Post Job Free
Sign in

High School Office

Location:
Irving, TX, 75015
Salary:
100000000
Posted:
January 31, 2018

Contact this candidate

Resume:

Academic Year

****-****

STUDENT CHARTER

*

Please read this document attentively

This document can also be consulted online

on the GGSB student portal: MyGGSB.

3

Student Ethics Charter

By enrolling in Grenoble Graduate School of Business, you are committed to respecting certain character guidelines. We consider the following guidelines to be of particular importance. As a student at GGSB:

1. I will remain informed about my academics through the Student Portal, 2. I will acquaint myself with the rules and regulations (online in the Student Portal) and I will respect their terms,

3. I will submit all documents and information by their deadlines, 4. I will accept the decisions of different panels and I will accept their application procedures, 5. I will promote a professional image when in contact with the business world, 6. I will respect others (schoolmates, interns, Grenoble Ecole de Management staff, neighbors, etc.) and be courteous,

7. I will comply with Grenoble Ecole de Management rules of security (online in the Student Portal),

8. I will comply with the general ban on introducing, stocking, or consuming cigarettes, alcohol and illicit or dangerous substances on school grounds, 9. I will respect the school premises and supplies put at my disposal, 10. I will not commit plagiarism or copy any document or assignment. We remind you that the student card is not transferable. Failure to comply will result in disciplinary action.

Within the framework of classes:

1. I will respect class schedules.

2. I will accept the rules issued by each instructor (grading, closed or open laptops) and I will not negotiate grades.

3. I will not commit plagiarism or copy any document or assignment. 4. I will inform my professor of an upcoming absence. Repeated absences will lead to a zero. Within the framework of internships and cooperation education: 1. I will promote a professional image when in contact with the business world, 2. I will respect the internship agreement.

3. I will abide by the company’s rules and regulations (schedule, confidentiality, dress code, etc.).

4. I will inform the company of an upcoming absence. 5. I will be respectful, most notably, during email exchanges with my collaborators and/or colleagues.

6. I will inform my coach or my school tutor if my assignment within a company does not match the assignment described in the internship agreement. In addition, students will respect the ethical charter of student associations which may be found in the current rules and regulations.

Within the framework of student associations:

General Clauses:

Article 1 In accordance with the law regarding non-profit organizations, associations are secular and democratic; they function in compliance with laws and regulations of the French Republic. 4

Associations are non-profit and their bylaws are filed with the Grenoble Prefecture and communicated to the Dean’s Office of Grenoble Ecole de Management. Article 2 Members of the associations shall behave in a manner that will not damage the image and reputation of Grenoble Ecole de Management.

In this manner, members shall not incur any damage within the framework of association events, more specifically, on the premises of the event, shuttle service, public spaces and the immediate surroundings of Grenoble Ecole de Management.

Article 3 Members of the associations shall only carry out projects which they judge to be feasible and correspond to their abilities; secondly, they shall keep a balanced account without asking the IEP to cover their losses.

Article 4 Members shall not use association events to spread political, religious or personal propaganda. Clubs with specific affiliations are the only exception to this rule. Article 5 Members shall inform the Dean about any changes to the bylaws or decision-making bodies

(board and board members). The list of representatives must be kept up-to-date with their contact information.

Specific Clauses:

Article 1 Association event organizers or students involved in these events shall respect current legislation concerning association events. In addition, members shall inform the Dean of the school about any incident as soon as possible.

Article 2 Participants shall follow the rules decided by the organizers: entry requirements, beverage tickets, rules and regulations, etc...

Article 3 Participants shall not damage the image of the organizing association and more specifically, of the School, with his/her behavior.

Article 4 Participants shall respect the peace when leaving and returning from association events. The use of megaphones is forbidden.

Article 5 Participants shall not bring their own alcohol to an association event and shall not attend events in a state of intoxication.

Article 6 Participants shall not bring any illegal objects or substances. Article 7 Participants shall respect organizers and all persons attending an event: physical, verbal or other type of violence is forbidden.

Article 8 Members of the organizing association are responsible for enforcing this charter and for calling a security service when needed.

Article 9 Should a participant fail to abide by one or more of the above mentioned articles, organizers reserve the right to deny him/her entry or exclude him/her from an evening event, including one or more future event.

Article 10 In the event of a serious violation, a committee will be formed to take disciplinary measures which can result in the participant’s temporary or permanent exclusion. The committee will consist of the head of the Department of Applied Learning, if necessary, a member from his team, the president of the organizing association and the president of the student union (BDE). Updated on 2nd August 2012.

