Terms of Service

Responsible Use of Technology Agreement

It is an expectation that the John Paul College ICT infrastructure, systems and resources are to be used in a responsible, ethical and legal manner and in accordance with the College Educational aims and objectives.

In using the Learning Managing System JPIC Academy, I must:

  1. respect and practise the principles and values of the College.
  2. respect and protect the privacy of others.
  3. respect and protect the integrity, availability, and security of all electronic resources.
  4. respect and protect the intellectual property of others and
  5. respect and protect College equipment.

Expectations

Respect and protect the privacy of others.

This includes:

  1. using only assigned accounts.
  2. not viewing, using or copying passwords, data, or networks to which they are not authorised.
  3. not distributing private information in any form (including through emails, photographs, mobile phones and the Internet) about others or themselves. This includes impersonating the identity of others.

Respect and protect the integrity, availability, and security of all electronic resources.

This includes:

  1. observing all network security practices.
  2. not providing a password or access to the JPIC LMS to another student or anyone outside the JPIC LMS.
  3. not destroying or damaging data, networks or other resources.
  4. not installing any software onto the network without authorisation from Techsphere.
  5. not creating “peer to peer” networks or sharing a notebook’s resources across the College network without express permission of a teacher or Techsphere.
  6. not accessing any proxy sites that attempt to mask or hide identity or network activity from the College’s network security.
  7. not hacking or attempting to gain unauthorised access to files or the network of any organisation or individual.

Respect and protect the intellectual property of others

This includes:

  1. not altering, moving or deleting files belonging to others.
  2. not plagiarising, copying or presenting as their own, the work of others.
  3.  not infringing or violating copyright laws (including copying and transmitting documents, software, apps, music, games and/or video files). Such documents, software, apps, games or music should be legally acquired.