Internet Usage Policy

Internet Usage Policy

Internet Usage Policy

Internet Usage Policy for Students

GCLC understands the key role technology can play in the development of learning, but is also aware of the need to provide a safe framework in which students can appropriately develop knowledge, skills and values

Unacceptable use

Each student will need to sign the Induction Agreement that states that they understand the terms and conditions of studying at GCLC.

I will not access the Internet:

  • For any purpose or material that is unlawful, dangerous, unacceptable, pornographic, objectionable or offensive;
  • At any time for chat;
  • To plagiarize (steal) materials or infringe copyright;
  • To buy or sell goods or services;
  • To obtain any material, information or software in violation of local, state or commonwealth laws.

I understand that if I behave inappropriately when using school computing resources, I may be barred from using the network and face disciplinary action.

Private Computer (laptop) Policy

Staff and students are permitted to bring personal computers, including private laptops, for use throughout the school.

The use of a private computer at GCLC is subject to the following guidelines:

  • Access to the GCLC network is strictly prohibited.
  • GCLC accepts no responsibility for the security of the private computer.
  • GCLC accepts no responsibility for damage to the private computer.
  • GCLC accepts no responsibility for any hardware or software problems with the private computer and offers no support for such problems;
  • Private computers cannot be used in assessment tasks by any student unless special provisions have been granted.

If users fail to adhere to the above guidelines then the privilege of using a private computer will be revoked.

Internet Usage Policy for GCLC Staff

Internet use, on Company time, is authorised to conduct company business only. Internet use brings the possibility of breaches to the security of confidential company information. Internet use also creates the possibility of contamination to our system via viruses or spyware. Spyware allows unauthorized people, outside the company, potential access to company passwords and other confidential information.

Removing such programs from the company network requires IT staff to invest time and attention that is better devoted to progress. For this reason and to assure the use of work tie appropriately for work, we ask staff members to limit internet use.

Additionally, under no circumstances may company computers or other electronic equipment be used to obtain, view, or reach any pornographic, or otherwise immoral, unethical, or non-business-related internet sites. Doing so can lead to disciplinary action up to and including termination of employment.

Email Usage at Company

Email is also to be used for company business only. Company confidential information must not be shared outside of the company without authorization, at any time. You are also not to conduct personal business using the company computer or email.

Please keep this in mind, also, as you consider forwarding non-business emails to associates, family or friends. Non-business-related emails waste company time and attention.

Viewing pornography, or sending pornographic jokes or stories via email, is considered sexual harassment and will be addressed according to our sexual harassment policy.

Emails that Discriminate

Any emails that discriminate against employees by virtue of any protected classification including race, gender, nationality, religion, and so forth, will be dealt with according to the harassment policy.

These emails are prohibited at the company. Sending or forwarding non-business emails will result in disciplinary action that may lead to employment termination.

Company Owns Employee Email

Keep in mind that the company owns any communication sent via email or that is stored on company equipment. Management and other authorised staff have the right to access any material in your email or on your computer at any time. Please do not consider your electronic communication, storage or access to be private if it is created or stored at work.