5

Computer Services Charter

The use of computer services and materials provided by Grenoble Ecole de Management. PREAMBLE

This charter’s aim is to set out the conditions and the rules for the use of the computer tools, services, and resources, plus the access to the Internet put at the disposal of users by Grenoble Ecole de Management.

Grenoble Ecole de Management, with the intention of promoting its various programs’ educational objectives, provides its students with access to computer services and equipment (microcomputers, educational software packages, printers, scanners, the short-term loan of laptop computers in an emergency, connection to the Grenoble Ecole de Management network, access to the Internet, to electronic mail service systems, and to the internal portal, etc.). This equipment and these services are reserved exclusively for the use of students who are duly registered on one of the courses at Grenoble Ecole de Management. With the purpose of providing transparency to users, of encouraging an honest, responsible and safe use of the information systems, this charter establishes rules relating to the use of these resources. To ensure that the equipment concerned remains in perfect working order, certain rules must be respected by all users.

Failure to observe any one of these rules is considered an offence to the policies, standards and practices of Grenoble Ecole de Management. Such offenses may lead to disciplinary action as defined by the Charter and the Rules and Regulations of GGSB. RULES RELATING TO USE AND BEHAVIOUR

Each user is held responsible for the sensible use of the computer services to which (s)he has access, so as to avoid any usage of the aforementioned resources that might be deemed abusive and/or inappropriate.

Each user must respect the rules and procedures that have been established for the acquisition and usage of data on the computers put at his/her disposal within the School. Rules for the correct use of computer services

Each user of the School’s computer resources must commit to respect the rules regarding the professional ethics of computer use. Notably, (s)he must not intentionally conduct any operation with any of the following objectives:

Hiding his/her true identity,

Usurping the identity of any other individual,

Appropriation of another user’s password,

The installation of any program to bypass security measures,

The installation or use of any software package whose aims do not conform with the School’s missions,

6

The non-respect of the access rules established for any of the rooms within the School containing computer equipment,

The use of accounts belonging to users other than those to which (s)he has legitimate access,

The use of a workstation or any other computer resource without the explicit permission of the person to whom this is allocated,

The obtaining of access to another individual’s data without the express agreement of the holder of this data, even when the data in question has not been explicitly protected,

The creation or generation of data that either saturates the network or results in a degradation of the equipment in question’s resources. Each user must commit him/herself to not carry out operations which might have a negative impact on or damage the functionality of the network, the integrity of the computer tool in question and/or the School’s internal or external relationships.

Please note that users will be reprimanded and punished for accessing a system without the express authorization to do so. This remains valid, even when there is no change to the data therein or the functioning of the system in question. Offenses include any act considered to prevent a system from functioning effectively, for example the introduction of a virus, or the introduction/fraudulent modification of its data.

CONSERVING THE INTEGRITY OF THE INFORMATION SYSTEMS Each user must commit him/herself to not carry out operations which might have a negative impact on or damage the functionality of information systems and network, through abnormal handling of material or the installation of viruses, Trojan horses or logic bombs... Respecting ownership rights

Data published on the Internet must have been obtained lawfully and must not breach the rights of any third party. Thus, the use of computer resources and particularly of the Internet must at all times respect the ownership rights of others, and in particular:

The use of any software package on the network or on an independent machine must be carried out with due respect to the terms of its licence of use,

It is strictly forbidden to copy commercial software packages (with the sole exception of the School’s back-up copy),

All users must respect the intellectual copyright on protected works (books, logos, musical pieces, images, software packages etc.), where these explicitly forbid the use, reproduction or exploitation of these works without the express permission of either the author or the licence holder of the work in question. Respecting individuals’ rights

Each user is therefore forbidden to cause detriment in any way to the private life of others, notably via the transmission without his/her consent of any picture/photograph or piece of writing which was provided for private or confidential purposes. In general, each user must at all times ensure that (s)he respects the character, privacy and private life of others, including minors.

Respecting the peace

The Internet must not be used as a means for any provocation. To this end, all users must act in a way so as to respect the peace. Notably all users must abstain from provoking any malicious act, regardless of its nature (for example, disturbing the peace, or inciting racism, terrorism, suicide) or from the dissemination of any message of a violent nature which might undermine human dignity. 7

Limits to access rights

The right to access resources is limited to activities which conform to the School’s missions, namely initial and lifelong learning education, research and the promoting of its results, and the dissemination of culture and information. In addition, the range of computer resources to which an individual user has access may be limited; contingent to the user in question’s actual needs and the constraints imposed by the sharing of these resources with other users. All access rights are temporary in nature and will be removed in the case where the individual user demonstrates that his or her access is no longer justified. This access right can also be removed as a preventative measure if the behaviour of an individual user is shown to no longer be compatible with the rules laid out in this charter.

