ICT Security Policy for Schools
|
|
- Bathsheba Doyle
- 8 years ago
- Views:
Transcription
1 WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite years Annually Amendments 2014 JA Page 1 of 8
2 PJT/ckm/ja July 2014 Dear Parent / Carer ICT and Internet Use As part of the school curriculum at Wolgarston High School, we offer students limited access to the Internet. Before being allowed to use the Internet, all students must obtain parental permission and there is a completion page enclosed for you to return. The Internet is a global network of computers containing thousands of libraries, databases and bulletin boards that can support students learning in all areas of the curriculum. However, parents should be advised that some material accessible on the Internet might contain items which are illegal, defamatory, inaccurate or potentially offensive to users. During school time, teachers will supervise and guide students towards appropriate materials. The school s Internet Service Provider (Internet for Learning by Research Machines) will employ measures to protect against access to inappropriate materials. Inappropriate use of computer systems is detected and monitored. Students using the resources inappropriately will be dealt with according to the sanctions of the school s Behaviour for Learning policy. These procedures should ensure that students only use the Internet to further educational goals and objectives. We believe that any disadvantage of the Internet is outweighed by positive benefits to the students in enhanced learning opportunities. However, the school respects the right of each family to decide whether or not to apply for access. Please find attached a copy of our ICT and Internet Use Good Practice rules which your son / daughter will be expected to follow, if you agree to use of the Internet. Each student will then be given an individual password and user area which, as stated in the rules, must remain secret so that it allows secure use only by the student. Yours sincerely Philip J Tapp Headteacher Page 2 of 8
3 Responsible ICT and Internet Use e-safety in School Wolgarston Commitment: Wolgarston is committed to following the (ICT) Security Policy for Schools developed by Staffordshire County Council. This document is reviewed annually. The full details of this policy can be found by accessing Wolgarston High School web site: and clicking on the About the School tab and accessing School Policies. A hard copy of this is available upon request from office@wolgarston.staffs.sch.uk. Wolgarston aims to provide a safe environment to all users and to support this we employ SECURUS network monitoring. This provides us with detailed information of inappropriate activity of any network user. Inappropriate use is always acted upon, by reporting to the e-safety Officer/Headteacher and any relevant external authorities. The school publishes an annual Wolgarston High School ICT Acceptable Use Document for students, which they and their parents must sign up to prior to access to the Internet being granted for any school year. For school purposes, Internet use encompasses and any other messaging systems. The e-safety Strategy Will: Allow young people to develop their own protection strategies for when adult supervision and technological protection are not available. Give adequate information on where to seek help and how to report incidents. Ensure young people understand that there are sanctions that the school will impose on them if they act inappropriately when online. Provide guidelines for parents, carers and others on safe practice. Ensure policies are regularly monitored and reviewed with stakeholders. Ensure technological solutions are regularly reviewed and updated to ensure maintenance of an effective e-safety programme. Students accept each time they access our system to abide by the policy Page 3 of 8
4 Student Guidelines for Internet Use General The Internet, primarily, is provided for students to conduct research and back up their work. Parent s / carers permission is required before a student is granted access. Access is a privilege not a right and that access requires responsibility. Individual users of the Internet are responsible for their behaviour and communication over the network. Users must comply with school standards and honour the agreement they have signed. Computer storage areas, including any external storage media brought to school, may be reviewed by staff to ensure that users are using the system responsibly. Users should not expect that files stored on servers or storage media are always private. For school purposes, Internet use encompasses and any other messaging systems. During school, teachers will guide students towards appropriate materials. Outside of school, families bear responsibility for such guidance in the same way as they deal with information sources such as television, telephones, movies, radio and other potentially offensive media. The following are not permitted within the school environment: Sending or displaying offensive messages or pictures. Using obscene language. Accessing inappropriate web sites Harassing, insulting or attacking others. Damaging computers, computer systems or computer networks. Violating copyright laws. Using others passwords or accounts. Hacking into others folders, work or files for any reason. Intentionally wasting limited resources, including printer ink and paper. Sanctions 1. Violations of the above rules will result in a temporary or permanent ban on internet/computer use. The school runs a system called Securus which reports inappropriate use and operates at a high level of accuracy. 2. Students parents/carers will be informed. 3. Additional disciplinary action may be added in line with existing practice on inappropriate language or behaviour. 4. When applicable, police and/or local authorities will be involved. 5. If necessary, external agencies such as Social Networking or Member sites will be contacted and informed. 6. A record of all unacceptable use will be kept and reported to Senior Management. Page 4 of 8
