ICT Security Policy for Schools

Size: px
Start display at page:

Download "ICT Security Policy for Schools"

Transcription

1 WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite years Annually Amendments 2014 JA Page 1 of 8

2 PJT/ckm/ja July 2014 Dear Parent / Carer ICT and Internet Use As part of the school curriculum at Wolgarston High School, we offer students limited access to the Internet. Before being allowed to use the Internet, all students must obtain parental permission and there is a completion page enclosed for you to return. The Internet is a global network of computers containing thousands of libraries, databases and bulletin boards that can support students learning in all areas of the curriculum. However, parents should be advised that some material accessible on the Internet might contain items which are illegal, defamatory, inaccurate or potentially offensive to users. During school time, teachers will supervise and guide students towards appropriate materials. The school s Internet Service Provider (Internet for Learning by Research Machines) will employ measures to protect against access to inappropriate materials. Inappropriate use of computer systems is detected and monitored. Students using the resources inappropriately will be dealt with according to the sanctions of the school s Behaviour for Learning policy. These procedures should ensure that students only use the Internet to further educational goals and objectives. We believe that any disadvantage of the Internet is outweighed by positive benefits to the students in enhanced learning opportunities. However, the school respects the right of each family to decide whether or not to apply for access. Please find attached a copy of our ICT and Internet Use Good Practice rules which your son / daughter will be expected to follow, if you agree to use of the Internet. Each student will then be given an individual password and user area which, as stated in the rules, must remain secret so that it allows secure use only by the student. Yours sincerely Philip J Tapp Headteacher Page 2 of 8

3 Responsible ICT and Internet Use e-safety in School Wolgarston Commitment: Wolgarston is committed to following the (ICT) Security Policy for Schools developed by Staffordshire County Council. This document is reviewed annually. The full details of this policy can be found by accessing Wolgarston High School web site: and clicking on the About the School tab and accessing School Policies. A hard copy of this is available upon request from office@wolgarston.staffs.sch.uk. Wolgarston aims to provide a safe environment to all users and to support this we employ SECURUS network monitoring. This provides us with detailed information of inappropriate activity of any network user. Inappropriate use is always acted upon, by reporting to the e-safety Officer/Headteacher and any relevant external authorities. The school publishes an annual Wolgarston High School ICT Acceptable Use Document for students, which they and their parents must sign up to prior to access to the Internet being granted for any school year. For school purposes, Internet use encompasses and any other messaging systems. The e-safety Strategy Will: Allow young people to develop their own protection strategies for when adult supervision and technological protection are not available. Give adequate information on where to seek help and how to report incidents. Ensure young people understand that there are sanctions that the school will impose on them if they act inappropriately when online. Provide guidelines for parents, carers and others on safe practice. Ensure policies are regularly monitored and reviewed with stakeholders. Ensure technological solutions are regularly reviewed and updated to ensure maintenance of an effective e-safety programme. Students accept each time they access our system to abide by the policy Page 3 of 8

4 Student Guidelines for Internet Use General The Internet, primarily, is provided for students to conduct research and back up their work. Parent s / carers permission is required before a student is granted access. Access is a privilege not a right and that access requires responsibility. Individual users of the Internet are responsible for their behaviour and communication over the network. Users must comply with school standards and honour the agreement they have signed. Computer storage areas, including any external storage media brought to school, may be reviewed by staff to ensure that users are using the system responsibly. Users should not expect that files stored on servers or storage media are always private. For school purposes, Internet use encompasses and any other messaging systems. During school, teachers will guide students towards appropriate materials. Outside of school, families bear responsibility for such guidance in the same way as they deal with information sources such as television, telephones, movies, radio and other potentially offensive media. The following are not permitted within the school environment: Sending or displaying offensive messages or pictures. Using obscene language. Accessing inappropriate web sites Harassing, insulting or attacking others. Damaging computers, computer systems or computer networks. Violating copyright laws. Using others passwords or accounts. Hacking into others folders, work or files for any reason. Intentionally wasting limited resources, including printer ink and paper. Sanctions 1. Violations of the above rules will result in a temporary or permanent ban on internet/computer use. The school runs a system called Securus which reports inappropriate use and operates at a high level of accuracy. 2. Students parents/carers will be informed. 3. Additional disciplinary action may be added in line with existing practice on inappropriate language or behaviour. 4. When applicable, police and/or local authorities will be involved. 5. If necessary, external agencies such as Social Networking or Member sites will be contacted and informed. 6. A record of all unacceptable use will be kept and reported to Senior Management. Page 4 of 8

