DSafe: Diyafah Data, Cyber Security, Infrastructure & Cyber Addiction Policy

While Technology devices and the internet have become an essential part of our personal, professional and educational lives; it is important that we all understand its acceptable usage and become aware of acceptable usage as well as how to stay safe from online predators and the threats in the Digital world online.

As part of Diyafah Schools online safety and Cybersecurity Policy, this DSafe document is prepared with the intent to educate, guide and to ensure online safety of Diyafah Systems, Staff and Students.

DIYAFAH DATA, CYBERSECURITY AND NETWORKS INFRASTRUCTURE:

  • Diyafah Innovation and Technology Team monitors, manages and conducts periodic updates on core devices, as and when necessary to ensure the safety and security of Diyafah networks.
  • Network access is restricted and managed by implementing security solutions such as multi-factor authentication and fine-grained password policy, to prevent unauthorised access as well as to keep the environment safe from exploitation and external threats.
  • Periodic Vulnerability Assessments are undertaken by competent third-party provider, to identify gaps, to be fixed. Gaps identified are noted for improvement and implemented in the following School breaks.
  • Firewall policies are re-visited for review and reforms as and when there are developments noticed either in the operational environment or on becoming aware of a Global Technological development.

Emails and Phishing:

If you are not expecting an email from the source/sender and it seems suspect, please delete such emails without opening. Always check the sender's email, if the email is not as it should be, the spelling is incorrect or suspicious, then it is a SPAM email trying to get your details (example:invoices@westandardcharteredbankcompany.com ). Use caution when clicking any links/URL sent to you from an external email. Do not forward the suspect email to anyone asking for guidance. By forwarding, you end up distributing a potential threat to many others.

To make it easier for you to quickly identify emails delivered to your mailbox from outside of Diyafah Schools, our mailing system labels it in the subject as [External]:

If you miss the subject as [External]: and happen to unknowingly open the email, a highlighted message (CAUTION: This email originated OUTSIDEOUTSIDE of the Diyafah School network.) will be displayed notifying you this message is not from within Diyafah Schools.

And for the benefit and safety of the recipient, a disclaimer is auto appended to all emails generated from Diyafah Mailing Servers. The disclaimer indemnifies Diyafah towards confidentiality, unauthorized access and exposure to threats.

  • Do not use your official email IDs on random websites, which expose your email to phishing. In the event you receive any email impersonating our school email ID, the [External]: tag will notify you of its origin from an external source.
  • Do not click on any links within the email and open any attachments with subject as [External]: If you are not sure of the sender.
  • Emails that do not have links or attachments could request for interaction and will request you for various information. This is an attempt at Social Engineering, which compromises the organisation with critical information related to business or Technology systems. Be aware and do not engage with unsolicited and/or strange email or Telephone communications.
  • Do not forward such email to anyone, not even to the helpdesk. Open a new email, then right click on the suspicious email. Copy and paste into a new email and send it to IT helpdesk with any details you wish to share.
  • Mark suspicious emails as SPAM and if you are sure the email originated from a malicious sender, then block the sender or senders domain, to prevent receiving any email/s from them again.

Description of image

Secure Device usage and Data Storage:

  • Do not save your data on the laptop/computer. Always store all files on OneDrive or Shared drive on Diyafah Server.
  • Data saved on laptop/Computer cannot be restored in the event of a disk crash or corruption. However, data on OneDrive and Diyafah Server can be recovered.
  • Do not download/install any unauthorised softwares, tools or applications from a website or content provider whom you do not trust.
  • Do not Share personal data/email without approval – If you are in doubt or need advice in a situation, please send your request to IT helpdesk.

Password - Best practice and Guidelines:

Description of image

  • Take passwords seriously, very seriously. It should not be less than 8 characters long and must contain at least one capital letter, one special character and one number. (Eg: St@y5ecure)
  • Follow the precautions you take for your banks. Set your logins for dual authentication, to receive a verification code as SMS to your mobile or email.
  • Do not share your passwords under any circumstances. If you have had to share it for any unavoidable circumstances, then change your password once the situation is dealt with.
  • Do not reuse passwords. Always generate a new password.
  • Do not use another user's credentials.

Internet usage:

  • Do not use any Virtual Private Network (VPN) to gain internet access. UAE regulation states, if VPN usage is identified as use for the purpose of committing a crime or to prevent internet activity discovery, it is punishable by temporary imprisonment and a fine not less than Dh500,00 and not in excess of Dh2 million or either of these two penalties according to Article no. 42 of the Cybercrimes Law, which states: 'The court may decide deportation of a foreigner who is condemned in any of the crimes specified in this Decree Law upon execution of the punishment adjudged.(Read more here https://www.tamimi.com/law-update-articles/is- using-a-vpn-in-the-uae-illegal/ ).
  • Do not access illegal sites to bypass security, use free services, or download digital content, such as softwares, freeware's, movies, music, etc. This could expose you to malware, ransomwares, etc. You could be breaking the law by accessing banned or blocked sites, and/or committing copyright violations.
  • Do not save your passwords online. While it might be convenient, this practice exposes you to become more vulnerable to hackers.
  • Do not click on pop-up links which might offer free softwares or tools, as most such pop-ups are scams. Always visit the software providers website to install the required software.

Online Communication, chats and Social media:

This policy must be read in conjunction with Terms and Conditions for BYOD and Microsoft 365, which remains binding and applies in addition to the rules defined in this policy.

Diyafah Schools provide students with a full version of the Microsoft 365 suite to enhance and facilitate new age learning and communication methods. However, Technology and Tools will need to be used with care, diligence and with set boundaries towards acceptable actions and behaviours by Students.