In this manner, users may access the Internet.

However, for security reasons, access to certain sites may be limited or forbidden by Grenoble Ecole de Management.

In this regard, users shall not use the Internet to access online gaming and downloading systems. Security

Security is everyone’s business, and all users of the School’s computer services and network are expected to contribute to the implementation of certain simple precautions:

In the case where you are not attributed a password by the Computer Department, choose your own secure password and keep this a secret,

Never give your password to a third party,

Never display your password. Where possible, change your password frequently,

Never leave your workstation with a session open,

Do not lend your account to another person,

You must report any attempt to access your account, or any interference with/intrusion on computer equipment belonging to the Computer Department.

Assure at all times the durability of your files and the integrity of your workspace A user must never leave his or her workstation, without first signing out of his/her account. Confidentiality

Users must respect confidential content, and in particular:

Refrain from reading, copying, disclosing or modifying another user’s files without explicit consent by its owner and/or author,

Refrain from intercepting private messages between other parties (mail, chat, etc.) Behaviour

It is strictly forbidden to smoke, drink or eat whilst using any computer that has been put at your disposal.

It is strictly forbidden to move any work unit. Please note that each unit is composed of a microcomputer or thin client, a screen and/or a number of peripheral devices (mouse, webcam, headphones, etc.)

To allow each individual to work in a quiet atmosphere, mobile telephones must be switched off whenever you are in any room that is equipped with computers (whether this is the computer rooms, the library, or any other such room).

The workstations’ set-up must not be modified, and cables must not be disconnected. Any brakeage of or malfunction relating to a machine belonging to Grenoble Ecole de Management must be immediately reported to the support team. This latter will ensure that the equipment is put back into full working order in the shortest timeframe possible (contact the e-center). 8

Any workspace you use must be left clean and tidy when you leave it. THE COMPUTER STATIONS AND SUPPORT SERVICES AT YOUR DISPOSAL: Open-access computer equipment is available:

In the Libre Service Informatique (LSI) room (the open-access computer room) and in the library, during the opening hours, as indicated on the front door.

In the School’s corridors and open spaces during the School building’s opening hours.

In the language laboratory and the rooms reserved for computer classes, under the supervision and responsibility of a member of teaching staff. A computer support service is available at the hours indicated at the student support counter (on the ground floor). This service provides support for students in the use of all computer equipment, whether personal or provided by the School. It also has a remit to loan replacement equipment in the case of a malfunction.

CONDITIONS OF USE FOR PERSONAL COMPUTERS

In order to benefit fully from GEM’s network services, it is imperative that all personal computer equipment respects the following rules:

1. The operating system used must conform to Windows XP or Windows Vista or Windows 7 standards. No guarantees are given regarding the use or support of other operating systems. 2. All commercial software packages installed on personal computers must be accompanied by a user’s licence.

3. All personal computers must be equipped with anti-virus and anti-spyware software. 4. The operating systems of all software protecting personal machines must permit essential updates to their effectiveness.

The access to the School’s computer resources (intranet, access to the internet, email services etc) may be refused if an individual’s personal computer is deemed to be a non-secure environment. Should a user access the information systems with outside equipment, notably by connecting removable media (e.g. USB keys) to the School’s equipment, he/she must ensure it is secure and harmless

USE OF ELECTRONIC MAIL SERVICES

This paragraph has two objectives:

To set out the ethical principles relating to the correct use of the electronic mail services,

To give precisions on the legal position and internal regulations applicable to electronic mail services.

The nine rules that must imperatively be followed are listed below: 1. An electronic mail is the equivalent of a letter. Its content must adhere to the rules of good manners and respect the legislation that is currently in place: It must not damage an individual’s private life, it must not contain comments or terms that are abusive, insulting, obscene, slanderous, or of a harassing nature.

2. The applicable legal provisions concerning the rights of the author must be respected. 3. Electronic mail services must not be used for private commercial purposes. 9

4. The text of a message that has been received and subsequently forwarded to a third party must conform to the original text and cannot be modified. 5. The pertinence of the content of messages received must be evaluated before any response is sent.

6. Each user must exercise caution with regards to any email (s)he receives with attachments when (s)he does not know the sender. The possibility that the attached file might contain a virus is consequently higher.