5 Individual Students 1. You must have your parent s/carer s permission before using the Internet. 2. You must have a supervising teacher or member of staff with you at all times when using the Internet. 3. Do not disclose any password or log-in name to anyone, other than the persons responsible for running and maintaining the system. 4. Do not upload/send personal addresses, telephones/fax numbers or photographs of anyone (staff, governors or students) at the school. 5. Use of names of students, or photographs of students, will require parents to have been informed about such use. 6. Do not download, use or upload any material which is copyright. Always seek permission from the owner before using any material from the Internet. If in doubt, do not use the material. 7. Under no circumstances should you view, upload or download any material which is likely to be unsuitable for children and young adults. This applies to any material of a violent, dangerous or inappropriate context. If you are unsure always ask a member of staff. 8. Always respect the privacy of the files of other users. 9. Be polite and appreciate that other users might have different views than your own. The use of strong language, swearing or aggressive behaviour is not allowed. Do not state anything that could be interpreted as libel. 10. The internet will be used for appropriate educational use only. Access to Internet games or social network sites is prohibited. 11. Ensure that you have followed the correct procedures for using the Internet and report any incident which breaches these rules to a member of staff. Any messages received which are offensive should be reported to a member of staff. 12. Never take any action liable to bring Wolgarston High School into disrepute. Please note that this policy is produced in line with accepted DCSF guidelines, produced following a case study into cyber bullying. Statement The school has opted to adopt the Staffordshire County Council ICT Security Policy for Schools: ttp://education.staffordshire.gov.uk/nr/rdonlyres/9fab282f-8f35-46dd-a3a7- C06A19B85BD3/24533/ICTSecurityPolicyforSchoolsver02.doc Page 5 of 8
6 Bring your Own Device Policy (BYOD Policy) (6 th Form, Staff and certain SEN students) Statement Staff and students may want to use their own personally owned or school provided device such as laptops, tablet systems, netbooks or other devices to connect to the secure school systems to access or resources. Aim To define the requirements for students and teachers to implement practices to ensure users understand and comply with the school policy for connecting personal devices to the schools systems and network. Policy Details All users of the managed wireless must understand that whenever a user connects a device to the schools network that they will be held personally responsible for any breach of security of the network or data. The following list details some of the risks which need to be considered by users: Introducing viruses, spyware or other malware onto the school systems. Purposefully or inadvertently copying sensitive and or proprietary school information to either named or unauthorised devices which could lead the school in breach of the data protection act. Introducing a technical or network incompatibility to the school that the user may not even be aware of. Jail broken hardware may lead to software vulnerabilities potentially being introduced to the school network. Purposefully or inadvertently downloading software which will bypass security Any of these circumstances could interrupt school continuity, cause unplanned downtime and/or cause a data breach of sensitive school data to unauthorised parties. In a worst case scenario civil and criminal penalties for the user and/or substantial expenses to the school could arise. Access to the Managed Wireless is limited to internet use only and is filtered in accordance with the ICT Security Policy. The following items are covered by the schools BYOD policy. Laptops Notebooks Tablet Devices Netbooks Page 6 of 8
7 Each user is only permitted to have a single device at any one time used within school using the BYOD policy. Smart phones with or without a SIM card, Portable game consoles, MP3 Players, I-Pod Touch s or other similar devices are NOT permitted to be added to the schools managed wireless. BYOD Authorisation Process In order for any device to access the schools Managed Wireless the following steps must be completed. 1. The user must complete a BYOD request form (available from the Business Office). 2. The ICT Technical team will run a thorough check on all personally owned or school provided device to check for the following a. IP address settings and third party software or applications that could cause introduce network or application incompatibilities. b. Ensure the device has no virus, spyware or malware infections, checking antivirus software is up to date and working. c. Ensure the device has a password lock configured onto the device. d. Log onto the Managed Wireless and ensure that it is properly configured. 