15 May 2022

52

Safe Ethical Online Behaviour Policy

Format: APA

Academic level: High School

Paper type: Research Paper

Words: 2552

Pages: 9

Downloads: 0

Introduction

It is unimaginable to perceive a world or a future where the world wide web plays less of a role in our lives and the society than it does today (Khor et al., 2015) . We must acknowledge the importance and positive impacts that the world wide web has on societies across the globe. Information and communication technology has made it possible for people to get connected regardless of their location and time in an instant; enterprises have access to markets far much greater than what world civilizations could achieve through traditional means and at far much less cost , and students have access to resources and a wealth of information at their disposal (Khor et al., 2015) . In terms of speed and innovation, the internet operates in a very dynamic environment. Due to this, it has become challenging for educational institutions to be ahead of the curve when it comes to responding to the issues of online safety challenges. 

Nashua State University College E-Safety Protocol: Policy Statement

The purpose of the Nashua State University College E-Safety protocols is to : (a) prevent unauthorized access of end-users' over its computer networks or the transmission of inappropriate information through electronic mail, the internet or any other forms of electronic communication; (b) prevent the unlawful or unsanctioned access of online activities; (c) prevent the unauthorized exposé or distribution of any personally identifiable information of children and adults with the same regard, and (d) conform with the CIPA (Children's Internet Protection Act) guidelines (Huffman et al., 2019) . These protocols apply to all members of Nashua State University College (including students, staff, visitors, parents and third parties) that are users and have access to the institutions' information systems, both in and out of the facility (Huffman et al., 2019) . The Education and Inspections Act of 2006 authorizes the institution to the extent that is appropriate to govern the behavior of students when they are outside the confines of the University and empowers educators to enforce disciplinary measure for unsuitable behavior (Huffman et al., 2019)

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

[Adoption Date: July 1, 2020]

Features of Safe Online and Ethical Behavior for Nashua State University College

Nashua State University College E-Safety Guidelines:

To protect the safety and privacy of students, staff, third-parties and parents from the disclosure of any personal information such as addresses, passwords, usernames or social security numbers (Huffman et al., 2019) . Students must also not disclose any materials that may lead to the disclosure of their identity and that of the school. 

Students must be considerate and should use the suitable language when addressing others through online media platforms (Huffman et al., 2019) . Students are not allowed to give other students a hard time or attack them as well as use any expressions or be party to discrimination, racism, hate or bias. 

Students are not authorized to see, dispatch, exhibit or use sexually explicit, foul language or derogatory materials (Huffman et al., 2019)

Students must not use the information and communication technologies offered by the University for sending, receiving, viewing or downloading obscene or inappropriate materials via the internet (Huffman et al., 2019) .

Any incidents of cyberbullying such as personal threats and attacks to others, to the University's property, and you must be reported. All copies of the threatening messages or content must be submitted to the school administration and or law enforcement agencies (Huffman et al., 2019)

Students are advised to report any offensive or pornographic particulars on or accessible from the information systems owned by the University (Khor et al., 2015)

Any filtering software programs that are used by Nashua University State College are not to be disabled by any means (Khor et al., 2015)

Digital information technologies are vital tools that have opened up new opportunities for everyone. As such, products of information and communication technologies help both teachers and students learn from each other as well as stimulate awareness of context, discussions and promote creativity and effective learning (Khor et al., 2015) . Nashua State University College ensures that young people and students have access and can use the internet and related communication technologies safely and appropriately as part of the broader duty of care that schools are bound. 

Nashua State University College E-Safety Protocols

Access to Inappropriate Materials 

Nashua State University College acknowledges that students may come across content that can be categorized as non-education and inappropriate. The institution has deployed real-time filtering monitoring software on all computer systems that are used by students across the University regardless of their age (Information Resources Management Association, 2019). The filtering software has a built-in database for all objectionable, inappropriate, and pornographic sites that are flagged as inaccessible once a student tries to access them. Each student has an RFID card with a username and password that automatically logs them into the University’s information system, and each session is monitored for any inappropriate activities (Information Resources Management Association, 2019). The filtering database of improper websites is updated frequently throughout the year. However, there chances that a new hate site may appear that has not been picked up by the software. For that reason, librarians, teachers, IT staff are always monitoring and supervising the use of the internet by the students (Information Resources Management Association, 2019). Subject to supervision by the Director of IT, the protection measure may be disabled minimally for adults or sometimes in the case of students only for legitimate and lawful research purposes. 

