EILOA IT Charter

1. Preamble

EILOA implements an information and communication system necessary for its activity, including an IT network. Students, during their curriculum, are led to use the IT tools made available to them and to access the school’s communication services.
The use of the information and communication system must be exclusively for pedagogical purposes, except as provided in this charter. In the interest of transparency towards users, and to promote fair, responsible, and secure use of the information and communication system, this charter sets out the rules for the use of these resources. It also defines the means of control and surveillance of this use and has a regulatory aspect.

2. Scope of Application

2.1 Concerned Users

Unless otherwise stated, this charter applies to all users of EILOA’s information and communication system, regardless of their status or connection location (for example, from their home).

2.2 Information and Communication System

The school’s information and communication system includes the following elements: files, data and databases, messaging system, internet connection, intranet, extranet, subscriptions to interactive services.
For network security reasons, students’ personal equipment connected to the school’s network, or containing information concerning the school, is also considered part of the information and communication system.

3. Confidentiality

3.1 Access Parameters

Access to certain elements of the information system (such as electronic messaging) is protected by connection parameters (username, password, security key
These parameters are personal to the user and must be kept confidential. They are used, in particular, to control user activity. They must not be communicated to anyone. Where possible, these parameters must be memorized by the user and not be retained in any form whatsoever. In any event, they must not be transmitted to third parties or easily accessible. They must be entered by the user at each access and not kept in memory in the information system. When chosen by the user, the connection parameters must meet a certain degree of complexity and be changed regularly. The IT department only modifies a user’s access parameters at their own request, except in case of imperative necessity.

No user should use an account other than the one assigned to them to access the school’s information system. Nor should they delegate the usage rights attributed to them to a third party.

3.2 Data

Each user is responsible for respecting the confidentiality of the information they are led to hold, consult, or use. The user must be particularly vigilant about the risk of disclosing this information when using personal IT tools in public places.

4. Security

4.1 Role of the School

The school implements appropriate human and technical means to ensure the material and software security of the information and communication system. As such, it is responsible for limiting access to sensitive resources and acquiring intellectual property rights or obtaining the necessary authorizations for the use of resources made available to users.
The IT department is responsible for the implementation and control of the proper functioning of the information and communication system. It ensures the application of the rules of this charter.

4.2 User Responsibility

The user must contribute to the protection of the system and data, exercising caution and vigilance.

In particular, they must report to the school’s management any violation or attempted violation of data integrity, and, generally, any malfunction, incident, or anomaly.
A protected and secure cloud storage space is provided by the school. The student must use it for the files made available to them. The user must avoid copying or installing files likely to create security risks within the school. They must not modify the settings of the different tools made available to them, nor circumvent any of the security systems implemented in the company. In all cases, they must alert the school’s management.
The user undertakes at all times to comply with the legislation, which notably protects intellectual property rights, the secrecy of correspondence, personal data, automated data processing systems, the right to the image of individuals, and the exposure of minors to harmful content. They must not engage in any activity likely to cause any prejudice to the school using the information and communication system.
It is expressly forbidden for the user to create any account or email address for the purpose of representing the school.

5. Internet

5.1 Access to Sites and Applications

As part of their pedagogical curriculum, students may have access to the Internet. For security or ethical reasons, access to certain sites and/or applications may be limited or prohibited by the IT department, which is authorized to impose browser configurations and install filtering mechanisms limiting access to certain sites and/or applications.
Only the consultation of sites and/or applications related to teaching and professional activity is authorized. It is forbidden to connect to Internet sites and/or applications whose content is contrary to public order, good morals, or the school’s brand image, as well as those that may pose a risk to the security of the information system.

5.2 Other Uses

The contribution of users to discussion forums, instant messaging systems, chats, and blogs is only authorized within the necessity and framework of the pedagogical curriculum. In all cases, the statements made engage the user’s responsibility.
Similarly, all file downloading, particularly media files, is prohibited, except with pedagogical justification validated by the School Management.
It is recalled that users must not engage in any illicit activity on the Internet or one that harms the interests of the school.
They are informed that the IT department records their activity on the Internet and that these traces may be exploited within the limits provided by law.

