I.C.T. Policies

I.C.T. Policies

User Responsibilities:

  • Individuals assume personal responsibility for the use of their email accounts. Consequently, users may not disclose their passwords or otherwise make the seminary’s facilities available to unauthorized individuals (including family or friends). Users are responsible for maintaining the security of their accounts. The JTS email facility must not be used for social media purposes.
  • The possession or collection of passwords, personal identification numbers (PINs), private digital certificates, or other secure identification information belonging to other users is prohibited.
  • Computer facilities have tangible value. Consequently, attempts to circumvent accounting systems or to use the computer accounts of others will be treated as forms of attempted theft.
  • Users may not copy, publish, store or transmit data as doing so would constitute a violation of copyright. Users who are in any doubt as to the copyright status of data they wish to store or send, should contact the IT Department’s Help Desk or the Library where relevant for help, in determining the legality of their planned use of the data.
  • Transmission of unlicensed software over Seminary’s network is strictly prohibited.
  • The introduction of data or programs which in some way endangers computing resources or the information of other users (e.g., a computer worm, virus, or other destructive program), or which infringes upon the rights of other JTS users (e.g., inappropriate, obscene, pornographic, bigoted, or abusive materials) is strictly prohibited.
  • Individuals may not attempt to circumvent security systems or to exploit or probe for security holes in any JTS network or system, nor may individuals attempt any such activity against other systems accessed through the seminary’s facilities. Execution or compilation of programs designed to breach system security is prohibited unless authorized in advance.
  • The compilation or redistribution of information from JTS directories (printed or electronic) to third parties is forbidden.
  • Users should access the Internet only for study or for school authorized activities.
  • Users should only open attachments to emails if they come from a known source that is trust worthy. This is so because occasionally attachments can contain viruses or other programs that could destroy all the files and software on the ICT equipment.

Security and Confidentiality:

  • Jamaica Theological Seminary considers all data stored on shared resources to be confidential, unless that information has been made explicitly available to other groups or individuals by the data’s owner. Jamaica Theological Seminary will assume that computer users wish the information they store on our shared computing resources to remain confidential. Therefore, Jamaica Theological Seminary will help users of its shared computing resources to protect the data they stored on or transmitted through those resources from accidental loss, tampering, or unauthorized search, or other access.
  • On shared and networked computer systems certain information about users and their activities is visible to others. Users are cautioned that certain accounting and directory information (for example, user names and electronic mail addresses), certain records of file names and executed commands, and information stored in public areas, are not private. Nonetheless, such unsecured information about other users must not be manipulated in ways that they might reasonably find intrusive; for example, eavesdropping by computer and systematic monitoring of the behaviour of others are likely to be considered invasions of privacy that would be cause for disciplinary action.
  • It is very important that all potential users of JTS wireless network on campus be aware that all data on this network is confidential. This data must not be modified or removed and must not be replayed. Desist from loading third-party wireless software on laptops that would in turn be a threat to the JTS wireless network. We reiterate abstinence from these practices.

Use of Computer Facilities:

  • The computers in the lab are provided and maintained for the benefit of students. Please be advised that the use and enjoyment of these resources must be done in a manner to ensure they remain available to all users. JTS students are responsible for displaying good behaviour with these resources on the Internet. Remember, access is a privilege not a right, and inappropriate use will result in that privilege being withdrawn.

Equipment:

  • Users are not allowed to re-arrange how equipment is plugged in. Equipment includes: computers, power supplies, network cabling, etc.
    Students must get permission before installing, attempting to install or storing programs of any type on the computers.
  • Damaging, disabling, or otherwise harming the operation of computers, or intentionally wasting resources puts your work at risk. Please be advised that in doing so will cut short your time with the ICT equipment.
  • Only use the computers for educational purposes. Activities such as buying or selling goods are prohibited.
  • Always check files brought in on removable media (such as CDs, flash drives etc.) with antivirus software and only use them if they are found to be clean of viruses.
  • Always check mobile equipment (e.g. laptops, tablet PCs, PDAs etc.) with antivirus software, and ensure they have been found to be clean of viruses, before connecting them to the JTS network.
  • No food or drink is to be brought near any of the ICT equipment, in order to prevent accidental spillages.
  • Students are not allowed to open the windows for ventilation during the use of the Computer Lab. The lab door must be kept closed at all times.
  • The Jamaica Theological Seminary is entitled to remove from any of its computers, resource data and programs that are found to be inappropriate as defined above, and/or to terminate the computing privileges of any user who violates the policies outlined above.

Electronic Communication:

  • The Jamaica Theological Seminary does not sanction or censor its students for expressing their opinions on its systems. However, the same standards of behaviour are expected in the use of electronic mail as in the use of written and oral communication. Therefore, electronic mail just as telephone messages, must be neither obscene nor harassing.
  • Similarly, messages must not misrepresent the identity of the sender and should not be sent as chain letters or broadcast indiscriminately to large numbers of individuals. This prohibition includes unauthorized mass electronic mailings. For example, email on a given topic that is sent to large numbers of recipients should in general, be directed only to those who have indicated a willingness to receive such email.

Operating Systems:

  • The Jamaica Theological Seminary’s network is designed to facilitate the following operating systems for personal computers (PCs): Windows Series, Mac and Linux. It is recommended that users of the Seminary’s network ensure that their computers are of such standards. If this is not done, users may experience difficulties when trying to perform internet related functions.

Student IT Help Desk Assistance:

  • Students should utilise the manuals on how to use the various portals that are made available to them. These portals are: JTS Email login, FOCUS/SIS and the Virtual Learning Environment. The Virtual Learning site is strictly for the Online Students.

Locating the JTS Email and FOCUS/SIS Portals:

  • The manual on how to locate and navigate these portals is placed on the JTS main website. From this platform students should select the main menu item: “Campus Life” then from the drop down list select, “Using FOCUS/SIS”. This manual clearly outlines the steps on how to sign in to the email account, as well as how to log in to FOCUS/SIS.

Locating the Virtual Learning Environment:

  • The manual on how to locate and navigate this portal is placed on the JTS main website. From this platform students should select the main menu item: “Campus Life” then from the drop down list select, “Using Virtual learning”. This manual clearly outlines the steps on how to sign in to the Virtual Learning environment. Also, students are able to locate this portal through the “Login” module located at the top left-hand corner of the main JTS website.
  • When authentication of the input information is completed, the “JTS Campus Main” page will be loaded. From the “Navigation” list located on the left-hand side of the page, students should select “Virtual Learning”. When this is done, the Virtual Learning site will be loaded.

Face-To-Face Assistance:

  • If students are still unsuccessful after going through these manuals, then an email should be sent to the address: helpdesk@jts.edu.jm. Emails are responded to within a 24 hour time slot. If after discussions with the IT Officer, students are still unable to utilise the portals, then a Face-to-Face session will be facilitated. Students will be informed of the date and time when the session is to be held.
  • The Registry Department will NOT be accommodating requests from students for assistance to log on to the various portals. Students are expected to follow the course of actions outlined above in order to receive IT Help-Desk assistance. Students should note that the Face-to-Face session is solely for students who have gone through the students’ manuals, and have been in discussion via email with help desk, prior to requesting a Face-to-Face session.
  • Students are expected to abide by the rules and policies outlined in these policies. Contact must be made to the Information Technology Department’s Help-Desk prior to any activity that would appear to violate any of them. Failure to do so may result in disciplinary action.