Inappropriate and Unauthorized Network Usage 

The University has taken practical (physical, logical, and practical) steps to encourage the safety and security of all users of information systems as well as other direct forms of digital communication (Information Resources Management Association, 2019). Without limiting the aforementioned, access to information and communication technologies is strictly limited by the University’s Acceptable Use Policies. The usage and access to computer information systems and networks owned and operated by the Nashua State University College is a privilege that imposes explicitly defined obligations and responsibilities that are subject to the University’s policies, as well as local, state, and federal laws (Information Resources Management Association, 2019). The principles and guidelines outlined in the Acceptable Use Policy document are to ensure the availability, reliability, security, and a responsive critical infrastructure environment at the Nashua State University College. Therefore, it is the responsibility of all users to ensure that the information technology systems provided by the University are used appropriately. The IT department is responsible for maintaining the security controls on all university-issued computer equipment that connects to the University’s network, including but are not limited to up-to-date system patches, up-to-date antivirus programs, encryption for all devices that may contain confidential information and screen save passwords (Information Resources Management Association, 2019). All faculty, staff, and students are to note that confidential data may not be stored on any auxiliary storage devices or desktop computers. All information systems owned and operated by the University will be configured in this manner. 

Education, Monitoring, and Supervision

It is the obligation of all the faculty and information technology staff to educate, monitor and supervise the appropriate use of all critical information systems and infrastructure as well as access to the internet per the principles outlined in this policy, Protecting the Children in the 21st Century Act, the Neighborhood Children’s Internet Protection Act, and the Children’s Internet Protection Act (Oecd, 2019)

It is the University’s responsibility to ensure that all managed information and communication technologies provided by third parties include all the online and security measures that, in other respects, would be the responsibility of the University (Oecd, 2019) . All the University’s managed care service providers are thoroughly informed on the Nashua State University College Online Safety and Acceptable Use Agreements. 

The University shall be held liable for ensuring that the network and infrastructure used by all students, faculty, and stakeholders are safe and secure as possible, and the procedures and regulations outlined in this document are implemented fully. (Oecd, 2019) The University is also responsible for ensuring that the people named in the below sections of this document are effective and competent in carrying out their security and safety responsibilities. 

Online and Safety Duties of Nashua State University College 

All the University’s information and communication systems will be managed in ways that guarantee that the institution meets the recommended technical safety and security requirements (Oecd, 2019)

The University shall perform regular system audits of the safety and security controls deployed and implemented on the University’s information systems. 

All users, regardless of their designation, will have clearly defined responsibilities and access rights to computer information systems owned and operated by the University (Oecd, 2019)

All information system users will be assigned a username and password, and it is their sole responsibility to keep them safe. When deemed necessary, all users will be required to change their passwords based on the standards defined in the Password Policy document. 

The Director of IT and the Network Administrator have the responsibility of ensuring that all software licenses, systems update, and patching, operating system hardening are performed on all information systems, and the number of installations matches that of the devices owned and operated by the University (Oecd, 2019)

Internet access is filtered to all users of the information systems owned and operated by the University. All content lists are frequently updated, and internet use is actively logged and monitored. 

The internet filtering mechanisms employed by the University are to ensure that students and minors are safe from any form of terrorism and extremist materials when accessing the internet, which is governed by the Counter-Terrorism and Securities Act of 2015 that the institution conforms to (Oecd, 2019)

The University has put in place the appropriate measures that are required to protect work stations, mobile devices, servers, routers, and wireless access systems from any accidental or malicious attempts that may compromise the security of the Universities information systems and data. 

Mobile Device Technologies Including Bring Your Own Device (BYOD)

All mobile devices and laptops that are owned by the University have the capability of utilizing the school’s wireless network. Individually owned devices have to be approved to use the University’s wireless access systems through approved protocols and proxy servers. Access to the University’s internet may include access to all learning platforms (library, e-learning, and any other subscribed services) as well as cloud-based services such as Office 365, and data storage services (Esliger, 2017) . All users of information technology must understand that the primary purpose of the use of personal mobile devices at school is for educational purposes only. The use of mobile devices and other personal devices must be consistent with the defined rules in the Mobile Device Technologies Acceptable Use Policy as well as other policies such as Bullying Policy, policies surrounding the theft and malicious damage, and the Behavior Policy. 

