Premium Essay

Policy Document

In:

Submitted By RNNHM
Words 1039
Pages 5
This policy sets out requirements for schools to plan and implement appropriate responses to drug related incidents, with an emphasis on prevention through drug education and safe and supportive school environments, and intervention and support for students who may be involved.
1.Objectives - Policy statement
1.1
This policy covers the possession and use of alcohol, tobacco, illegal drugs and the misuse of over-the-counter and prescribed medications, including the supply of restricted substances, on school premises by students. It also covers the possession and use of alcohol and tobacco on school premises by employees and visitors.
1.2
Department of Education and Training (DET) employees are also bound by requirements in the Code of Conduct relating to drugs, alcohol and tobacco.
1.3
Illegal drugs
1.3.1
Schools must be places which are free of illegal drugs.
1.3.2
Principals must manage disciplinary matters involving suspected illegal substances or supply of restricted substances consistent with the Suspension and Expulsion of School Students - Procedures (PD/2006/0316).
1.3.3
Principals must report incidents involving illegal drugs to the School Safety and Response Hotline on 1300 363 778.
1.4
Alcohol
1.4.1
Alcohol must not be consumed or brought to school premises during school hours. This includes employees, students and visitors and other people who use school premises. In the case of cross-sectoral sites (e.g. joint school/TAFE sites), a decision regarding the extent of ‘school premises’ will need to be made in the local context.
1.4.2
The consumption of alcohol is not permitted at any school function (including those conducted outside school premises) at any time when school students, from any school, are present. A school function is any function organised by the school and/or in the name of the school and applies to all types of functions

Similar Documents

Free Essay

Document Retention Policy

...Premier Collage | Document Retention Policy | Litigation Hold Notice | | | 8/26/2113 | Table of Contents 1.0 POLICY STATEMENT ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐---‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 4 2.0 PURPOSE ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 4 3.0 APPLICABILITY ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐--‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 5 4.0 DEFINITIONS ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 5 1. Official Records Retention and Disposition Schedules ------------------------------------------------------------- 5 2. File Breaking ------------------------------------------------------------------------------------------------------------------- 5 3. Litigation Hold -----------------------------------------------------------------------------------------------------------------6 4. File Integrity ------------------------------------------------------------------------------------------------------------------- 6 5. File Maintenance ------------------------------------------------------------------------------------------------------------- 6 6. Personally Identifiable Information ------------------------------------------------------------------------------------- 6 7. Confidential Information ----------------------------------...

Words: 4408 - Pages: 18

Premium Essay

Security Policy Document

...1.0 Purpose The purpose of this policy is to describe the security requirements for Global Distribution, Inc. (GDI). It is important that GDI protects the confidentiality, integrity and availability of information that is essential for day-to-day business operations. This policy will apply to all information that is electronically stored, received, typed, printed, filmed, and generated. Information technology systems are critical for Global Distribution, Inc. interrelationship between data and operations. GDI’s 3,200 employees and contractors are all responsible for protecting information from being accessed by unauthorized persons, modification, disclosure and destruction. An effective security policy sets the guidelines of an organization’s approach to security. The policy varies from a plan, in that a plan is a call to action, while a policy defines the goals of the plan. 2.0 Acceptable use Policy Global Distribution’s network administrator plans to provide a reasonable level of privacy to it users, but all users must note that all data that is created on the corporate WAN and remote facilities (warehouses) is property of GDI (SANS Institute, 2006). In order to protect the network of GDI, any information or data stored on company devices are subject to management monitoring and therefore confidentiality cannot be guaranteed. An audit of the network can be conducted at anytime to ensure that users are in compliance with policies. It is requires that all employees understand...

Words: 2146 - Pages: 9

Premium Essay

Quality Management Systems

...4.0 - QUALITY MANAGEMENT SYSTEMS Section Description 4.1 Quality System Processes Rev: A --- 01/1/04 --- New Bids, Quotations, Orders and Contracts CUSTOMER REQUIREMENTS CUSTOMERS Human Resources Plant, Facility and Equipment Information Resources (Document Control) Communication Customer RESOURCE MANAGEMENT Planning of Product Realization Purchasing and Receiving Production MANAGEMENT RESPONSIBILITY Measuring/Monitoring Devices PRODUCT REALIZATION Management Policies, Planning and Commitments Management Review MEASUREMENT ANALYSIS AND IMPROVEMENT Monitoring/Measurement of Products Monitoring/Measurement of Quality System (QMS) Monitoring Customer Satisfaction CONTINUAL IMPROVEMENT Shipping and Delivery CUSTOMERS Feedback 1.0 Process Approach 1.1 The quality management system is designed as a system of interrelated processes. All main activities in the company are defined as Quality System Processes (QSPs) and are grouped into the following six categories (refer to the diagram at the top of this section): Customer Requirements, Product Realization, Page 1 of 6 4.0 - QUALITY MANAGEMENT SYSTEMS Section Description Measurement, Analysis and Improvement, Management Responsibility, Resource Management, and Continual Improvement, And are organized into a Plan-Do-Check-Act loop. 1.2 The sequence and interrelation between the six groups and individual QSPs are illustrated in a diagram at the beginning of this section (Quality...