6. Electronic Messaging

Each student has a standardized electronic mail address assigned by the IT department as part of their curriculum.

Electronic messages received on the school email system are subject to antiviral control and anti-spam filtering and phishing reporting. Students are invited to inform the school’s management of any malfunctions they observe in this system.

6.1 General Advice

The user’s attention is drawn to the fact that an electronic message can be communicated very quickly to third parties, and care must be taken to adhere to a number of principles, to avoid malfunctions of the information system, to limit the sending of unsolicited messages, and not to engage the civil or criminal liability of the school and the user.
Before any sending, it is imperative to carefully check the identity of the message recipients and their qualification to receive communication of the transmitted information. In the presence of confidential information, these checks must be reinforced.
In case of sending to multiple recipients, the user must comply with the provisions relating to the fight against mass sending of unsolicited mail. They must also consider the appropriateness of concealing certain recipients by putting them in blind copy (Bcc) so as not to communicate their electronic address to all recipients. Electronic correspondence must not contain illicit elements, such as defamatory and/or abusive comments.
The user’s attention should be drawn to the fact that electronic messaging is a means of intrusion into the security of information systems, it is imperative to carefully check the identity of the message sender and their qualification to send it.

6.2 Technical Limits

The school’s IT department or the recipient’s IT department may limit the size, number, and type of attachments to prevent the messaging system from becoming overloaded.
The student is informed that all emails are retained (including emails deleted by the user in their mailbox, which are still traceable) without time limitation. They will be able to access them up to three months after the end of the school curriculum, at which date access to all means (including messaging and Drive) will be removed

6.3 Personal Use of Messaging

The Google Suite allows for simultaneous use of different messaging accounts; therefore, the use of the school’s email for personal purposes is prohibited.

7. Personal Data

Law n° 78-17 of January 6, 1978, relating to data processing, files and freedoms, amended by the so-called “GDPR” Regulation EU N°2016/679 of April 27, 2016, define the conditions under which personal data processing can be carried out. They establish rights for the persons concerned by the processing, which this charter invites to respect, both for users and third parties.

Automated and manual data processing operations are carried out within the framework of the control systems provided for in this charter. They are, as necessary, declared in accordance with the legal provisions recalled above.
For the purposes of school management, we are led to request personal data concerning you. The signature of the charter constitutes authorization for the school to collect, record, and store the necessary data. This information is reserved for the strict use of the school, its organization, and its own declarative constraints.
You notably benefit from a right of access, rectification, and erasure of the information concerning you, which you can exercise by directly addressing a request to the School Management.

8. Activity Control

8.1 Automated Controls

The information and communication system relies on log files created largely automatically by IT and telecommunication equipment. These files ensure the proper functioning of the system, protecting the security of the school’s information, detecting material or software errors, and controlling the access and activity of users and third parties accessing the information system.
Users are informed that multiple processing operations are carried out to monitor the activity of the information and communication system.

8.2 Manual Control Procedure

In the event of a malfunction observed by the IT department, a manual control and verification of any operation performed by one or more users may be carried out. The control concerning a user may cover the files contained in their messaging system.

9. Information and Sanctions

This charter is communicated individually to each student.

This charter is communicated individually to each student.
Failure to comply with the rules and security measures described in this charter is likely to engage the user’s responsibility and lead to warnings, limitations or suspensions of use of all or part of the information and communication system, or even disciplinary sanctions, proportionate to the seriousness of the facts concerned.
The School Management also reserves the right, in case of non-compliance, to initiate or have initiated legal proceedings, including criminal ones, independently of the disciplinary sanctions implemented.

10. Commencement

This charter is applicable from September 1, 2022.

Privacy Preference Center