Inappropriate Activities 

Internet activities such as accessing pornographic or child abuse materials or the distribution of racist and discriminatory materials is not prohibited from the University and or its information systems. The involvement in such activities could lead to criminal prosecution (Esliger, 2017) . However, the University acknowledges that there are activities that may be deemed legal but inappropriate in educational context base on the age of the users or the nature of the activities. 

The University hopes and intents that all users of information systems will be responsible users of the deployed digital technologies understand and observe University’s policy. However, there are times when policy infringements may occur through careless, deliberate, or irresponsible misuse (Esliger, 2017) . In such incidences, the University will investigate and the necessary legal or appropriate actions. 

Literature Review

Today, families and educational institutions have embraced the positive aspects of creativity and collaboration that have been brought about through technological advancements (Esliger, 2017) . According to a recent study, more than eighty percent of parents recognized technology as an effective learning tool that can spur children towards highly profitable careers, thus successful lives. Local, state, and federal governments have provided increased support for upgraded access to learning devices, enhanced connectivity, and increased support for teachers, which shows that there is increased acceptance of the use of technology in schools (Esliger, 2017) . However, as the use of information and communication technologies continues to increase, all stakeholders are uncertain if students have the knowledge on how to use these tools responsibly, safely, and ethically. Besides, many parents, as well as other stakeholders, are not updated with changing technological advancements, and neither are they prepared to educate children on the safety and ethics of using digital communication (Huffman et al., 2019) . With the growing presence of internet crimes such as cyberbullying, sexual harassment, and victimization, it has become evident that parents and teachers need to be aware of and understand the concepts of internet safety as well as collaborate to keep the children safe. 

The explosion of digital technologies has created numerous positive changes in global societies; however, these tools have created new ways in which people can be harmed (Huffman et al., 2019) . Irresponsible and unethical uses of information and communication technologies have led to internet crimes such as cyberbullying, child pornography, and victimization (Huffman et al., 2019) . Young people and children are vulnerable and may expose themselves knowingly and unknowingly while using the internet and other digital technologies. Some of the activities outlined above may be inevitable outside the school's boundaries, but they will be brought back inside the school and can be dealt with accordingly (Oecd, 2019) . Higher education institutions have the responsibility to deploy technologies and systems that restrict inappropriate access to digital technologies. However, they must bear in mind that students will also bring sophisticated devices to school, thus giving them unparalleled access to potentially unsuitable materials (Oecd, 2019) . The local, state and federal governments recommend that learning institutions must put in place an Acceptable Use Policy in place that are aimed at protecting the students, staff, and stakeholders, as well as other school policies such as pupil discipline policy, child protection policies, and home-school agreements. 

Based on the above, educational institutions have the responsibility and mandate to impart their students with critical thinking skills and the appropriate behaviors to enable them to maintain safe and legal online identities when they are using digital technologies (Oecd, 2019) . However, higher education institutions' attention towards internet safety is not enough. There needs to be partnerships between the local and state governments, parents, and community members. Although it is essential to understand whether students and minors understand the ethical use of digital technologies and their implications, it is also vital to understand the roles that adults play when they place such tools at the disposal of young children. According to the Pew Research Center, risky online behaviors have been linked to poor family dynamics and either more or tool little restrictions that parents place on technological devices (Oecd, 2019) . When dealing with internet safety, higher learning institutions are not in a position to develop and sustain best practices alone. These institutions must work with parents, the government, and communities in the creation of digital technologies safety policies, action plans, and rules. There is a broader need to create avenues for dialogue between educators and parents around the ideas of assessing schools' and communities' values and priorities through the creation of an all-inclusive internet safety action plans that will protect children from the growing list of digital communications safety issues. 

Nashua State University College Sustainability Plan

Digital information and related technologies have a profound impact on Nashua State University College, from learning and business processes to the budget and best practices in environmental sustainability (Rahman, 2016) . The notion of sustainable computing is considered when the total impact, the total benefit of deployed technology systems, and the total cost of ownership. Nashua State University College considers the following:

All inventories (workstations and servers) that have associated costs, including software licensing, staff time, and infrastructure support (Rahman, 2016) .