Words: 1672 - Pages: 7

Free Essay

Policy Document on Motor Insurance

...Motor Act Policy ACT MOTOR VEHICLE POLICY/CERTIFICATE OF INSURANCE Provided premiums have actually been paid Credit Insurance Zimbabwe Limited (the Company) will provide insurance in terms of this policy in respect of events occurring during the period of insurance or any subsequent period for which they may agree to renew the insurance and except where expressly varied any alterations to the policy whether by means of an endorsement or otherwise shall be subject to the terms exceptions and conditions herein or endorsed hereon. LIABILITY TO THIRD PARTIES 1. SUBJECT to the limits of liability stated in this Policy the Company will indemnify the insured in the event of an accident c aused by or arising out of the use on a road as defined in this Policy of any Motor Vehicle or trailer described in the policy Schedule against all sums including Claimant’s costs and expenses which the insured shall become legally liable to pay in respect of: (a) (b) death of or bodily injury to any person; and/or the destruction of or damage to any property 2. The Company will pay all costs and expenses incurred with its written consent 3. In terms of and subject to the limitations of and for the purposes of this Policy the Company will indemnify any person whom the insured may cause or permit to use such Motor Vehicle provided that: (a) (b) such person is not entitled to indemnity under any other Policy such person shall as though he were the insured observe fulfill and be subject to the terms...

Words: 2297 - Pages: 10

Premium Essay

Document Retention

...Record Keeping has been around for a long time now. Depending on the laws that governed us, we are requiring to maintain records. A good document retention policy could last up to seven years. A litigation hold is basically keeping all records pertaining to the case, or until the case is over. Depending on the records at hand, state and federal laws require organizations to maintain records. During litigation hold notice a good checklist to follow, is a good idea. A document retention policy basically establishes a policy that keeps records of documents and files for a certain amount of period, so that a court can examine a business practices over a time period. Courts and juries don’t have little tolerance for organizations that don’t maintain their records. They often give penalized corporations for keeping their records, by handing out big fines. A document retention policy is established after a litigation hold is given to an organization. Depending on the litigation hold certain documents must be maintain in order to prevent penalties. So if the litigation hold is pertaining to a HIPPA violation at a college, the college must maintain all records to include, emails, documents, faculty involvements, telephone conversations, backup tapes, hard drives, flash drives and etc. The policy has to be clear and understanding to faculty. The files must be in preserved in original format, and cannot be altered at any time. The Sarbanes-Oxley Act of 2002 was passed through the senate...

Words: 1153 - Pages: 5

Premium Essay

Style Guide

...Policy and Procedure Documents Document production, name and storage Documentation should be produced using MS Word 95 or higher. This will ensure portability of files and consistency of operation. Documents should be based on the attached MacVille template and based on MS Word, which incorporate the MacVille Publishing Logos. Directory path | \department name\project name (for example, \Administration\ New_Employee) | File Name | \as above\document version or number\date (for example, \Administration\New_Employee\v1.0\jan_2014) | Extension | Do not include any extension (.doc, .dot, .xls). Allow the type of package used to determine this. | Margins Top 2.54 cm Bottom 2.54 cm Right 2.54 cm Left 2.54 cm Headings Follow logical sequence and format that reflects relative importance. Use a capital for the first letter only and do not underline or use a full stop. 1.0 Section heading 2.1 First subheading 2.2.1 Second subheading Numbering Numbers one through ten are to be written, exceptions include when numbers refer to percentages (5%), time of day (2:00 o’clock), or measurements ( 7 cm, 4 km). Numbers after 10 are to be written as numerals. Fonts Section headings Arial Black size 18 First Subheading Arial Black size 16 Second subheading Arial Black size 14 Body text Arial size 12 Spacing Two spaces after each sentence 2 spaces when indenting for a paragraph. White Space Write so that it is as easy as possible to read and maintain. Adding...

Words: 423 - Pages: 2

Premium Essay

Cgjfjfhjgf

...ARTIFICIAL INTELLIGENCE Artificial intelligence is the intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy, who coined the term in 1956 defines it as "the science and engineering of making intelligent machines. The field was founded on the claim that a central property of humans, intelligence—the sapience of Homo sapiens—can be so precisely described that it can be simulated by a machine. This raises philosophical issues about the nature of the mind and the ethics of creating artificial beings, issues which have been addressed by myth, fiction and philosophy since antiquity.Artificial intelligence has been the subject of optimism, but has also suffered setbacks and, today, has become an essential part of the technology industry, providing the heavy lifting for many of the most difficult problems in computer science. AI research is highly technical and specialized, and deeply divided into subfields that often fail to communicate with each other.]Subfields have grown up around particular institutions, the work of individual researchers, the solution of specific problems, longstanding differences of opinion about how AI should be done and the application of widely differing tools. The central problems of AI include such traits as reasoning...

Words: 7912 - Pages: 32

Free Essay

Metadata

...users navigate libraries effectively and find the documents they require. * Use folders only if you need to scope unique permissions on documents or if you need to make a subset of documents easily offline-able by Microsoft Outlook. * If your library has more than 2,000 items, be sure you remove the out-of-the-box default view, which shows all items. Add views with filters so that no view returns more than 2,000 items. Paging and grouping doesn't count. You must use a filter. (BTW, in its sneak peek of SharePoint 2010, Microsoft announced that SharePoint 2010 will have large-list support, so this won't need to be done much longer.)   1. Usability. Nested folder structure is only known to the person who created it. Also, too many sub-folders tend to “hide” things. 2. URL length limitation. SharePoint adds all folder and sub-folder names to URL. Overall URL length is limited to around 260 characters. You are out of luck if you create too many sub-folders. 3. File URL. Moving file from one folder to another means change of file URL. 4. Security. Maintaining Security by folders in SharePoint is an administrative nightmare. Don’t even think about doing it! 5. User experience. User Experience (navigation, finding the documents) just stinks with folders (it is so 1990’s!) 6. File duplication. With folders you can deposit multiple copies of same file into different locations – not a good thing when you try to organize documents and data in the first place! 7. 1 Lonely View....

Words: 651 - Pages: 3

Premium Essay

Cipd 3rai

...media, such as computer database or paper files. There and advantages and disadvantages to both media: 1.1 Paper records/ Paper Files: A risk analysis needs to focus on the secure storage and the prevention of threats such as fire or theft and relevant personnel can only access those files. There are legal requirements that employees are required to meet in terms of the length of time that specific documents are to be retained, so thought needs to be given to storage space and all files must be easily retrieved and accessed when required. The business must implement and maintain a good document discipline, i.e. no paper should be left laying around for unauthorised access, and a clean desk at night policy must be mandatory. However, there are some benefits to collecting and retaining paper files. Paper files are not susceptible to computer viruses, they are user friendly, and there are benefits to their portability. Paper Files supporting HR: This system of saving files proves particularly helpful while signing important job contacts, Signing of important legal documents that show...

Words: 486 - Pages: 2

Free Essay

Premier College Document Retention Policy

...PREMIER COLLEGE DOCUMENT RETENTION POLICY January 20, 2016 POLICY STATEMENT POLICY STATEMENT Premier College has developed a document Retention Policy to protect and preserve all critical documents as required by state and federal laws. The College is responsible for retaining paper and electronic documents in a safe and secure environment to ensure the basic values of accuracy, confidentiality, security, and proper archiving as well as proper document destruction once documents have served their purpose. This Policy is also for the purpose of aiding employees of the organization understanding their obligations in retaining electronic documents including e-mail, Web files, sound and movie files, PDF, TIFF, TXT files and documents, Calendars, Computer usage logs, Internet usage logs, Databases, and all Microsoft Office or other formatted file. This policy is written with considerations for compliance with federal mandates and acts including The Sarbanes-Oxley Act, Health Insurance Portability and Accountability Act (HIPPA), The Fair Credit and Accurate Transaction Act (FACTA), Gramm-Leach-Bliley (GLB) and other federal, state and local mandates. EFFECTIVE DATE This Policy is effective as of January 20, 2016, (the “Effective Date”) and applies to all documents created after the Effective Date. However, to the extent possible, the Policy will be applied to all documents regardless of creation date. LEGAL HOLD A legal hold suspends all document destruction and...

Words: 5340 - Pages: 22

Premium Essay

Scribd Upload a Document Search Documents

...Scribd Upload a Document Search Documents Explore Documents Books - Fiction Books - Non-fiction Health & Medicine Brochures/Catalogs Government Docs How-To Guides/Manuals Magazines/Newspapers Recipes/Menus School Work + all categories Featured Recent People Authors Students Researchers Publishers Government & Nonprofits Businesses Musicians Artists & Designers Teachers + all categories Most Followed Popular Sign Up | Log In Your Browser is Outdated Because you are not using a modern browser you will not have access to all of Scribd's features. Please consider upgrating to a modern browser: Close This Message Five Paragraph EssayI have never read a story like The Unicorn in the Garden and it definitely it was one of the beststories I have ever read. At the end of the story you don't know if the man really saw an unicorn or made it up so his wife would call the police. It really doesn't matter if he saw the unicorn or made it upthe point is that he gained what he wanted he got rid of his wife.The story also teaches a lesson, every little bad thing you do to someone can backfire twice ashard. The woman had called the police and the psychiatrist in the most meanest intention because shewanted to get rid of him, she did not love him after all. So what the man did was that he gave her of her own medicine, when the police asked if he saw an unicorn he replied using the same words that she hadused previously when he told her that there...

Words: 1015 - Pages: 5

Free Essay

A Class Divided

...3/31/2016 A Class Divided ­ Research Paper ­ Winquist09 Login Join The Research Paper Factory Join Search Browse Saved Papers Search over 100,000 Essays Home Page  »  Other Topics A Class Divided In: Other Topics A Class Divided A Class Divided  Everyone is likely to some form of discrimination or prejudice. On April 5th, 1968, a teacher in Riceville, Iowa named Jane Elliot conducted an exercise on her third grade class students that dealt with the concept of discrimination that would grow up to be a renowned experience. The exercise was the result from Martin Luther King’s assassination. The documentary is an eye opening into the world of racism and discrimination.  The dictionary defines racism as â€œa doctrine that one race is superior†and discrimination as â€œthe denial of opportunities   and equal rights to individuals and groups because of prejudice or for other arbitrary reasons†   Throughout the American society . and through its history you can find discrimination. The documentary shows us that discrimination doesn’t just go to the extent to the color of your skin or what your ethnicity is, but can fall into any physical characteristics, your social status, where youâ €™re from, having a developmental disability, simple as being a woman and what not of other things, and in this case the color of your eyes. Nevertheless, we past judgment and prejudice based on these types of things where the person themselves are not ...

Words: 521 - Pages: 3

Free Essay

Reporting

...Executive Summary: A Business Report is an objective and presentation of information in order to achieve some purpose. It is a basic management tool used in decision making. Report may be classified in different ways. Like on the basis of formalities, On the basis of function, On the basis of frequency of issue etc. The basic objective of the report is to know the salient features of writing report & how the formal reports are important in Business Communication. Business report has no single correct answer but several solutions, each with their own costs and benefits to an organization. Report may be targeted to readers inside or outside the organization. In formal reports we have three parts. Two is Preliminary parts & Report body & the other one is Supplementary parts. With introduction parts the reader can get the assignment main topic & also helps the reader’s follows & understands information. It is an important parts of a formal business report. Supplementary parts view the readers where he found the details of the topic. In formal report readers have the clear facts views. Accuracy of facts, precision, Brevity, Clarity etc are the characteristics of business report. Often reports are structured in a way that reflects the information finding process and the writing up of the findings that is, summary of the contents, introduction or background, methods, results, discussion, conclusion and/or recommendations. The inclusion of recommendations is one reason why reports...

Words: 3609 - Pages: 15

Free Essay

Purpose of an Acceptable Use Policy

...Purpose of an Acceptable Use Policy Name Institution Course Date Purpose of an Acceptable Use Policy Acceptable use policy is an official and legal document that binds the employees of Tata communications to understand that the information and data is the property of the organisations and there are a certain rules that should be abided by when using this information. It secures the rights of a company to enforce certain obligations over them to make sure that they do not indulge in unethical and unprofessional sharing of the information upon which they are working or can access. The acceptable use policy which is taken as an example for the purpose of this paper is of Tata communications, which is the telecommunication company in India. The policy aims to elucidate the guidelines and standards for the employees to make sure that the information privacy and security is not compromised by the employees and that they are well aware of how to use the information. Every new employee at the company is made to go through the acceptable use policy and sign it for future reference. This maintains the check over the usage and sharing pattern of the employees. Each and every point that is central or peripheral to the usage and sharing is mentioned clearly with enough examples and instances to remove any kind of confusion to the employees. Critique the AUP The AUP is very well written and communicated however, there are certain points that can be included...

Words: 953 - Pages: 4

Free Essay

Teaming with Cpa Firm

...profitable We give more than great Write up services We’ve made our write up solutions highly cost-effective and powerful to help CPA firms streamline their processes and foster stronger client relationships. . We never compete with CPA firms Unlike most accounting service companies, Mehta Management LLC never competes with CPA firms or markets our services directly to the clients of CPA firms. Our business is to keep teaming relationships with CPA firms. We guarantee privacy of CPA firm and their clients Mehta Management LLC provides an unprecedented guarantee of keeping privacy of CPA firms and their clients without disclosing our firm’s identity. 2. Document Management System/ Client Document Portal Mehta Management LLC offers a NO COST, strong Document Management/ Client Document Portal to store and share documents and reports without mailing, printing or faxing. It’s no surprise...

Words: 682 - Pages: 3