Introduction
In
Education recognizes that education is much more than the mere collection and
distribution of knowledge. It embraces the ideals of intellectual hospitality,
fostering an environment that encourages innovation, creativity, and the power
of thought and imagination. This policy seeks to foster the holistic
development of individuals by nurturing their character and instilling in them
a steadfastness of mind and a fervent desire to contribute their best to
society. Education, under this policy, is regarded as a means to unlock the
moral and spiritual potentialities inherent in every individual.
To
achieve these goals, the revised IT Policy in Education will encompass the
following principles:
- Holistic Development: The policy recognizes
that education should go beyond academic excellence. It will promote the
holistic development of students by integrating moral, spiritual, and
character education into the curriculum. This will be accomplished through
the inclusion of values-based learning, ethics, and the cultivation of
empathy and compassion.
- Intellectual Freedom: The policy will uphold
and safeguard the principles of intellectual freedom, encouraging students
and educators to engage in critical thinking, questioning, and
exploration. It will foster an environment where diverse perspectives are
respected, and students are empowered to express their thoughts and ideas
freely.
- Innovation and Creativity: The policy will
prioritize the integration of technology into education to foster
innovation and creativity. It will encourage the use of digital tools,
platforms, and resources to enhance learning experiences and promote problem-solving
skills, collaboration, and adaptability.
- Inclusivity and Diversity: The policy will
ensure that education is accessible and inclusive for all students,
regardless of their background, abilities, or circumstances. It will
promote diversity in curriculum content, teaching methodologies, and learning
resources, fostering an environment that respects and celebrates
differences.
- Ethical and Responsible Technology Use: The
policy will emphasize the importance of ethical and responsible use of
technology in education. It will provide guidelines and support for
educators and students to navigate digital spaces safely, protect privacy,
and develop digital citizenship skills.
- Lifelong Learning: The policy will recognize
education as a lifelong journey and promote a culture of continuous
learning. It will encourage professional development opportunities for
educators, promote self-directed learning among students, and foster a
love for learning beyond formal education.
By
embracing these principles, the IT
Policy in Education aims to transform education into a nurturing and empowering
experience that prepares individuals not only for academic success but also for
personal growth, ethical decision-making, and meaningful contributions to
society.
Scope of IT policy
Rules for Access to Administrative Data:
- Definition: Administrative data refers to any
information or data that is collected, stored, and processed by the institute
for administrative purposes. This may include personal information,
financial records, instituteal data, or any other data that is crucial for
the operation of the institution.
- Authorized Access: Employees who need access
to administrative data must be authorized by their respective roles and
responsibilities. Access to specific data should be granted on a
need-to-know basis, ensuring that employees only have access to the data
necessary for performing their job duties.
- Proper Use: Employees accessing
administrative data must use it solely for legitimate business purposes
and in accordance with the institute's policies and procedures. Personal
or unauthorized use of administrative data is strictly prohibited.
- Data Protection: Employees must adhere to all
applicable data protection laws and regulations when accessing, handling,
and storing administrative data. This includes maintaining the
confidentiality, integrity, and availability of the data, as well as protecting
it from unauthorized access, loss, or misuse.
- Security Requirements: When accessing
administrative data, employees must comply with the institute's security
requirements. This may include using strong passwords, following secure
authentication practices, encrypting sensitive data, and utilizing
approved secure networks or VPNs for remote access.
- Disciplinary Consequences: Failure to adhere
to the rules and guidelines for accessing administrative data may result
in disciplinary action, which can include warnings, suspension,
termination, or legal consequences, depending on the severity and impact
of the violation.
Codes of
Practice for Information Technology Security: The institute aligns its
information technology security program with the following codes of practice:
- Widely Accepted Practices: The institute
adopts widely accepted security practices that are recognized as effective
in safeguarding computing assets. These practices may include industry
standards, frameworks, or guidelines such as ISO 27001, NIST Cybersecurity
Framework, or CIS Controls.
- Higher Education Environment: The security
practices implemented by the institute are tailored to the specific needs
and challenges of the higher education environment. This may include
considerations for academic research, student data privacy, intellectual
property protection, and other unique aspects of the institution.
- Strong and Persistent Program: The institute
maintains a strong, persistent, and coordinated security program to
address the growing security threats. This involves regular risk
assessments, vulnerability management, incident response planning,
security awareness training, and continuous monitoring of the
institution's computing assets.