Old inventory buildup that comes with associated risks such as increased maintenance costs, inefficient operations, increased repair time, and security risks (Rahman, 2016)

All computer growth, regardless of whether the equipment is new or old that require future planning and replacements of both the computers and infrastructure supporting them as well as environmentally sustainable ways for disposing of old equipment (Rahman, 2016)

The University practices a sustainable policy in which:

It plans for disposal, recycling, and future donation of computer equipment. 

It directs the acquisition of new equipment.

It limits the growth of inventory.

It maintains a reasonable lifecycle for computer information systems, network equipment, and peripherals. 

Inventory Growth and Lifecycle Replacement 

The University shall maintain a five-year Lifecycle for all owned computers and peripherals, ensuring that each computer is replaced with a system every three to five years (Khor et al., 2015)

Due to the increasing cost of servicing old computers, all new computer systems and peripherals must replace an existing system (Khor et al., 2015) . All departments at the University must relinquish control of old computer systems and peripherals. 

University departments that are computer systems to run instruments or lab equipment are exempt from the five-year rule policy. All computer equipment being used must maintain the warranty imposed by the manufacturer (Khor et al., 2015)

References

Esliger, J. (2017). Creating a safe, caring and inclusive school environment through a code of conduct that is educative, preventative and restorative in practice and response. The Organizational Improvement Plan at Western university . Retrieved 18 June 2020, from https://pdfs.semanticscholar.org/fce5/4647165355369413bed4086e6363933e2b9b.pdf

Huffman, S., Loyless, S., & Albritton, S. (2019). Leveraging Technology to Improve School Safety and Student Wellbeing . IGI Global.

Khor, K., Thurasamy, R., Ahmad, N., Halim, H., & May-Chiun, L. (2015). Bridging the Gap of Green IT/IS and Sustainable Consumption. Global Business Review , 16 (4), 571-593. https://doi.org/10.1177/0972150915581101

Information Resources Management Association. (2019). Developing Safer Online Environments for Children: Tools and Policies for Combatting Cyber Aggression (1st ed.). IGI Global.

Oecd. (2019). Educational Research and Innovation Educating 21st Century Children Emotional Well-Being in the Digital Age . Organization for Economic Cooperation & Development.

Rahman, N. (2016). Toward Achieving Environmental Sustainability in the Computer Industry. International Journal of Green Computing , 7 (1), 37-54. https://doi.org/10.4018/ijgc.2016010103

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Safe Ethical Online Behaviour Policy.
https://studybounty.com/safe-ethical-online-behaviour-policy-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Education

Personal Statement for College

Growing up in the inner city especially as a first-generation African-American is very challenging mainly because of poverty that makes every aspect of life difficult. These are neighborhoods with poor services and...

Words: 926

Pages: 3

Views: 115

17 Sep 2023
Education

Phonics and Phonemic Awareness Lesson Plan for Kindergarten

The objective of this lesson plan is to teach students how to add or interchange individual sounds within one syllable words. The will the students to learn new words and new pronunciations. The use of CVC word...

Words: 329

Pages: 1

Views: 223

17 Sep 2023
Education

Similarities and Differences of Educational Theories

As a philosophy of education, idealism is based on the notion that reality should only be inferred from ideas. People should strive to conceive ideas as the only source of world reality. They must apply conscious...

Words: 1304

Pages: 5

Views: 89

17 Sep 2023
Education

How to Overcome Financial Challenges in Research

Running a school and improving the way it operates requires the availability of resources, prime of which is money. The financing of school budgets in the US varies between school districts and states. The...

Words: 3007

Pages: 10

Views: 57

17 Sep 2023
Education

Suggestopedia Learning Method Analysis

The video is an explanation of the suggestopedia, and this is a learning method that’s used in classrooms, particularly in those ones in which students are taking English as their second language. This method is...

Words: 926

Pages: 3

Views: 62

17 Sep 2023
Education

Behaviorist versus Humanist Philosophical Orientation

Purpose of the philosophical orientation Psychologists and other researchers have for the longest time tried to unearth the behavioral orientations of individuals by integrating numerous approaches. One of the most...

Words: 2558

Pages: 9

Views: 134

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration