We have been using SurveilStar Any Web Protection as our Computer Monitoring Software for watching our students online. It gives us peace of mind when they go online to surf the web. SurveilStar has allowed us to monitor our kids activities from any web browser we choose. ...
SurveilStar allows our teachers to quickly, and easily view what is happening in real time on our school's entire network with a single click from one centralized location. Now we can see what students are doing in real time from a central location! ...
We can use SurveilStar to regain control of computer usage in our classrooms. See an instant snapshot of all screens in our class to make sure students are working and not surfing the Internet or playing games. View web sites visited and much more. ...
SurveilStar Any Web ProtectionEnforce Acceptable Use Policy to Ensure Adherence to Your School Internet Policy
A school's acceptable use policy is useless unless it is strictly enforced. A school district may have an ironclad policy which staunchly protects itself and its users from engaging in "illegal" activities, and may have state-of-the art security measures such as firewalls and tracking and filtering software installed on its servers. However, the bottom line is, unless the staff, students, parents and administrators are prepared to continually monitor Internet use, an acceptable use policy means nothing to the very people and is supposed to legally protect. SurveilStar Enforce Acceptable Use Policy Software provides school with a easy and fantastic way to enforce the acceptable use policy and make the consequences for violating the policy swift and consistent.
What is Acceptable Use Policy?
An acceptable use policy (AUP; also sometimes acceptable usage policy or Fair Use Policy) is a set of rules applied by the owner/manager of a network, website or large computer system that restrict the ways in which the network site or system may be used. AUP documents are written for corporations, businesses, universities, schools, internet service providers, and website owners often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement.
Acceptable Use Policies are an integral part of the framework of information security policies; it is often common practice to ask new members of an organization to sign an AUP before they are given access to its information systems. For this reason, an AUP must be concise and clear, while at the same time covering the most important points about what users are, and are not, allowed to do with the IT systems of an organization. It should refer users to the more comprehensive security policy where relevant. It should also, and very notably, define what sanctions will be applied if a user breaks the AUP. Compliance with this policy should, as usual, be measured by regular audits.
How SurveilStar Enforce Acceptable Use Policy for School Internet?
SurveilStar Enforce Acceptable Use Policy Software provides school with 14 flexible monitoring policies, including basic policy, device policy, application policy, web policy, screen snapshot policy, logging policy, system alert policy, bandwidth policy, network policy, email policy, IM file policy, etc. SurveilStar Enforce Acceptable Use Policy Software delivers a unique, policy-based system that prevents undesirable and/or malicious traffic from entering or exiting the network infrastructure.
Monitor Students Computer to Enforce Acceptable Use Policy
SurveilStar Enforce Acceptable Use Policy Software could monitor and record all the students' online activities. You could set Remote Control Policy to decide whether or not to allow remote control to the student machine. SurveilStar Enforce Acceptable Use Policy Software enables you to monitor your students’ on-screen activities and know what they do with their computers in a completely invisible mode. Moreover, it also provides multi-screen viewing and screen history viewing functions. With the multi-screen monitoring function, you can monitor several students at one time. By viewing screen history, you can easily obtain pure and impartial proof of any illegal operations to enforce acceptable use policy.
• Screen snapshot policy allows administrator to capture and playback screen activities to completely review all the operations on the students' computer.
• Email policy aims to help system administrator to monitor outgoing emails and record all emails with attachments including SMTP/POP3 email, Exchange email, webmail, and Lotus Notes email.
• IM file policy aims to monitors all IM chats. Also, the IM conversation contents can be logged and saved for your review in the future days.
• Web policy can effectively monitor students' access to web pages.
• Application policy aims to monitor application usage.
Block and Control Unacceptable Content to Enforce Acceptable Use Policy
Control outgoing emails and record all emails with attachments including SMTP/POP3 email, Exchange email, webmail, and Lotus Notes email.
Control outgoing files which are transferred through IM applications so as to prevent information leakage via this channel. IM file policy supports over ten popular IM applications which are MSN Messenger, Skype, ICQ, Yahoo! Messenger, Lotus Sametime, Tencent QQ, etc.
Effectively control students' access to web pages, and prohibit access to malicious sites or dangerous websites such as gambling sites, cyber bulling, etc, so as to improve efficiency, and protect the internal network security.
Control application usage, prohibit students from using their own software such as BT, chatting, online gaming software and other unwanted applications.
Enforce Acceptable Use Policy by limiting the installation of plug-ins such as games on social network sites, as these can impact productivity and network security.
Limit and control students' bandwidth usage in order to avoid network congestion caused by improper use of network resources, such as such as way of using Peer-to Peer and FTP download. With appropriate control at specified times, directions, network address and ports, bandwidth can be allocated to each computer specifically, and administrators can increase workflow efficiency.
Control and monitor network communications, as well as prevent unauthorized external computers from accessing internal network in order to keep away from intrusion and virus attack.
Enforce Acceptable Use Policy by limiting the time the students spend on the PC.