Storage
of Highly Sensitive Data on Individual-Use Devices and Media:
- Strict Limitations: Highly sensitive data
should only be stored on individual-use devices or media when absolutely
necessary. The default practice should be to store such data on secure and
centrally managed systems within the institute's network.
- Security Requirements: If highly sensitive
data must unavoidably be stored on individual-use electronic devices or
electronic media, strict security requirements must be met. This includes
encryption of the data, implementation of strong access controls, regular
backups, and adherence to the institute's data classification and handling
policies.
Use of Instituteal
Web Pages:
- Non-Commercial Use: Instituteal web pages
must not be used for commercial purposes. They should serve as platforms
for providing information, resources, and services related to the institute's
mission and activities.
Third-Party
Access to the Network:
- Conditions for Access: Third parties, such as
auditors or consultants, may be granted direct access to the network under
specific conditions. These conditions may include the need for the third
party to sign a non-disclosure agreement, comply with the institute's
security policies, and undergo any necessary security assessments or
vetting processes.
Responsibilities
for Device Security:
- User Responsibilities: All users are
responsible for maintaining the security of their devices when connected
to the institute's network. This includes installing and updating security
software, applying patches and updates, using strong and unique passwords,
and reporting any security incidents or concerns promptly.
Maintaining
Privacy, Confidentiality, and Integrity:
- Computing Environment: Users must adhere to
rules and guidelines for maintaining the privacy, confidentiality, and
integrity of the computing environment. This involves using resources
appropriately, respecting the rights and privacy of others, refraining
from unauthorized access or data manipulation, and reporting any security
or policy violations.
Ban on
Employee Access to Obscene or Sexually Explicit Materials:
- Definition: Employees are strictly prohibited
from accessing or viewing obscene materials or sexually explicit material
using state equipment. This includes computers, laptops, tablets,
smartphones, or any other devices owned or provided by the institute.
- Exemptions: Any exemptions to the ban must be
clearly defined and justified based on legitimate business needs. These
exemptions should be limited, controlled, and subject to approval by
appropriate authorities within the institute.
Rules for
Using Shared Computing Resources:
- Public Labs: When using shared computing resources such as public labs, users must adhere to the institute's policies and guidelines. This may include restrictions on software installation, data storage limitations, compliance with licensing agreements, and respectful use of the resources to ensure fair access for all users.
Aims of IT Policy
Information
Security Policies play a crucial role in safeguarding important data,
institutional plans, and other confidential information from theft or
unauthorized disclosure. Without awareness of these policies, employees may be
uncertain about the expected actions when handling such sensitive information.
Additionally,
implementing information security policies can have several advantages,
including:
- Empowering citizens, managers, and other
stakeholders through online teamwork, enabling increased participation,
collaboration, and information sharing via email, the Web, and other
remote collaboration tools.
- Enabling rapid and cost-effective creation
and distribution of educational information and knowledge.
- Encouraging professional development,
in-service training, remote support, and mentoring to foster lifelong
learning for teachers, managers, and other individuals.
- Facilitating quick and easy access to
information and expertise worldwide.
- Increasing motivation through multimedia
elements like sound, video, graphics, animation, and text.
- Allowing students to learn at their own pace
and level, granting them greater control over their learning experience.
- Enhancing the development of abilities in
mentally and physically challenged students.
- Promoting active learning rather than passive
consumption of information.
- Engaging students in research, data analysis,
and problem-solving, thereby facilitating higher-order thinking processes
such as synthesis, interpretation, and hypothesis formation.
Policy
Statement
The I.T.
Department is tasked with the responsibility of ensuring the sufficient
protection and confidentiality of corporate data and proprietary software
systems. This responsibility extends to data stored centrally, on local storage
media, or remotely, with the aim of ensuring uninterrupted access to data and
programs for authorized staff members, as well as maintaining the integrity of
all data and configuration controls.
Benefits
Of It
Information
Technology (IT) has a significant impact on the spread of education and access
to it. It enhances flexibility, allowing students to access educational
resources regardless of time and geographical barriers. IT also influences
instructional methods and learning approaches, enabling collaborative skill
development and knowledge creation. Consequently, students become better
prepared for lifelong learning and gain opportunities to join various
industries.
The
benefits of IT in education include:
- Increased access and flexibility of content
distribution, combining education with work and focusing on
student-centered methods.
- Provision of high-quality and cost-effective
professional development, replacing traditional labor-intensive
approaches. This improves employee skills and productivity while fostering
a culture of continuous learning. It also facilitates cost and time sharing
for training among employees.
- Enhanced capacity and cost-effectiveness of
the education system, particularly benefiting target groups with limited
access to traditional education. IT support improves the quality and
relevance of existing educational structures and establishes connections
with educational institutions and curricula through networks.
- Improved performance of knowledge workers and
instituteal learning. IT enhances the performance of knowledge workers in
customer, supplier, and partner institutes. It adds value to existing
products and services through information integration and enables the
creation of new information-based products and services.
- Internally, IT improves infrastructure
performance, enhancing functionality and expanding the range of available
options. Externally, it enables the creation of efficient and flexible
online/offline platforms for coordination with educational institutes.
limitations
of it
· High cost
of technology and maintenance: Implementing IT in education often requires
significant investments in hardware, software, and infrastructure. Schools and
educational institutions may struggle to afford the initial costs of acquiring
technology, such as computers, tablets, and servers. Additionally, maintaining
and upgrading these technological resources can be expensive over time,
especially if they become outdated quickly.
· Cost of
spare parts: Technology components can fail or become damaged, requiring
replacement parts. The cost of these spare parts can be a burden, particularly
for schools with limited budgets. Dependence on specific brands or models may
also increase the cost and availability of spare parts.
· Virus
attacks and software issues: IT systems are susceptible to malware, viruses,
and software vulnerabilities. These security threats can compromise data,
disrupt operations, and hinder the learning process. Institutions need to
invest in reliable antivirus software and security measures to mitigate these
risks, which can further increase the overall cost of IT implementation.
· Internet
connectivity interruptions: Inadequate or unreliable internet connectivity can
hinder the effective use of IT in education. Access to online resources,
communication tools, and remote learning platforms heavily relies on a stable
internet connection. Schools located in rural or remote areas may face
challenges in providing consistent and high-speed internet access to students
and teachers.
· Poor
supply of electric power: Reliable electricity supply is crucial for the
successful integration of IT in education. In regions or countries with
inconsistent power grids or frequent power outages, schools may struggle to
maintain a consistent and uninterrupted IT infrastructure. This can disrupt
teaching and learning activities and make IT less feasible in such contexts.
· Addressing
these technology-related limitations requires careful planning, sufficient
funding, and effective maintenance strategies. Schools and educational
institutions should assess the costs, benefits, and long-term sustainability of
implementing IT solutions while considering the specific challenges and
limitations they may face in their environment.
Outline
Various Measures To Ensure Data Confidentiality
Ø Confidentiality
through Discretionary and Mandatory Access Controls: This means that access
controls should be implemented to restrict data access based on user
permissions. Discretionary access controls allow data owners to determine who
can access their data, while mandatory access controls enforce restrictions
based on predefined security levels.
Ø Restriction
of Internet and External Service Access: Access to the internet and external
services should be limited to authorized personnel only. This helps prevent
unauthorized access, data breaches, and potential security risks.
Ø Encryption
for Laptop Computers: To maintain data confidentiality in the event of laptop
loss or theft, data stored on laptops should be encrypted. Encryption ensures
that even if the device is compromised, the data remains unreadable without the
appropriate decryption key.
Ø Authorized
Software Installation: Only authorized and licensed software should be
installed on instituteal devices. This ensures that software used is
legitimate, up to date, and free from potential security vulnerabilities.
Ø Prohibition
of Unauthorized Software: Unauthorized software should not be used within the institute.
If any unauthorized software is discovered, it should be promptly removed from
the workstation to mitigate potential security risks.
Ø Controlled
Data Transfer: Data transfer should align with the institute's data protection
policy. This ensures that data is shared only for approved purposes, preventing
unauthorized disclosure or misuse.
Ø Virus
Checking for External Media: Before using any external media such as diskettes
or removable drives, they should be scanned for viruses. This practice helps
prevent the introduction of malware or other malicious code into the institute's
systems.
Ø Strong
Password Requirements: Passwords should consist of a mix of at least 4
alphanumeric characters and should be changed every 30 days. This helps
strengthen the security of user accounts by ensuring regular password updates
and complexity.
Ø Controlled
Workstation Configurations: Workstation configurations should only be changed
by IT Department staff. This ensures that configurations are standardized,
consistent, and follow established security guidelines.
Ø Physical
Security of Computer Equipment: Computer equipment should adhere to recognized
loss prevention guidelines to prevent physical theft or unauthorized access.
Physical security measures may include locked cabinets, restricted access
areas, or surveillance systems.