5 Individual Students 1. You must have your parent s/carer s permission before using the Internet. 2. You must have a supervising teacher or member of staff with you at all times when using the Internet. 3. Do not disclose any password or log-in name to anyone, other than the persons responsible for running and maintaining the system. 4. Do not upload/send personal addresses, telephones/fax numbers or photographs of anyone (staff, governors or students) at the school. 5. Use of names of students, or photographs of students, will require parents to have been informed about such use. 6. Do not download, use or upload any material which is copyright. Always seek permission from the owner before using any material from the Internet. If in doubt, do not use the material. 7. Under no circumstances should you view, upload or download any material which is likely to be unsuitable for children and young adults. This applies to any material of a violent, dangerous or inappropriate context. If you are unsure always ask a member of staff. 8. Always respect the privacy of the files of other users. 9. Be polite and appreciate that other users might have different views than your own. The use of strong language, swearing or aggressive behaviour is not allowed. Do not state anything that could be interpreted as libel. 10. The internet will be used for appropriate educational use only. Access to Internet games or social network sites is prohibited. 11. Ensure that you have followed the correct procedures for using the Internet and report any incident which breaches these rules to a member of staff. Any messages received which are offensive should be reported to a member of staff. 12. Never take any action liable to bring Wolgarston High School into disrepute. Please note that this policy is produced in line with accepted DCSF guidelines, produced following a case study into cyber bullying. Statement The school has opted to adopt the Staffordshire County Council ICT Security Policy for Schools: ttp://education.staffordshire.gov.uk/nr/rdonlyres/9fab282f-8f35-46dd-a3a7- C06A19B85BD3/24533/ICTSecurityPolicyforSchoolsver02.doc Page 5 of 8

6 Bring your Own Device Policy (BYOD Policy) (6 th Form, Staff and certain SEN students) Statement Staff and students may want to use their own personally owned or school provided device such as laptops, tablet systems, netbooks or other devices to connect to the secure school systems to access or resources. Aim To define the requirements for students and teachers to implement practices to ensure users understand and comply with the school policy for connecting personal devices to the schools systems and network. Policy Details All users of the managed wireless must understand that whenever a user connects a device to the schools network that they will be held personally responsible for any breach of security of the network or data. The following list details some of the risks which need to be considered by users: Introducing viruses, spyware or other malware onto the school systems. Purposefully or inadvertently copying sensitive and or proprietary school information to either named or unauthorised devices which could lead the school in breach of the data protection act. Introducing a technical or network incompatibility to the school that the user may not even be aware of. Jail broken hardware may lead to software vulnerabilities potentially being introduced to the school network. Purposefully or inadvertently downloading software which will bypass security Any of these circumstances could interrupt school continuity, cause unplanned downtime and/or cause a data breach of sensitive school data to unauthorised parties. In a worst case scenario civil and criminal penalties for the user and/or substantial expenses to the school could arise. Access to the Managed Wireless is limited to internet use only and is filtered in accordance with the ICT Security Policy. The following items are covered by the schools BYOD policy. Laptops Notebooks Tablet Devices Netbooks Page 6 of 8

