
1 minute read
Remote Access Policy
REPORTING SECURITY PROBLEMS
If sensitive organizational information is lost, disclosed to unauthorized parties, or suspected of being lost or disclosed to unauthorized parties, the Executive Director must be notified immediately. If any unauthorized use of our information systems has taken place, or is suspected of taking place, a member of the School Leadership Team must likewise be notified immediately. Similarly, whenever passwords or other system access control mechanisms are lost, stolen, or disclosed, or are suspected of being lost, stolen, or disclosed, a member of the School Leadership Team must be notified immediately.
Advertisement
Because it may indicate a computer virus infection or similar security problem, all unusual systems behavior, such as missing files, frequent system crashes, misrouted messages, and the like must also be immediately reported. The specifics of security problems should not be discussed widely but should instead be shared on a need-to-know basis.
REMOTE ACCESS POLICY
EQUIPMENT AND TOOLS
The organization may provide tools and equipment for remotely accessing the computer network. This may include computer hardware, software, phone lines, email, voicemail, connectivity to host applications and other applicable equipment as deemed necessary.
The use of equipment and software provided for remotely accessing the computer network is limited to authorized persons and for purposes relating to school business. The organization will provide for repairs to organizational equipment. When the staff member uses their own equipment, the staff members are responsible for maintenance and repair of equipment.
USE OF PERSONAL COMPUTERS AND EQUIPMENT
If a staff member uses their own personal device rather than the school provided device, the organization will bear no responsibility if the installation or use of any necessary software causes system lockups, crashes, or complete or partial data loss. The staff member is solely responsible for backing up data on their personal machine before beginning any work. At its discretion, the organization will disallow remote access for any staff member using a personal home computer that proves incapable, for any reason, of working correctly with the ORCA-provided software, or being used in a production environment.