7. Users must inform the support services whenever they receive a message with illegal or questionable contents.

8. Users must not send files as attachments which are bigger than 5 MB. 9. The use of groups for correspondence (distribution lists) along with the sending of any email to multiple addresses (mass mailing) is strictly forbidden. Should a user need to send an email to multiple recipients, a special dispensation can be accorded on a case by case basis. To obtain this, (s)he must send a request justifying his/her need to the Senior Management at GGSB or Grenoble Ecole de Management (depending on the distribution list). The use of distribution lists is strictly the preserve of the School’s administration services and to student associations.

CONDITIONS RELATING TO ACCESS TO THE SCHOOL’S LOCAL AREA NETWORK (LAN) AND TO THE INTERNET

The computer resources and Internet services at Grenoble Ecole de Management are at the disposal of users for the purposes of teaching, culture, research, and for the dissemination of scientific and pedagogical information.

Given that a network is characterised by the interdependence of its users, any trouble or malicious act can negatively impact on the whole community. To ensure that the network remains fully functioning and that all its users are respected, Grenoble Ecole de Management subscribes to a code of conduct which must be respected with regards to the use of the Internet. In order to access Internet services, users must commit to follow the terms laid out in this charter and notably to the rules relating to use and behaviour. The access to computer services and to the Internet is strictly personal and non-transferable. This access is granted for professional ends, viz. teaching, research, technical developments, the transferral of technologies, the dissemination of scientific, technical and cultural information, and the trialling of new services which are technologically innovative in their nature. In this regard, all use of computer resources and of the Internet via the School network for commercial or personal ends (outside of activities linked to education, culture, or research), or for the purposes of playing (“online” multimedia games, downloading Peer to Peer, and other similar activities) is strictly forbidden. Under no circumstances can any user give a third party access to the Internet network, and this regardless of whether this access is for commercial gain or not, or whether or not it is remunerated.

The use of online gaming within a pedagogical framework will be studied by the Information Systems Management Team on a case by case basis.

10

SANCTIONS TO BE INCURRED

The one-off or repeated non-respect of the rules given above may lead to the following decisions/actions:

The closure of an account for a period of two weeks,

The total closure of an email account, in the case of a serious infringement of the rules, or when reoffending reaches such proportions that the majority of the users suffer as a result of this.

Removal of all access to GEM’s resources.

A letter of warning from the School’s Senior Management Team.

Additional sanctions established in the School’s Rules and Regulations.. Furthermore, non-respect of these rules can lead to prosecution through the courts of law. For legal reasons, Grenoble Ecole de Management, in acting as a provider of Internet access, is under obligation to keep an historical log of the totality of Internet connections, and this for a period of one year. This data may be used in the case of legal proceedings. Updated on 2nd August 2012.

11

School Rules and Procedures regarding the Dieter Schmidt Library Within the framework of its pedagogical activities, Grenoble Ecole de Management puts at the disposal of its users a Library, consisting of both onsite and online documentary resources and open- access computer equipment.

In order that these different resources and equipment remain available for the use of everyone, it is imperative that certain rules be respected. Failure to observe these rules will lead to sanctions that fall within the jurisdiction of the Senior Management Team at Grenoble Ecole de Management. CONDITIONS FOR ACCESS TO THE LIBRARY

The Library is open to all Grenoble Ecole de Management students and staff. The library staff may request the presentation of the student card or identification badge of the staff. Any user who finds that the Library’s anti-theft portico alarm sounds as they go through this, is required to show his/her personal possessions to the staff at the welcome point. CONDITIONS FOR WORK AND QUALITY

So as to meet its mission as a pedagogical centre and a study room, it is essential that silence is maintained in the Library. As a consequence, all communications by mobile telephone are not permitted within the Library.

All users are expected to contribute to maintaining the quality of the workspaces provided. These latter must be left clean and tidy upon the departure of each user: documents put away on shelves, trash in bin. In addition, the display of unauthorized posters is not tolerated. The Library is not liable for theft or less of personal property: found objects are regularly deposited in a place designated by the School for this purpose. CONDITIONS REGARDING THE USE OF COMPUTER EQUIPMENT The Computer Services Charter applies to the open-access computer equipment in the Library. It is formerly forbidden to move the individual workspaces or to install any software onto these. Each time a workspace is used, the user in question is responsible for ensuring (s)he leaves it tidy (closing down all applications and signing off from his/her account). The general computer charter is also applicable for all free-access computer equipment in the library. Any breakages and/or the poor functioning of a piece of material must be immediately reported to the librarian at the welcome point, who will ensure that the relevant services are contacted and the item is restored to full working order.