7 Each user is only permitted to have a single device at any one time used within school using the BYOD policy. Smart phones with or without a SIM card, Portable game consoles, MP3 Players, I-Pod Touch s or other similar devices are NOT permitted to be added to the schools managed wireless. BYOD Authorisation Process In order for any device to access the schools Managed Wireless the following steps must be completed. 1. The user must complete a BYOD request form (available from the Business Office). 2. The ICT Technical team will run a thorough check on all personally owned or school provided device to check for the following a. IP address settings and third party software or applications that could cause introduce network or application incompatibilities. b. Ensure the device has no virus, spyware or malware infections, checking antivirus software is up to date and working. c. Ensure the device has a password lock configured onto the device. d. Log onto the Managed Wireless and ensure that it is properly configured. 3. If a user ceases to use, loses or misplaces a personally owned or school provided device they must inform the ICT Technical team immediately of the potential security risk. 4. In the event that a user believes their device could be infected with a virus, spyware or malware, the user must inform the ICT Technical team immediately of the potential security risk. 5. No data can be stored or sent via external (e.g. Hotmail) if it identifies an individual or an organisation as this would circumvent the schools Acceptable User Policy and the Data Protection Act. 6. The School SEN Co-ordinator will advise on students permitted to bring their own device to school. Commitment As a school, we are committed to making continuous improvement in all aspects of school life. This statement of forms part of the ICT Security Policy of the school in that it is subject to monitoring, evaluation and modification. It will be reviewed annually. Responsibilities The school will ensure that access is available from key locations around the school. Staff and students must enter into a formal agreement to ensure that all users are aware of their responsibilities; any misuse of the wireless network will result in either of the following, the removal of internet access or their user account. Page 7 of 8

8 Users who bring their personal device to use at Wolgarston High School, do so at their own risk. Wolgarston High School is not responsible for maintenance or upkeep of personal devices, this includes keeping it charged, installing updates or upgrades, fixing any software or hardware issues and devices that are broken, lost or stolen. Ultimate responsibility for this policy s introduction and implementation lies with the Head Teacher in consultation with the Governing Body. It is important to recognise that all staff, students and parents/carers have an active part to play in the evolution, development and maintenance of this policy. Page 8 of 8

Acceptable Use of Internet and Digital Technology

Acceptable Use of Internet and Digital Technology Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB on: Reviewed policy shared with staff on: Policy to be reviewed again on: Committee responsible for review: Acceptable Use

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.

Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the

More information

INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET

INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET ACCEPTABLE USE POLICY As part of the College IT programme we offer pupils filtered access to the Internet. Before being allowed to use

More information

Simon Langton Grammar School for Boys E-Safety Policy

Simon Langton Grammar School for Boys E-Safety Policy Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Acceptable Use of Internet and Digital Technology

Acceptable Use of Internet and Digital Technology Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB: Autumn 2015 Reviewed policy shared with staff: Autumn 2015 Policy to be reviewed again: Autumn 2016 Committee responsible

More information

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program. Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring

More information

Bright Local Schools BYOD Acceptable Use Policy

Bright Local Schools BYOD Acceptable Use Policy Bright Local Schools BYOD Acceptable Use Policy Why Bring Your Own Device at Bright Local Schools? Bright Local is dedicated to providing 21st Century instruction to all its students. We feel we must provide

More information

FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:

FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review: FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer

More information

Responsible Computer Use Policy for Students

Responsible Computer Use Policy for Students Responsible Computer Use Policy for Students Introduction By using the Sheldon College Network and ICT Services students agree to accept the terms and conditions outlined in this document. This policy

More information

How To Understand The Bring Your Own Device To School Policy At A School

How To Understand The Bring Your Own Device To School Policy At A School The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS

More information

ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS

ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS Contents:- 1. College policy. 2. Roles and Responsibilities 3. College procedures. 4. College rules for internet use by students. 5.

More information

Acceptable Use Policy (AUP) School Computing

Acceptable Use Policy (AUP) School Computing Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,

More information

Berwick Academy Policy on E Safety

Berwick Academy Policy on E Safety Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident

More information

How To Ensure Your School Is Safe Online

How To Ensure Your School Is Safe Online Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of

More information

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3

More information

Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014

Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014 Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014 Why Bring Your Own Device? Technology is now an essential part of education. To be able to live,

More information

Vail School District Acceptable Use Policy 2015 2016

Vail School District Acceptable Use Policy 2015 2016 Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will

More information

How will pupils gain access to the Internet and VLEs at Saintfield High School?