Ø Regular
Data Backups: To prevent the loss of IT resources, regular backups of data,
applications, and workstation configurations should be performed. This helps
ensure that data can be recovered in case of accidental deletion, hardware
failure, or other incidents.
Ø By
implementing these measures, the institute can establish a comprehensive
security framework to safeguard data, control access, and maintain the
availability of IT resources.
Anti-Virus Policies And Procedures
These
are the anti-virus policies and procedures for the institute:
Ø The IT
Department will provide up-to-date virus scanning software for scanning and
removing suspected viruses.
Ø Corporate
file servers will be protected with virus scanning software.
Ø Workstations
will be protected by virus scanning software.
Ø The IT
Department will regularly update all workstation and server anti-virus software
with the latest patches.
Ø No disk
brought in from outside the institute should be used until it has been scanned.
Ø All
systems will be built from original, clean master copies with write protection
in place. Only original master copies will be used until virus scanning has
been performed.
Ø Removable
media containing executable software (files with .EXE and .COM extensions) will
be write-protected whenever possible.
Ø Vendor
demonstrations will be run on their own machines and not on the institute's
systems.
Ø Shareware
will not be used, as it is a common source of infections. If shareware use is
necessary, it must be thoroughly scanned before use.
Ø New
commercial software will be scanned before installation, as it may occasionally
contain viruses.
Ø Removable
media brought in by field engineers or support personnel will be scanned by the
IT Department before use on site.
Ø Regular
backups will be taken by the IT Department to enable data recovery in the event
of a virus outbreak.
Ø Management
strongly supports the institute's anti-virus policies and will allocate
necessary resources for their implementation.
Ø Users
will be kept informed of current procedures and policies.
Ø Users
will be notified of virus incidents.
Ø Employees
will be held accountable for any breaches of the institute's anti-virus
policies.
Ø Anti-virus
policies and procedures will be reviewed regularly.
Ø In the
event of a possible virus infection, the user must immediately inform the IT
Department. The infected machine, as well as any removable media or other
workstations that may have been affected, will be scanned and the virus
eradicated by the IT Department.
These policies aim to
ensure the institute's systems and data are protected from virus infections and
to respond effectively in case of an outbreak.
Access
Control
These
are the proposed access control policies for the organization:
Ø Users
will only be granted the necessary rights on systems to perform their job
functions. User rights will be minimized at all times.
Ø Users
requiring access to systems must submit a written application using the
provided forms from the IT Department.
Ø Where
possible, no individual will have full rights to any system. Network/server
passwords will be controlled by the IT Department, and system passwords will be
assigned by the system administrator in the respective end-user department.
Ø The
system administrator in each end-user department will be responsible for
maintaining data integrity and determining end-user access rights.
Ø Access to
the network, servers, and systems will be through individual usernames and
passwords, smartcards and PIN numbers, or biometrics.
Ø Usernames
and passwords must not be shared among users.
Ø Usernames
and passwords should not be written down.
Ø Usernames
will consist of initials and surname.
Ø All users
will have an alphanumeric password of at least 4 characters.
Ø Passwords
will expire every 30 days and must be unique.
Ø Intruder
detection will be implemented where possible, and user accounts will be locked
after 5 incorrect login attempts.
Ø The IT
Department must be notified of all employees leaving the organization's employment
so that their system rights can be revoked.
Ø Network/server
supervisor passwords and system supervisor passwords will be stored securely,
such as in a fire-safe in the IT Department, for emergency or disaster
situations.
Ø Auditing
will be implemented on all systems to record login attempts/failures,
successful logins, and changes made to the systems.
Ø IT
Department staff will not log in as root on UNIX/Linux systems but will use the
SU command to obtain root privileges.
Ø The use
of admin usernames on Novell systems and Administrator usernames on Windows
should be minimized.
Ø Default
passwords on systems like Oracle and SQL Server will be changed after
installation.
Ø Access to
RLOGIN, FTP, TELNET, and SSH on UNIX and Linux systems will be restricted to IT
Department staff only.
Ø Where
possible, users will not be given access to the UNIX or Linux shell prompt.
Ø Access to
the network/servers will be restricted to normal working hours. Users requiring
access outside normal working hours must submit a written request using the
forms provided by the IT Department.
Ø File
systems will have maximum security implemented wherever possible. Users will
typically be granted only Read and File scan rights to directories, and files
will be flagged as read-only to prevent accidental deletion.
These
access control policies aim to ensure that users have appropriate access rights
to systems, data integrity is maintained, and unauthorized access is minimized.