to: • Use the facilities for any purpose other than those prescribed or explicitly permitted by IFSS. • Use the computing systems for the conduct of a business or any other commercial purposes. • Fail to obey any reasonable instruction from an IFSS staff member or guest lecturer. • Allow access to your account by another person, for example by telling another person your password. • Intentionally access or attempt to access another user's account, programs or data files with or without their explicit permission (except for group projects where a prior arrangement has been made for a number of students to collaborate on a project). • Use the computer systems for any form of cheating or plagiarism. • Attempt to gain unauthorised access to any computer system. • Attempt to circumvent any hardware and/or software protection, or prescribed resource limits. • Use computing and communication services (e.g. email) to propagate abuse or any other material that contravenes the Discrimination Laws or Harassment Laws (or is otherwise insulting, rude, abusive or offensive). • Send email messages to all members of a mail group without permission of IFSS. • Send forged email messages. • Have any publicly accessible files in your account that contain abuse or any other material that contravenes the Discrimination Laws or Harassment Laws (or is otherwise insulting, rude, abusive or offensive). • Disrupt the available services by performing any action that denies access of other users to the computing resources or adversely affects their use of the facilities. This includes: running, eating, drinking, talking loudly, or playing music in a computing laboratory (use headphones instead. Owner: Head of School

Policy: Computer

Version: 2

Approved: General Manager Date of approval: 11 July 2011



• Locking terminals (for long periods), holding up the printer queues; fetching and storing large files. • Perform any action that is in breach of the Copyright Act, in particular downloading, copying or donating copyrighted software. • Download or store any commercial, shareware or freeware software not related to your academic work, without prior approval from IFSS. • Install and/or use any executable program, other than those created during the program of your own academic work, without prior approval from IFSS. • Wilfully or through negligence damage or alter the arrangement of IFSS's computing hardware and/or software. This includes connecting laptops or any other device to computers or networks. • Attempt to interfere with supervisory or accounting activities of IFSS's computer systems or obtain systems privileges to which you are not entitled. Any such attempt is considered a serious transgression. • Encrypt any information in your files for any purpose other than those prescribed or explicitly permitted by IFSS. 4. Dealing with Violations If your actions are found to be in violation of the principles of acceptable use and are deemed unacceptable, the following actions will be taken: • Your access to the computing facilities will be suspended immediately; and your account on the central systems will be suspended. • You will be required to appear before appropriate IFSS staff members who will determine what disciplinary action needs to be taken. 5.

Legal Implications

You should be aware that unauthorised access to computer systems and materials stored on such systems is a criminal offence under Federal Law. You may wish to refer to the Crimes Act 1914 - Part VI A, Sections 76A through to 76E. Any action that constitutes a breach of the Copyright Act will have legal implications for IFSS as well as the individual taking the action. IFSS is cooperating with law enforcement authorities in order to ensure the security and the integrity of IFSS's networks and computer systems therein.

Owner: Head of School

Policy: Computer

Version: 2

Approved: General Manager Date of approval: 11 July 2011