How will pupils gain access to the Internet and VLEs at Saintfield High School? SAINTFIELD HIGH SCHOOL POLICY FOR THE ACCEPTABLE USE OF THE INTERNET AND VIRTUAL LEARNING ENVIRONMENTS What is the Internet? The Internet is an electronic information highway connecting many thousands

More information

Acceptable Use of ICT Policy. Learner School Policy

Acceptable Use of ICT Policy. Learner School Policy Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Bring Your Own Device (BYOD) Usage and Network Access Guidelines. Rules and Requirements

Bring Your Own Device (BYOD) Usage and Network Access Guidelines. Rules and Requirements Bring Your Own Device (BYOD) Usage and Network Access Guidelines Technology has become an essential part of education at Columbus County Schools. Students today have access to a wide variety of mobile

More information

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including

More information

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device)

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...

More information

BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy

BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy Approved by Leadership Team 27 th April 2016 Approved by the Governing Body: 18 th May 2016 Review Due: May 2017 Rationale The Beaconsfield

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

St Vincent s Catholic Primary School e-safety Policy

St Vincent s Catholic Primary School e-safety Policy St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety

More information

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage. Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Acceptable Media Use and Bring Your Own Device (BYOD) Policy

Acceptable Media Use and Bring Your Own Device (BYOD) Policy Acceptable Media Use and Bring Your Own Device (BYOD) Policy Author: Mr Joe Cowell Headteacher Date Ratified by Governors: September 2015 Date of Review: September 2018 Wollaston School Acceptable Media

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

Archbishop Beck Catholic Sports College

Archbishop Beck Catholic Sports College Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety

More information

John of Rolleston Primary School

John of Rolleston Primary School John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership

More information

Related Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities

Related Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities Category Security Document Name e-safety Procedures Accountable Body Brantridge School Governing Body Reference SY.P2.02 Date Ratified Version 2.1 Last Update March 2015 Related Policies & Documents Document

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

St Bernadette s Catholic Primary School. E-Safety Policy

St Bernadette s Catholic Primary School. E-Safety Policy St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational

More information

E- Safety and Digital Photography - College ICT

E- Safety and Digital Photography - College ICT Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,

More information

Acceptable Use Policy - Staff

Acceptable Use Policy - Staff Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education

More information

Bring Your Own Device (BYOD) Student, Teacher and Parent Guide

Bring Your Own Device (BYOD) Student, Teacher and Parent Guide Bring Your Own Device (BYOD) Student, Teacher and Parent Guide Appleton Area School District (AASD) is committed to moving students and staff forward in a 21 st century learning environment. As part of

More information

E-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy

E-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy E-Safety Policy Reviewed and Adopted: July 2014 Reviewed by: HT/ LTS Next Review: July 2015 Annual Policy 1 1. Introduction Internet is an essential element of life in 21st Century; it is also a part of

More information

4. The Importance of Internet Use in the Primary Curriculum

4. The Importance of Internet Use in the Primary Curriculum Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

Regional School District No. 7. Bring Your Own Device (BYOD) and Protocol for the Use of Technology in the Schools

Regional School District No. 7. Bring Your Own Device (BYOD) and Protocol for the Use of Technology in the Schools 6141.328(a) As new technologies continue to change the world in which we live, they also provide many new and positive educational benefits for classroom instruction. To prepare students as 21 st century

More information

1. Introduction. 2. Roles & Responsibilities. Governing Body. Headteacher

1. Introduction. 2. Roles & Responsibilities. Governing Body. Headteacher Category Security Document Name E-safety Procedures Accountable Body Grafham Grange School Governing Body Reference SY.P2.01 Date Ratified 27 th August 2015 Version 1.0 Last Update August 2015 Related

More information

E Safety Policy. 1.0 Background

E Safety Policy. 1.0 Background E Safety Policy 1.0 Background New technologies have become integral to the lives of children and young people in today s society, both within the UTC and in their lives outside the UTC. The internet and

More information

CYBERSAFETY USE AGREEMENT for Cambridge High School Students

CYBERSAFETY USE AGREEMENT for Cambridge High School Students CYBERSAFETY USE AGREEMENT for Cambridge High School Students Cambridge High School This document is comprised of this cover page and three sections: Section A: Introduction Section B: Cybersafety Rules

More information

Responsible Use Agreement

Responsible Use Agreement BYOD is an acronym for Bring your Own Device. For BYOD, a "device" is a privately owned laptop, tablet computing device, netbook, notebook, e-reader, ipod touch (or similar), or cell/smart phone. For the