CONDITIONS REGARDING THE USE OF DOCUMENTARY RESOURCES The vast majority of documentation in the Library is open-access. Therefore, all users are responsible for respecting the filing system, as per the Management Thesaurus. With regard to online documentary resources, Grenoble Ecole de Management’s Library signs users’ licences with different providers. These licences allow its users to access data banks which are uniquely reserved for teaching and research purposes. Users are strictly forbidden from passing on, disseminating or making accessible in any way to non- authorised users any information obtained from the School’s resources. 12

CONDITIONS FOR THE LOAN OF DOCUMENTS

The student ISIC card is necessary for the borrowing of documents. It is personal and may not be lent.

In addition, users are responsible for documents they borrow. It is forbidden to write, underline or highlight texts in the books.

COPYRIGHT LAWS

Grenoble Ecole de Management has signed a contract with le Centre Français du Droit de Copie (the French centre for all issues relating to copyright matters) with regard to photocopies made of protected works within the School building. All users must respect the regulations relating to copying works and ensure that they refrain from copying an entire protected work, or a significant part of one of these.

SANCTIONS TO BE INCURRED

When a user does not respect the deadline indicated for the return of documents, and if

(s)he fails to respond to a second electronic reminder, (s)he is subsequently banned from loaning further documents for a number of days corresponding to the number of days of the late return of the previous document. Failure to respond to the registered letter, which follows e-mails reminders, the user is excluded from borrowing from the Library.

Where a user loses a document borrowed from the Library, (s)he will need to either replace or reimburse the document in question.

Should a user fail to respect the rules regarding discipline, should documents or materials be damaged, or should a user attempt to steal a document, then (s)he will be banned from borrowing any documents for one month, and (s)he will be liable to a disciplinary hearing. Updated on 2nd August 2012.

13

GEM Graphic Style Guide

Students may use Grenoble Ecole de Management graphic elements in two cases: Student Association Activity

Each student association has its own visual identity.

Student associations may not use Grenoble Ecole de Management graphics or logos. Student associations that have signed a partnership with the School are exempt from this condition. In this case, a contractual document is signed by the student association, Grenoble Ecole de Management’s Senior Administration and Communications Department.

Documents issued by a student association partnered with the School must be approved by the Communications Department and an order form must be signed by the DIKOMO Service

(communications and marketing). The Communications Department provides the associations with the necessary elements (logos, rules for use, etc.) to create their documents.

Contact Djoulia Houzet, an assistant at the DIKOMO Service (office S447 – 4 Place Robert Schuman) for more information relating to the Grenoble Ecole de Management style guide. Individual Students

The use of the logo and other elements from the Grenoble Ecole de Management style guide is forbidden on any document (whether it is for external or internal use). The logo appears only on documents issued or provided by Grenoble Ecole de Management. MEMO FROM THE COMMUNICATIONS DEPARTMENT

New students to the Association Track are reminded that all communications issued by their association intended for external communication must be approved by the School’s Communications Department. Here are some points to keep in mind for all of your future communication needs:

If you wish to mention the School, only mention GEM. You belong to a student association, which depends on Grenoble Ecole de Management. Avoid using Gem and Grenoble EM!

Logo to use: GGSB (request a high definition logo at ac39xl@r.postjobfree.com)

Use the following email address: ac39xl@r.postjobfree.com. We would also like to remind you that promotional documents for your projects (posters, pamphlets, flyer, web, t-shirt must be approved by the Communications Department BEFORE printing and of course, before distribution.

Remember that we cannot review your documents when we receive them! Allow two to five days depending on the document and keep in mind that we need time for potential corrections. Our objective is not to reread your document. It is to ensure that there are no errors in the information relating to the School and the use of its logo. You may contact Djoulia Houzet for an appointment on Thursdays from 2:00 PM to 5:00 PM for document approval or questions relating to the School’s graphic style guide. Do not hesitate to make an appointment at 04.76.70.65.11 or ac39xl@r.postjobfree.com. Updated on 2nd August 2012.

14

CDPM Student Charter

PREAMBLE

The Center for Personal and Managerial Development is dedicated to working with a large number of students every year within the context of individual interviews or conferences and workshops it organizes.

This demand has revealed a need to draw up a student charter which sets out both their rights and obligations, notably with regard to the rules of functioning necessary to ensure quality reception and service.

STUDENT RIGHTS

Students are entitled to the acknowledgement and practice, with full equality, of rights and liberties without distinction, exclusion or preference based on race, color, gender, sexual orientation, age, religion, political affiliations, ethnic or national origin, social condition, disability or use of a resource to overcome the



Contact this candidate