This document comprises the rules for use of Online Communication Tools and Chats by students at Diyafah Schools.

  • In all communications, whether written or oral, be respectful towards classmates, teachers and members in chat or online forum.
  • Do not post images or videos of classmates or any other staff.
  • During conversations, be respectful towards opinions and any interventions by others.
  • Do not write anything or everything in Capital/Block letters as this indicates shouting.
  • Always ensure you check your grammar and spelling, to ensure the correct message is passed and is not misunderstood by others.
  • Any questions raised should be clear and concise, for correct understanding.
  • Use clear and simple language, for effective communication.
  • Always read the messages contributed previously by others and avoid repeating.
  • Remain focused by staying on the topic or theme and avoid personal comments or diverting with irrelevant topics.
  • Be punctual and participate in forums and chats, without leaving it for the last minute.
  • Any ground rules, schedule and/or instructions shared by the teacher for the activity must be adhered to and followed in all online communications including chats and online forums.
  • Be prepared by finishing reading and/or completing activities that have been assigned by the teacher, before participating in chants or online forum.
  • Take advantage of the resources provided by Diyafah Schools, in forums and chats to enrich yourself with information for enhanced learning.
  • Always read and familiarise yourselves with the rules of every chat and/or forum you participate in.

CYBERBULLYING:

Diyafah schools have a zero tolerance approach to bullying.

  • Any instance of bullying, whether Online or on-premises are prohibited, and disciplinary actions as stipulated under Diyafah Safeguarding Policies will be applied, to reported instances which get verified as inappropriate online behaviour.

Diyafah takes all reasonable steps by implementing necessary policies as well as technology tools and solutions, to ensure that students are protected within the school premises and online.

Cyber Addiction:

What is internet addiction?

Internet addiction, which is also called problematic internet use or internet dependency, is a behavioral condition marked by excessive, compulsive, or out-of-control use of the internet that causes problems in many areas of a person's life.

Internet addiction is characterized by an uncontrollable desire to be online, to the point where internet activities dominate and undermine daily routines, social connections, professional or academic performance, and even physical health.

While time spent online can be immensely productive, when it becomes a compulsion it can damage grades, a scholastic career, work, and relationships. When a student feels more comfortable with online pals than off-line friends or can't stop playing games, gambling, or compulsively checking smart devices, that student may have a cyber addiction.

Problematic smartphone or internet use has been linked to lower life satisfaction and mental health symptoms such as depression, low self-esteem, anxiety, lack of sleep and obsessive-compulsive behaviour, with children and young people the most vulnerable.

Signs and symptoms of cyber addiction vary from person to person. Here are some general warning signs:

  • Losing track of time online. Frequently the student loses track of time and stays online longer than intended. Do a few minutes turn into a few hours? Does the student get annoyed if his or her time online is interrupted?
  • Having trouble completing tasks at work or home. Is the student falling behind on homework and studying? Perhaps the student often studies late because he or she cannot complete work on time due to unhealthy online habits.
  • Isolation from family and friends. Is the student's social life suffering because of excessive time spent online? Is the student neglecting family and/or friends? Does the student feel like no one in "real life"—even a girlfriend/boyfriend—understands him/her like his/her online friends?
  • Feeling guilty or defensive about Internet use. Is the student sick of friends, a partner, and/or family nagging him/her to get off the computer or put away the smartphone? Does the student hide Internet use or lie about the amount of time he/she spends on the computer or a smart device?
  • Feeling a sense of euphoria while involved in Internet activities. Does the student use the Internet as an outlet when stressed or sad, or for gratification or excitement?

Internet or computer addiction can also cause physical discomfort, such as the following:

  • carpal tunnel syndrome (pain and numbness in hands and wrists);
  • dry eyes or strained vision.
  • backaches, neck aches, or severe headaches.
  • sleep disturbances; and
  • pronounced weight gain or weight loss.

Social media is one of the main channels via which internet addiction may spread. Users can publish updates, photographs, and videos, as well as like, comment, and direct message others on social media networks.

Parents should also lead by example, modeling healthy internet behavior themselves. Parents can help manage internet addiction in teens by initiating honest conversations about internet use, establishing reasonable and clear boundaries, encouraging alternative activities, monitoring online activities, and leading by example. Parents should talk to their teens about how they use the internet in an open and nonjudgmental way.

Begin the dialogue by expressing your love and care for the well-being of your teen. Instead of using accusing language, focus on your observations and concerns about their internet use. You should also encourage your teens to share their opinions and experiences with the internet. Setting reasonable and clear boundaries on screen time is also essential in avoiding excessive internet use. Establishing precise daily or weekly limitations on gadget usage, for example, especially during study or family time, might help achieve a healthy balance.

At Diyafah Schools, we are committed to fostering a healthy digital environment by implementing the following guidelines:

  • Balanced Digital Screen Time: We prioritize a balanced approach to digital screen time, ensuring that students engage in both offline and online activities. In lessons, 21st century skills like collaboration and critical thinking are emphasised.
  • Mobile Phone Usage: Mobile phones are permitted only with prior approval, allowing us to maintain a focused learning atmosphere.
  • Classroom Device Regulation: Devices are utilized in the classroom strictly according to the device days timetable. To promote active participation and social interaction, device usage is not permitted during break times.

Each one of us must remain aware and act responsibly to keep Diyafah systems safe for each one of us. Safety and security of Diyafah Data is a collective responsibility!

This is a DSafe Initiative by Diyafah Schools, and we request all students and staff to follow the guidelines / policies to ensure online Safety.