More information

TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+

TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ BYOD (Bring Your Own Device) Technology Acceptable Use Washington District Schools provides all students access to technology, the district

More information

Albany Senior High School

Albany Senior High School Albany Senior High School Bring your own device (BYOD) Usage Policy for Students and Parents BYOD Usage Policy S:\AdminShared\Teaching Staff\ICT\BYOD\BYOD Policy for Parents.doc Table of Contents 1 Introduction

More information

South Sydney High School Bring-Your-Own-Device (BYOD) Policy

South Sydney High School Bring-Your-Own-Device (BYOD) Policy South Sydney High School Bring-Your-Own-Device (BYOD) Policy Bring your own device (BYOD) refers to technology models where students bring a personally owned device to school for the purpose of learning.

More information

SPOTSWOOD COLLEGE. BYOD Acceptable Use

SPOTSWOOD COLLEGE. BYOD Acceptable Use SPOTSWOOD COLLEGE BYOD Acceptable Use BYOD = Bring Your Own Device BYOD Agreement Form and Protocol for the Use of Technology As new technologies continue to change the world in which we live, they also

More information

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology

More information

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School: Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership

More information

HAZELDENE LOWER SCHOOL

HAZELDENE LOWER SCHOOL HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016

More information

Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016

Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 PURPOSE Christian Academy of Knoxville provides technology resources for the school community with a belief that the educational

More information

Protocol for Acceptable Use of Internet and Email by Staff E-Safety Procedures Safeguarding & Child Protection Policy

Protocol for Acceptable Use of Internet and Email by Staff E-Safety Procedures Safeguarding & Child Protection Policy Category Document Name Accountable Body Security E-Safety Policy RADIUS Trust Reference SY.P2 Date Ratified 11 th December 2014 Version 3.1 Last Update 31 st March 2015 Related Documents Document Protocol

More information

SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY DATE: MARCH 2015 REVISION DATE: MARCH 2017

SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY DATE: MARCH 2015 REVISION DATE: MARCH 2017 SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY 1 DATE: MARCH 2015 REVISION DATE: MARCH 2017 Background / rationale New technologies have become integral to the lives of children

More information

Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy)

Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy) Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy) What is E-Safety? E-Safety encompasses Internet technologies and electronic communications such as mobile

More information

Roskear Primary & Nursery School. E-Safety Policy

Roskear Primary & Nursery School. E-Safety Policy E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed

More information

Years 3-7 Acceptable Use Policy & Agreement

Years 3-7 Acceptable Use Policy & Agreement Years 3-7 Acceptable Use Policy & Agreement Reidy Park Primary School is committed to enhancing teaching and learning through the safe use of information and communication technologies (ICTs). We require

More information

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement 111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use

More information

Marion County School District Computer Acceptable Use Policy

Marion County School District Computer Acceptable Use Policy Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through

More information

IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT

IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT Revised 2011 IRON MOUNTAIN PUBLIC SCHOOLS ACCEPTABLE USE POLICY FOR ELECTRONIC RESOURCES All Iron Mountain Public

More information

Internet, E-Safety & Acceptable Use Policy

Internet, E-Safety & Acceptable Use Policy Date March 2016 Review Date 2018-2019 Internet, E-Safety & Acceptable Use Policy The Internet is becoming as commonplace as the telephone or TV and its effective use is an essential life-skill. Unmediated

More information

E-SAFETY POLICY. Signed. for school. Signed for Governors. Date..

E-SAFETY POLICY. Signed. for school. Signed for Governors. Date.. E-SAFETY POLICY Signed. for school Signed for Governors Date.. RATIONALE E-safety encompasses Internet technologies and electronic communications such as mobile phones as well as collaboration tools and

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

Dracut Public Schools Technology Acceptable Use Policy Revised 2014

Dracut Public Schools Technology Acceptable Use Policy Revised 2014 1 Dracut Public Schools Technology Acceptable Use Policy Revised 2014 The Dracut Public Schools (DPS) encourages the use of information technology to assist staff and students with academic success, preparation

More information

e-safety Policy Broadclyst Community Primary School

e-safety Policy Broadclyst Community Primary School e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy

More information

EMERSON PARK ACADEMY

EMERSON PARK ACADEMY 1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents

More information

Subject: Computer Network and Internet Use Agreement Guidelines

Subject: Computer Network and Internet Use Agreement Guidelines February 4, 2013 Dear Parents/Guardian, Subject: Computer Network and Internet Use Agreement Guidelines Every student will receive a permission form that must be co-signed by parents/guardians and returned

More information

Dulwich College ICT Acceptable Use Policy

Dulwich College ICT Acceptable Use Policy Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These

More information

Virginia Primary School Learning Together, Learning for our Future

Virginia Primary School Learning Together, Learning for our Future Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

Witton Middle School

Witton Middle School Witton Middle School e-safety Policy This e-safety Policy has been put together using guidance from the Worcestershire Local Authority (LA) and is based on the guidance provided by Becta. Our Vision Witton

More information

Responsible use of ICT Devices Agreement

Responsible use of ICT Devices Agreement Responsible use of ICT Devices Agreement This document is comprised of this cover page and three sections: Section A: Section B: Section C: Introduction Cybersafety Rules for Junior Primary Students Cybersafety

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.

More information

CARRAMAR PUBLIC SCHOOL

CARRAMAR PUBLIC SCHOOL CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy 1. Introduction The Foundation is committed to providing a technology based learning environment that creates opportunities to support and extend learning and teaching in all

More information

BYOD. opos WHAT IS YOUR POLICY? SUMMARY

BYOD. opos WHAT IS YOUR POLICY? SUMMARY BYOD WHAT IS YOUR POLICY? opos SUMMARY The organization s employees and contractors frequently perform employment-related tasks which require connecting to the organization s networks, systems, and/or

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy 1. Introduction The Foundation is committed to providing a technology based learning environment that creates opportunities to support and extend learning and teaching in all

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

Public Schools of CLK Acceptable Use Policy for Electronic Resources iclk Learning Initiative

Public Schools of CLK Acceptable Use Policy for Electronic Resources iclk Learning Initiative Public Schools of CLK Acceptable Use Policy for Electronic Resources iclk Learning Initiative All Public Schools of Calumet, Laurium and Keweenaw (CLK) students and staff are responsible for their actions

More information

Cyber Safety Use Agreement - ICT at School

Cyber Safety Use Agreement - ICT at School Cyber Safety Use Agreement Year 4 to Year 7 students Dear Parents and Caregivers, To assist us to enhance learning through the safe use of information and communication technologies (ICTs), we are now

More information

St Edward s Church of England Academy. E-Safety Policy

St Edward s Church of England Academy. E-Safety Policy St Edward s Church of England Academy E-Safety Policy Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and

More information

Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn

Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn 1. Purpose: Throughout the years, the Catholic Schools within the Diocese of Brooklyn have maintained a steadfast dedication

More information

Bring Your Own Device (BYOD) Handbook. Smackover-Norphlet School District

Bring Your Own Device (BYOD) Handbook. Smackover-Norphlet School District Bring Your Own Device (BYOD) Handbook Smackover-Norphlet School District August, 2014 For the purposes of BYOD, devices means personally owned, wireless portable electronic equipment used for instructional

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

How To Behave At A School

How To Behave At A School THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

Bring Your Own Device (BYOD) Policy - Students SDS-22

Bring Your Own Device (BYOD) Policy - Students SDS-22 Sculptor Charter School Bring Your Own Device (BYOD) Policy - Students SDS-22 SUBJECT: Bring Your Own Device Policy RESPONSIBLE UNIT: Information Technology REFER QUESTIONS TO: Information Technology EFFECTIVE

More information

Computer Facilities and External Networks Acceptable Use by Students

Computer Facilities and External Networks Acceptable Use by Students Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic

More information

School Information Security Policy

School Information Security Policy School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...

More information

E-Safety Policy (Parent/Pupil) March 2013

E-Safety Policy (Parent/Pupil) March 2013 E-Safety Policy (Parent/Pupil) March 2013 1 ICT, Internet, Intranet and E-Mail Policy (Parent/Pupil) 1. Policy statement The purpose of this document is to set out detailed guidance for parents of pupils

More information

Box Hill Senior Secondary College/MYSC

Box Hill Senior Secondary College/MYSC Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology

More information