3. If a user ceases to use, loses or misplaces a personally owned or school provided device they must inform the ICT Technical team immediately of the potential security risk. 4. In the event that a user believes their device could be infected with a virus, spyware or malware, the user must inform the ICT Technical team immediately of the potential security risk. 5. No data can be stored or sent via external (e.g. Hotmail) if it identifies an individual or an organisation as this would circumvent the schools Acceptable User Policy and the Data Protection Act. 6. The School SEN Co-ordinator will advise on students permitted to bring their own device to school. Commitment As a school, we are committed to making continuous improvement in all aspects of school life. This statement of forms part of the ICT Security Policy of the school in that it is subject to monitoring, evaluation and modification. It will be reviewed annually. Responsibilities The school will ensure that access is available from key locations around the school. Staff and students must enter into a formal agreement to ensure that all users are aware of their responsibilities; any misuse of the wireless network will result in either of the following, the removal of internet access or their user account. Page 7 of 8
8 Users who bring their personal device to use at Wolgarston High School, do so at their own risk. Wolgarston High School is not responsible for maintenance or upkeep of personal devices, this includes keeping it charged, installing updates or upgrades, fixing any software or hardware issues and devices that are broken, lost or stolen. Ultimate responsibility for this policy s introduction and implementation lies with the Head Teacher in consultation with the Governing Body. It is important to recognise that all staff, students and parents/carers have an active part to play in the evolution, development and maintenance of this policy. Page 8 of 8
Acceptable Use of Internet and Digital Technology
Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB on: Reviewed policy shared with staff on: Policy to be reviewed again on: Committee responsible for review: Acceptable Use
More informationAcceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
More informationTrinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the
More informationINFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET
INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET ACCEPTABLE USE POLICY As part of the College IT programme we offer pupils filtered access to the Internet. Before being allowed to use
More informationSimon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationAcceptable Use of Internet and Digital Technology
Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB: Autumn 2015 Reviewed policy shared with staff: Autumn 2015 Policy to be reviewed again: Autumn 2016 Committee responsible
More informationDevice: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.
Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring
More informationBright Local Schools BYOD Acceptable Use Policy
Bright Local Schools BYOD Acceptable Use Policy Why Bring Your Own Device at Bright Local Schools? Bright Local is dedicated to providing 21st Century instruction to all its students. We feel we must provide
More informationFREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
More informationResponsible Computer Use Policy for Students
Responsible Computer Use Policy for Students Introduction By using the Sheldon College Network and ICT Services students agree to accept the terms and conditions outlined in this document. This policy
More informationHow To Understand The Bring Your Own Device To School Policy At A School
The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS
More informationST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS
ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS Contents:- 1. College policy. 2. Roles and Responsibilities 3. College procedures. 4. College rules for internet use by students. 5.
More informationAcceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
More informationBerwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
More informationHow To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
More informationMelville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students
Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3
More informationPlymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014
Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014 Why Bring Your Own Device? Technology is now an essential part of education. To be able to live,
More informationVail School District Acceptable Use Policy 2015 2016
Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will
More informationHow will pupils gain access to the Internet and VLEs at Saintfield High School?
SAINTFIELD HIGH SCHOOL POLICY FOR THE ACCEPTABLE USE OF THE INTERNET AND VIRTUAL LEARNING ENVIRONMENTS What is the Internet? The Internet is an electronic information highway connecting many thousands
More informationAcceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
More informationTECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
More informationDene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
More informationBring Your Own Device (BYOD) Usage and Network Access Guidelines. Rules and Requirements
Bring Your Own Device (BYOD) Usage and Network Access Guidelines Technology has become an essential part of education at Columbus County Schools. Students today have access to a wide variety of mobile
More informationDevelopment / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
More informationPolicy for Staff and Post 16 Student BYOD (Bring Your Own Device)
Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...
