Skip Navigation
Forum Unified Education Technology Suite
  Home:  Acknowledgments and Introduction
     
  Part 1:  Planning Your Technology Initiatives
     
  Part 2:  Determining Your Technology Needs
       
  Part 3:  Selecting Your Technology Solutions
       
  Part 4:  Implementing Your Technology
       
  Part 5:  Safeguarding Your Technology
       
  Part 6:  Maintaining and Supporting Your Technology
       
  Part 7:  Training for Your Technology
       
  Part 8:  Integrating Your Technology
       
  Appendix A: Sample
Acceptable Use
Agreements and Policies
       
  Appendix B: FERPA Fact Sheet
       
  Appendix C: Web Guidelines
       
  Appendix D: Sample Security Agreements
       
  Glossary
     
  List of Tables and Figures
     
    Powerpoint Overview (700KB)
    Contact:
NCES Webmaster
   
Appendix D: Sample Security Agreements

The following are samples of agreements that an organization can refer to as it develops its own Information and Technology Security Agreements for staff, contractors, and other individuals who are to be given access to equipment, information, or networks. These samples have been compiled from existing agreements that are currently in use in schools and local education agencies. The conditions they specify may or may not be applicable to all potential readers, and are, therefore, presented only as a resource. They do not in any way represent a standard or an agreed-upon convention.

These sample Information and Technology Security Agreements do not take the place of security policies, guidelines, and procedures that are customized to meet the specific needs of an organization. In fact, precisely the opposite is true. The following agreements are designed to certify that the signer acknowledges that relevant security policies, guidelines, and procedures have been developed by the organization and subsequently presented to the signer in a clear and meaningful way that outlines what their security responsibilities will be. These agreements are, therefore, simply the formal mechanisms by which the signer acknowledges that he or she is aware of the information and technology security policies, guidelines, and procedures, and agrees to abide by them.

Employee Information and Technology Security Agreement

I acknowledge that [name of organization]'s information and technology security policies, guidelines, and procedures have been made available to me for review and consideration. I also certify that I have been given ample opportunity to have any and all questions about my responsibilities addressed. I am, therefore, aware that I am accountable for information and technology security procedures as they govern the acceptable performance of my job. I understand that failure to abide by any and all policies, guidelines, and procedures can result in organizational, civil, or criminal action and/or the termination of my employment.

Signature: ______________________________ Printed Name: ______________________________

Job Title: ___________________________________ Date: ______/_____/______


Contractor/Consultant/Outsider Information and Technology Security Agreement

I acknowledge that [name of organization] has provided me with adequate time to review and consider the information and technology security policies, guidelines, and procedures it deems applicable to responsibilities I am undertaking on behalf of [name of organization], regardless of my employment status. I also certify that I have been given ample opportunity to have any and all questions about my responsibilities addressed. I am, therefore, aware that I am accountable for those information and technology security procedures as they relate to my work for, or on the behalf of, [name of organization]. I understand that failure to abide by any and all policies, guidelines, and procedures can result in organizational, civil, or criminal action and/or the termination of my relationship with [name of organization].

Signature: ______________________________ Printed Name: ______________________________

Affiliation: ___________________________________ Date: ______/______/______


Previous Page -- Appendix C: Web Guidelines Next Page -- Glossary