Dulwich College ICT Acceptable Use Policy
|
|
- Marylou Lester
- 8 years ago
- Views:
Transcription
1 Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These devices include networked computers to support students' academic work. It includes guidelines for the safe and responsible use of the network and the internet and identifies those activities which constitute an abuse of our ICT facilities. For the purpose of this document electronic computing equipment will be referred to as devices and includes laptops, PCs, tablets, notepads, ipads, ipods, mobile phones, digital cameras etc. Section A - General Rules The general rules apply to pupils using devices provided by the College or devices which belong to boys and are brought onto the College campus. Pupils should not: a. access or attempt to access unauthorised areas of the College network or any other computer network. This includes logging on to another user's account; b. send or post electronic communications which are impolite, indecent, abusive, discriminatory, racist or in any way intended to make the recipient feel uncomfortable; c. Store or access inappropriate or illegal material; d. try to circumvent the College filtering systems; e. attempt to spread viruses; f. run any hacking, encryption and other system tools; g. engage in any form of activity that is prohibited under UK Law, including; h. the uploading or downloading of pirated software, music or video; i. breaching another person s copyright in any material or protected by trade secret; j. disclose to a third party the personal details of any other member of the College March 2013 Page 1 of 10
2 k. community; l. post on the Internet or Intranet (including on social networking sites, blogs, Twitter, Facebook etc) any material (e.g. text, pictures, videos) which may cause offence, be considered defamatory or bring the College into disrepute; m. attach any servers to the College network or share local drives, folders or files across the network. Section B - Use of College Devices In addition to the General Rules in Section A, pupils should not: a. physically tamper with College equipment e.g. disconnect them from the network, removing the mouse/keyboard/monitor etc. or attempt repair to the devices; b. upload, download, install or attempt to run any software that has not been approved by Computer Services; c. alter the settings of the College equipment or making other changes which render them unusable by others; d. purchase goods or services over the Internet. Section C - Use of pupils own devices In addition to the rules in section A, pupils, a. should only attach their own personal devices by using wireless networking or specially provided network ports e.g. the network points in the Boarding Houses; b. should ensure that their devices are properly protected from viruses; c. should not run file sharing devices (e.g. personal servers) on the College network; d. should not plug devices directly into any network switch, hub or router; e. should not detach from the network any equipment (e.g. computers, printers etc) to make way for a personal device; f. should not attach a device to the Dulwich College Domain unless it has been approved by March 2013 Page 2 of 10
3 the Computer Services Department; g. are responsible for the material that exists on or is accessed via their personal devices. The Computer Services Department are empowered to scrutinise, and if necessary retain for further investigation, any device which has been brought on College and which is suspected of being in breach of this policy; h. should abide by the rules governing use of the Internet as stated in section D; i. should ensure that they have a licence for all software installed on their devices; j. should not run software on a device during lessons which is not appropriate to that lesson. Boarders should read the Guidelines for Boarders (Appendix 1) Section D Use of computer areas in the College a. Pupils should conduct themselves in an orderly fashion, and must always show consideration for other users; b. No food or drink may be consumed; c. Any damage to computers, furniture or fitments or malfunctioning of computers or printers should be reported to a member of the Computer Services Department, the duty staff or duty Prefect without delay; d. Pupils using computers before school and during morning break, lunch break and private study periods must leave the computer rooms in time to arrive punctually for their next timetabled commitment; e. Only one pupil should be seated and working at a computer at any one time; f. Chairs should be placed tidily in the rooms before leaving; March 2013 Page 3 of 10