More informationBYOD Policy 2016 Bring Your Own Device Acceptable Use Policy
BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy Approved by Leadership Team 27 th April 2016 Approved by the Governing Body: 18 th May 2016 Review Due: May 2017 Rationale The Beaconsfield
More informationAuthorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together
Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:
More informationSt Vincent s Catholic Primary School e-safety Policy
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
More informationStudents are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationAcceptable Media Use and Bring Your Own Device (BYOD) Policy
Acceptable Media Use and Bring Your Own Device (BYOD) Policy Author: Mr Joe Cowell Headteacher Date Ratified by Governors: September 2015 Date of Review: September 2018 Wollaston School Acceptable Media
More informationSibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
More informationArchbishop Beck Catholic Sports College
Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety
More informationJohn of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
More informationRelated Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities
Category Security Document Name e-safety Procedures Accountable Body Brantridge School Governing Body Reference SY.P2.02 Date Ratified Version 2.1 Last Update March 2015 Related Policies & Documents Document
More informationThe Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
More informationSt Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
More informationE- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
More informationAcceptable Use Policy - Staff
Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education
More informationBring Your Own Device (BYOD) Student, Teacher and Parent Guide
Bring Your Own Device (BYOD) Student, Teacher and Parent Guide Appleton Area School District (AASD) is committed to moving students and staff forward in a 21 st century learning environment. As part of
More informationE-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy
E-Safety Policy Reviewed and Adopted: July 2014 Reviewed by: HT/ LTS Next Review: July 2015 Annual Policy 1 1. Introduction Internet is an essential element of life in 21st Century; it is also a part of
More information4. The Importance of Internet Use in the Primary Curriculum
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
More informationCYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL
CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important
More informationRegional School District No. 7. Bring Your Own Device (BYOD) and Protocol for the Use of Technology in the Schools
6141.328(a) As new technologies continue to change the world in which we live, they also provide many new and positive educational benefits for classroom instruction. To prepare students as 21 st century
More information1. Introduction. 2. Roles & Responsibilities. Governing Body. Headteacher
Category Security Document Name E-safety Procedures Accountable Body Grafham Grange School Governing Body Reference SY.P2.01 Date Ratified 27 th August 2015 Version 1.0 Last Update August 2015 Related
More informationE Safety Policy. 1.0 Background
E Safety Policy 1.0 Background New technologies have become integral to the lives of children and young people in today s society, both within the UTC and in their lives outside the UTC. The internet and
More informationCYBERSAFETY USE AGREEMENT for Cambridge High School Students
CYBERSAFETY USE AGREEMENT for Cambridge High School Students Cambridge High School This document is comprised of this cover page and three sections: Section A: Introduction Section B: Cybersafety Rules
More informationResponsible Use Agreement
BYOD is an acronym for Bring your Own Device. For BYOD, a "device" is a privately owned laptop, tablet computing device, netbook, notebook, e-reader, ipod touch (or similar), or cell/smart phone. For the
More informationTELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ BYOD (Bring Your Own Device) Technology Acceptable Use Washington District Schools provides all students access to technology, the district
More informationAlbany Senior High School
Albany Senior High School Bring your own device (BYOD) Usage Policy for Students and Parents BYOD Usage Policy S:\AdminShared\Teaching Staff\ICT\BYOD\BYOD Policy for Parents.doc Table of Contents 1 Introduction
More informationSouth Sydney High School Bring-Your-Own-Device (BYOD) Policy
South Sydney High School Bring-Your-Own-Device (BYOD) Policy Bring your own device (BYOD) refers to technology models where students bring a personally owned device to school for the purpose of learning.
More informationSPOTSWOOD COLLEGE. BYOD Acceptable Use
SPOTSWOOD COLLEGE BYOD Acceptable Use BYOD = Bring Your Own Device BYOD Agreement Form and Protocol for the Use of Technology As new technologies continue to change the world in which we live, they also
More information51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
More informationRoles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
More informationHAZELDENE LOWER SCHOOL
HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016
More informationChristian Academy of Knoxville Technology Responsible Use Agreement 2015-2016
Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 PURPOSE Christian Academy of Knoxville provides technology resources for the school community with a belief that the educational
More informationProtocol for Acceptable Use of Internet and Email by Staff E-Safety Procedures Safeguarding & Child Protection Policy
Category Document Name Accountable Body Security E-Safety Policy RADIUS Trust Reference SY.P2 Date Ratified 11 th December 2014 Version 3.1 Last Update 31 st March 2015 Related Documents Document Protocol
More informationSUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY DATE: MARCH 2015 REVISION DATE: MARCH 2017
SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY 1 DATE: MARCH 2015 REVISION DATE: MARCH 2017 Background / rationale New technologies have become integral to the lives of children
More informationHusborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy)
Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy) What is E-Safety? E-Safety encompasses Internet technologies and electronic communications such as mobile
More informationRoskear Primary & Nursery School. E-Safety Policy
E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed
More informationYears 3-7 Acceptable Use Policy & Agreement
Years 3-7 Acceptable Use Policy & Agreement Reidy Park Primary School is committed to enhancing teaching and learning through the safe use of information and communication technologies (ICTs). We require
More informationCalwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement
111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use
More informationMarion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
More informationIRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT
IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT Revised 2011 IRON MOUNTAIN PUBLIC SCHOOLS ACCEPTABLE USE POLICY FOR ELECTRONIC RESOURCES All Iron Mountain Public
More informationInternet, E-Safety & Acceptable Use Policy
Date March 2016 Review Date 2018-2019 Internet, E-Safety & Acceptable Use Policy The Internet is becoming as commonplace as the telephone or TV and its effective use is an essential life-skill. Unmediated
More informationE-SAFETY POLICY. Signed. for school. Signed for Governors. Date..
