top of page

Digital Rights & Responsibilities

Acceptable Use Policy – IIE

 

Rights:

Access and privileges on the IIE computing systems are managed by the IT officers and qualified individuals may be given authorisation to access and use them. Students may not under any circumstances transfer their privileges to other individuals. The authorised user is responsible for the proper use of the system, including any password protection.

The computer systems in were created for educational purposes. This means classroom activities, career development, project work and research.

 

The students may not utilise the system for commercial and personal use.

 

This AUP will be revised from time to time as deemed necessary by the IIE. A copy will be accessible for new students and lecturers.

 

Responsibilities:

Students are responsible for maintaining the following:

  1. An environment in which all college computer resources are shared equitably between users.

 

An environment favourable to learning :

  • A user who brings food or drink into the computer rooms will be asked to leave and privileges may be removed

  • Disturbing conduct will not be tolerated in any form. If any arises, the user responsible will be asked to close down their terminal.

  • A user who harasses or make defamatory remarks shall bear full responsibility for his or her actions

  • The user agrees to comply with the acceptable use guidelines for whichever outside networks or services they may access through the institute systems

  • The user agrees that in the unlikely event that someone does conveys a message that is inconsistent with an environment favourable to learning or with a distorted origination, the person liable will be responsible for the message.

 

An environment free of illegal or malicious acts:

  • The user agrees never to use a system the system to perform illegal or malicious act.

  • The user will not download files without permission

 

A secure environment

  • When not in use, the doors to the computer rooms must be kept locked

  • Any user who finds a possible security lapse, or technical difficulty, on any system is obliged to report it to the IT department.

  • Users are responsible to back-up their own data.

 

All users must become familiar with logging off the system and must do so at the end of every session.

Sample Acceptable Use Policies. [Online] available at. http://www.webwise.ie/teachers/sample-acceptable-use-policies-2/ [Accessed 2 December 2015].

bottom of page