4 Guidelines, Explanations and Advice Overview At the College we allow all pupils access to our computer network, enabling them to use standard applications (word processing, spreadsheet, database etc.) as well as online facilities such as the Internet and electronic mail. Every boy is issued with a username, password and an address at the start of his College career. Access to the computer network is a considerable privilege and it is the pupils responsibility to restrict themselves to usage which is ethical and appropriate. Failure to comply with the rules which govern the use of the network may result in either (a) punishment of the pupil, for example by means of a detention, or (b) in serious cases, referral to the pupil s Head of School. Parents will be informed when serious breaches of the Acceptable Use Policy have occurred. Further action will be carried out if deemed necessary. Pupils are encouraged to make use of ICT facilities in support of their studies in all subjects, including the writing up of coursework assignments and other projects. Recreational use of the network is also permitted, though within limits which are designed to give priority to pupils wishing to use the computers for academic and other College-related work. The College provides a network environment in which pupils can assume that their legitimate use of computers and the data that they store are secure against interference by other users. Pupils should not, however, assume that their activities are completely private. Authority has been delegated to Dulwich College Computer Services to determine appropriate use and to monitor user accounts and fileserver space as judged necessary. Hence, records of usage, files that have been stored, and messages that have been sent or received may be scrutinised by the members of staff responsible for management of the network either (a) during routine system maintenance, or (b) if there is reason to suspect misuse of the network. March 2013 Page 4 of 10
5 Use of the Network When logging on to the network, a pupil must always use his own user identification and password. Any attempt to impersonate another user will be treated as a serious offence, as will any attempt to interfere with data stored on the network by another user. These activities are in fact illegal under UK law. Never, under any circumstances, use another person s account or attempt to log on as a system administrator. Vandalism is defined as any malicious attempt to harm, modify, or destroy data of another user. The Dulwich network or other networks connected to the Internet must not be vandalised. This includes the uploading or creating of computer viruses. Harassment is defined as the persistent annoyance of another user, or interference with another user s work. Harassment must never occur; this includes, but is not limited to, the sending of unwanted . If you feel you can identify a security problem on the Dulwich system you must notify Computer Services immediately. You must not demonstrate the problem to other users. Pupils must never divulge their passwords to other boys or to users of computers outside the College. Any pupil who suspects that this has happened accidentally should change his password without delay. Before leaving a computer, pupils must always log off the network and check that the logging out procedure is complete. Pupils must not attempt to gain access to the local drive of any machine or to create local accounts (administrative or otherwise). It is strictly forbidden to attempt to share drives, folders or files across the network. Only software that has been provided on the network may be run on the computers. Pupils are not permitted to import or download applications or games. In many cases it is illegal to do so. You are reminded that it is a breach of the College Plagiarism Policy (and of the rules of examination boards) to pass off another s work as your own. This prohibition extends to March 2013 Page 5 of 10
6 information accessed electronically as it does to that gained in other ways. Pupils must be aware of, and comply with, the restrictions placed on certain kinds of usage; notably the playing of games on particular machines and at particular times of the day, where others wish to do academic work. The College cannot accept responsibility for any damage, howsoever caused, to devices or their contents. Internet and The College s Internet access is via the Equinox (London Grid for Learning) service provided by Research Machines PLC, a company that has been involved with IT in education for many years. The advantage of IFL is that it seeks to deny access to web sites known to contain offensive or inappropriate material. The IFL filter is continually updated, though there can be no absolute guarantee that unsuitable material is never available to users. Pupils are given training in effective use of the Internet as a research tool at various stages throughout their College career. The College regards the use of the Internet to search for and use information related to a school subject or to a hobby as acceptable. Every pupil in the College has access to the Internet and has a College account. Personal Safety Pupils need to be aware that thoughtless use of , Twitter, social networking sites and the Internet may jeopardise their personal safety either at school or outside school. Pupils should therefore: Never arrange a meeting in person with anyone they have met or only communicated with by computer, without prior parental approval; Not respond to messages, tweets, social networking posts or bulletin board items that are indecent, suggestive, belligerent, discriminatory, threatening, or which make the student feel uncomfortable or unsafe in any way. If such a message is encountered the pupil should report it to his form tutor and parents; Be aware that any person they meet or communicate with online may pretend to be March 2013 Page 6 of 10