E-SAFETY POLICY Signed. for school Signed for Governors Date.. RATIONALE E-safety encompasses Internet technologies and electronic communications such as mobile phones as well as collaboration tools and
More informationSOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
More informationDracut Public Schools Technology Acceptable Use Policy Revised 2014
1 Dracut Public Schools Technology Acceptable Use Policy Revised 2014 The Dracut Public Schools (DPS) encourages the use of information technology to assist staff and students with academic success, preparation
More informatione-safety Policy Broadclyst Community Primary School
e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy
More informationEMERSON PARK ACADEMY
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
More informationSubject: Computer Network and Internet Use Agreement Guidelines
February 4, 2013 Dear Parents/Guardian, Subject: Computer Network and Internet Use Agreement Guidelines Every student will receive a permission form that must be co-signed by parents/guardians and returned
More informationDulwich College ICT Acceptable Use Policy
Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These
More informationVirginia Primary School Learning Together, Learning for our Future
Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of
More informationRules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
More informationWitton Middle School
Witton Middle School e-safety Policy This e-safety Policy has been put together using guidance from the Worcestershire Local Authority (LA) and is based on the guidance provided by Becta. Our Vision Witton
More informationResponsible use of ICT Devices Agreement
Responsible use of ICT Devices Agreement This document is comprised of this cover page and three sections: Section A: Section B: Section C: Introduction Cybersafety Rules for Junior Primary Students Cybersafety
More informationSaint Martin s Catholic Academy
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
More informationInformation Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
More informationJOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT
JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.
More informationCARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
More informationAcceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
More informationBring Your Own Device Policy
Bring Your Own Device Policy 1. Introduction The Foundation is committed to providing a technology based learning environment that creates opportunities to support and extend learning and teaching in all
More informationBYOD. opos WHAT IS YOUR POLICY? SUMMARY
BYOD WHAT IS YOUR POLICY? opos SUMMARY The organization s employees and contractors frequently perform employment-related tasks which require connecting to the organization s networks, systems, and/or
More informationBring Your Own Device Policy
Bring Your Own Device Policy 1. Introduction The Foundation is committed to providing a technology based learning environment that creates opportunities to support and extend learning and teaching in all
More informationWORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
More informationPublic Schools of CLK Acceptable Use Policy for Electronic Resources iclk Learning Initiative
Public Schools of CLK Acceptable Use Policy for Electronic Resources iclk Learning Initiative All Public Schools of Calumet, Laurium and Keweenaw (CLK) students and staff are responsible for their actions
More informationCyber Safety Use Agreement - ICT at School
Cyber Safety Use Agreement Year 4 to Year 7 students Dear Parents and Caregivers, To assist us to enhance learning through the safe use of information and communication technologies (ICTs), we are now
More informationSt Edward s Church of England Academy. E-Safety Policy
St Edward s Church of England Academy E-Safety Policy Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and
More informationAcceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn
Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn 1. Purpose: Throughout the years, the Catholic Schools within the Diocese of Brooklyn have maintained a steadfast dedication
More informationBring Your Own Device (BYOD) Handbook. Smackover-Norphlet School District
Bring Your Own Device (BYOD) Handbook Smackover-Norphlet School District August, 2014 For the purposes of BYOD, devices means personally owned, wireless portable electronic equipment used for instructional
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationHow To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
More informationBring Your Own Device (BYOD) Policy - Students SDS-22
Sculptor Charter School Bring Your Own Device (BYOD) Policy - Students SDS-22 SUBJECT: Bring Your Own Device Policy RESPONSIBLE UNIT: Information Technology REFER QUESTIONS TO: Information Technology EFFECTIVE
More informationComputer Facilities and External Networks Acceptable Use by Students
Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic
More informationSchool Information Security Policy
School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...
More informationE-Safety Policy (Parent/Pupil) March 2013
E-Safety Policy (Parent/Pupil) March 2013 1 ICT, Internet, Intranet and E-Mail Policy (Parent/Pupil) 1. Policy statement The purpose of this document is to set out detailed guidance for parents of pupils
More informationBox Hill Senior Secondary College/MYSC
Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication
More informationSTRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
More informationREGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
More information