7 someone else; Remember that anything they read online may not be accurate; Ignore offers that involve either financial transactions or personal meetings; Not disclose any personal details, such as their home address or telephone number, across the Internet; Personal Devices Pupils bring devices such as mobile phones, MP3 players, ipods etc. into the College at their own risk. These should not be used in lessons without approval of the teacher. Boarding Houses See Appendix 1 College ICT commitments Where possible the school will block access to inappropriate web-sites from school equipment. The school will monitor ICT communications on school equipment. The school will endeavour to ensure that all images of staff and pupils are secure. The school will train its staff to respond to reports of cyber-bullying or harassment and have systems in place to respond to it. Cyber-bullying The term cyber-bullying means: Bullying by texts or messages or calls on mobile phones; Use of mobile phone cameras to cause distress, fear or humiliation; Posting threatening, abusive, defamatory, or humiliating material on websites; Hi-jacking accounts (using someone else s identity); Making threatening, abusive, defamatory or humiliating remarks in chatrooms; Posting threatening, abusive, defamatory or humiliating material on reunion or networking sites. March 2013 Page 7 of 10
8 Advice to Pupils with regard to Cyber-bullying All the essential anti-bullying messages apply e.g. tell someone in addition; Do not answer abusive messages but log them and report them; Do not give out personal details; Never reply to abusive s; Never reply to someone you do not know; Stay in the public areas of chat rooms. Advice to parents It is essential that parents make their children aware of the serious nature of cyberbullying and discuss with them the advice given above about how to respond if they experience cyber-bullying. Parents should be proactive in monitoring their son s use of ICT and in particular their use of the internet, MSN and social networking sites such as Facebook, Twitter, Myspace, YouTube or Bebo. March 2013 Page 8 of 10
9 Appendix 1 Guidelines for the use of personal laptops and mobile equipment in the Senior Boarding Houses In the boarding houses we take seriously the importance of responsible use of technology. Each study room has an Ethernet connection and boys are allowed laptops in their rooms. Boys can also access a public wireless network in the common rooms. Printing facilities are also made accessible to the boys. We do expect boys to adhere to the following guidelines with respect to use of electronic equipment: 1. The College s ICT Acceptable Use Policy (enclosed) will be observed, in particular Section C Mobile Devices; 2. All software installed will be legally licensed for use on that machine; 3. No offensive or unsuitable material will be stored on the machine(s) or on removable media of any kind (eg data sticks) brought into School; 4. The College cannot accept any responsibility for the security of the equipment and parents must ensure that they have made satisfactory insurance arrangements; 5. Maintenance or repairs are entirely the responsibility of the parents and adequate provision for technical support should be made; 6. Personal laptops and other mobile computing devices should only be connected to the internet via the College s public wireless network and LAN connections in study rooms; to do so they should have up to date anti-virus software; 7. Permission is given to the College to ensure that these conditions are being met. This includes permission to carry out physical inspection of the equipment and examination of the contents of the hard disk and other storage media; 8. The College s internet connection is filtered, and access to inappropriate sites will be denied. Between 5pm and midnight access to approved recreational sites is permitted, March 2013 Page 9 of 10
10 and requests for particular sites to be made available should be directed in the first instance to housemasters; 9. Boys are expected to stop using all forms of electronic equipment when it is time for lights-out ; 10. Colour printing facilities are available within the House. Excess use of the colour printer may result in an additional cost being added to the School bill. We encourage boys to use laptops responsibly and aim to do so through a policy of education. Using machines for non-academic purposes must not interfere with the routine of the House, most importantly lights out. The College internet access is disabled between midnight and 6am. Housemasters are conscious of their duty of care towards the boys with regard to adequate sleep, and excessive use of laptops can be a cause for concern. Housemasters will exercise their duty of care when necessary in this regard. March 2013 Page 10 of 10
Responsible Computer Use Policy for Students
Responsible Computer Use Policy for Students Introduction By using the Sheldon College Network and ICT Services students agree to accept the terms and conditions outlined in this document. This policy
More informationSibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
More informationComputer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
More informationDevice: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.
Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring
More informationAcceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationHallett Cove South Primary School Communications/Network Use Policy
Hallett Cove South Primary School Communications/Network Use Policy The Communications/Network Use Policy ( Policy ) sets out the rights and responsibilities for computer and communications network users
More informationStudents Acceptable Use Policy for Electronic Resources Rules Summary
Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must
More informationAcceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
More informationTECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
More informationAcceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
More informationHow To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
More informationBox Hill Senior Secondary College/MYSC
Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication
More informationFREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
More informationSt Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
More informationCalwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement
111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use
More informationStudent use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
More informationLOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
More informationTomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
More informationWORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
More informationAuthorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together
Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:
More informationICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
More informationThe Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
More informationINFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET
INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET ACCEPTABLE USE POLICY As part of the College IT programme we offer pupils filtered access to the Internet. Before being allowed to use
More informationAcceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
More informationComputer Facilities and External Networks Acceptable Use by Students
Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic
More informationStudents are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
More informationSimon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
More informationOXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
More informationCode of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
More informationRESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET
Administrative Procedure 140 Background RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET This Administrative Procedure is to guide users in the proper use of technology within the Division. The goal of the
More informationMarion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
More informationConditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
More informationAcceptable Network Usage Policy
Acceptable Network Usage Policy Purpose: The Lumen Christi Catholic College computer network is provided for staff and students to facilitate resource sharing, innovation and communication. All students
More informationJohn of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
More informationAdministrative Procedures Memorandum A1300
Page 1 of 8 Date of Issue October 2013 Original Date of Issue June 2012 Subject INFORMATION AND COMPUTING TECHNOLOGY - APPROPRIATE USE GUIDELINES FOR STUDENTS References This APM replaces A1160 Computing
More informationRevised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
More informationDIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
More informationINFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY
INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY Your access to, and use of, the Heathfield High School IT System must be - Only for school use with regard to your subject work. In accordance
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationBROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
More informationDevelopment / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
More informationWe have opted to implement a modified Bring Your Own Device (BYOD) program at the high school level.
Attention 7-12 parents and students: Last year we had the opportunity to pilot a 1:1 Chromebook program in grades 7-8. During this program, we were able to assess the impact providing each student with
More informationTELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ BYOD (Bring Your Own Device) Technology Acceptable Use Washington District Schools provides all students access to technology, the district
More informationSPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081
SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081 POLICY: COMPUTER/INTERNET ACCEPTABLE USE POLICY AGREEMENT Overview Access to information is fundamental to citizenship and the foundation for further
More informationBring Your Own Device Policy
Bring Your Own Device Policy 1. Introduction The Foundation is committed to providing a technology based learning environment that creates opportunities to support and extend learning and teaching in all
More informationAcceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn
Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn 1. Purpose: Throughout the years, the Catholic Schools within the Diocese of Brooklyn have maintained a steadfast dedication
More informationSchool Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
More informationJOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT
JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.
More informationE-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy
E-Safety Policy Reviewed and Adopted: July 2014 Reviewed by: HT/ LTS Next Review: July 2015 Annual Policy 1 1. Introduction Internet is an essential element of life in 21st Century; it is also a part of
More informationWest Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011
West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer
More informationE Safety Policy. 1.0 Background
E Safety Policy 1.0 Background New technologies have become integral to the lives of children and young people in today s society, both within the UTC and in their lives outside the UTC. The internet and
More informationICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
More informationTrinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the
More informationChristian Academy of Knoxville Technology Responsible Use Agreement 2015-2016
Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 PURPOSE Christian Academy of Knoxville provides technology resources for the school community with a belief that the educational
More informationCCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils
CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils Contents 1. Scope 2 2. Use of IT Facilities 2 3. Monitoring of IT Facilities 5 4. Maintenance & Repairs 6 5. Copyright and Licence Agreements
More informationPublic Schools of CLK Acceptable Use Policy for Electronic Resources iclk Learning Initiative
Public Schools of CLK Acceptable Use Policy for Electronic Resources iclk Learning Initiative All Public Schools of Calumet, Laurium and Keweenaw (CLK) students and staff are responsible for their actions
More informationICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
More informationEMERSON PARK ACADEMY
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
More informationSt Edward s Church of England Academy. E-Safety Policy
St Edward s Church of England Academy E-Safety Policy Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and
More informationFaculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy
Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized
More informationTechnology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
More informationE- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
More informationElectronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)
Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to
More informationHow To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
More informationWELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY
WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within
More informationSubject: Computer Network and Internet Use Agreement Guidelines
February 4, 2013 Dear Parents/Guardian, Subject: Computer Network and Internet Use Agreement Guidelines Every student will receive a permission form that must be co-signed by parents/guardians and returned
More informationTECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
More information6141.9. Internet and Computers. Acceptable Use and Internet Safety
6141.9 Acceptable Use and Internet Safety The Board of Education provides computers, a computer network, including Internet access and an email system, as well as electronic devices such as cellular telephones
More informationAcceptable Use of Electronic Networked Resources & Internet Safety
PROCEDURES AND GUIDELINES Acceptable Use of Electronic Networked Resources & Internet Safety Arlington Public Schools (APS) expects all users to access the Internet and other electronic networked resources
More informationHEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY
HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY This policy applies whenever you are using Heathfield High School information technology equipment or services. It should be read in
More informationCARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
More informationHyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
More information4. The Importance of Internet Use in the Primary Curriculum
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
More informationValmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
More informationArchbishop Beck Catholic Sports College
Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety
More informationStudents KS2-3 Acceptable Use Policy
Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions
More informationDescriptor Code: EFE-P
ADMINISTRATIVE PROCEDURE Descriptor Term: ACCEPTABLE USE OF ELECTRONIC TRANSMISSION CAPABILITIES Descriptor Code: EFE-P Date Issued: October 30, 2003 Date Changed June 26, 2008 September 30, 2009 1. Network
More informationPROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationRoles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
More informationDundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
More informationSydney Technical High School
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
More informationCYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL
CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important
More informationIowa Park CISD BYOD Policy 2013-2014
Iowa Park CISD BYOD Policy 2013-2014 Table of Contents Table of Contents Table of Contents... 2 Purpose... 3 What is the D in BYOD.... 3 Guidelines... 3 Wireless Information...5 Responsible Use Policy...6
More informationHow will pupils gain access to the Internet and VLEs at Saintfield High School?
SAINTFIELD HIGH SCHOOL POLICY FOR THE ACCEPTABLE USE OF THE INTERNET AND VIRTUAL LEARNING ENVIRONMENTS What is the Internet? The Internet is an electronic information highway connecting many thousands
More informationBring Your Own Device Program: User Charter
Bring Your Own Device Program: User Charter Turramurra High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. The wireless network and
More informationHow To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationAcceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
More informationSt Vincent s Catholic Primary School e-safety Policy
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
More informationSaint Martin s Catholic Academy
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
More informationSUPERIOR NORTH CATHOLIC District School Board ADMINISTRATIVE REGULATION ACCEPTABLE USE OF COMPUTERS & INTERNET/INTRANET TECHNOLOGY BY STUDENTS
SUPERIOR NORTH CATHOLIC District School Board AR134 ADMINISTRATIVE REGULATION ACCEPTABLE USE OF COMPUTERS & INTERNET/INTRANET TECHNOLOGY BY STUDENTS Students Responsibility Students shall be responsible
More informationQuincy Public Schools Information Technology. Acceptable Use Policy for Staff, Students, and Guests
Quincy Public Schools Information Technology Acceptable Use Policy for Staff, Students, and Guests Revised May 6, 2013 Introduction This Acceptable Use Policy is enacted as of May 2013 by the Quincy School
More informationWHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES
WHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES Approved: December 2014, Full Governing Body Next review due: December 2016 The key aim of the whole school ICT team is to support
More informationLighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15)
Lighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15) Student Name Date Responsible Use Agreement (in four parts) Part 1: Responsible Internet and Network Use Part 2: Responsible
More informationThe Fulham Boys School ipad Acceptable Use Policy, Procedures and Information
The Fulham Boys School ipad Acceptable Use Policy, Procedures and Information Except where specifically stated otherwise, the policies, procedures and information within this document apply to all ipads
More informationPolicies Concerning the use of Computers
Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers
More informationBOARD OF EDUCATION POLICY
BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate
More informationRevelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
More informationAcceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
More information