Internet safety Policy and Guidance Acceptable Use Policy for Staff and Pupils

Size: px
Start display at page:

Download "Internet safety Policy and Guidance Acceptable Use Policy for Staff and Pupils"

Transcription

1 Internet safety Policy and Guidance Acceptable Use Policy for Staff and Pupils Refer to: Behaviour Policy Child Protection Policy Anti-Bullying Policy Computing Policy Review Annually or sooner. Next Full Review Autumn 2016

2 Policy Statement Policy Governance - Roles/responsibilities Technology Safe Use Governing Body Headteacher Internet safety Officer ICT Technical Support Staff All Staff All Students Parents and Carers Internet Filtering Filtering Encryption Passwords Anti-Virus Internet Photos and videos Social Networking Incidents Training and Curriculum Acceptable Use Policy (Staff) SMART Rules for EYFS, KS1 and KS 2 Guidance and other miscellaneous documents Why do we filter the Internet? Internet safety Incident Log Risk Assessment Log Inappropriate Use Flowchart Illegal Use Flowchart Written by Simon English (based on Alan Mackenzie -. Page 2 of 23

3 Policy Statement For clarity, the Internet safety policy uses the following terms unless otherwise stated: Users - refers to staff, governing body, school volunteers, students and any other person working in or on behalf of the school, including contractors. Parents any adult with a legal responsibility for the child/young person outside the school e.g. parent, guardian, carer. School any school business or activity conducted on or off the school site, e.g. visits, conferences, school trips etc. Wider school community students, all staff, governing body, parents NCPC Schools - refers to the following schools: Brinkley Grove Primary School, Friars Grove Primary School, Highwoods Community Primary School, Myland Primary School, Queen Boudica Primary School, St John s CofE Primary School and Willowbrook Primary School. Safeguarding is a serious matter; at the NCPC Schools we use technology and the Internet extensively across all areas of the curriculum. Online safeguarding, known as Internet safety is an area that is constantly evolving and as such this policy will be reviewed on an annual basis or in response to an Internet safety incident, whichever is sooner. The primary purpose of this policy is twofold: To ensure the requirement to empower the whole school community with the knowledge to stay safe and risk free is met. To ensure risks are identified, assessed and mitigated (where possible) in order to reduce any foreseeability of harm to the student or liability to the school. This policy is available for anybody to read on the NCPC schools websites; upon review all members of staff will sign as read and understood both the Internet safety policy and the Staff Acceptable Use Policy. Headteacher Name: Chair of Governors: Signed: Signed: Written by Simon English (based on Alan Mackenzie Page 3 of 23

4 Review Date: Next Review: Policy Governance (Roles & Responsibilities) Governing Body The governing body is accountable for ensuring that our school has effective policies and procedures in place; as such they will: Review this policy at least annually and in response to any Internet safety incident to ensure that the policy is up to date, covers all aspects of technology use within the school, to ensure Internet safety incidents were appropriately dealt with and ensure the policy was effective in managing those incidents. Appoint one governor to have overall responsibility for the governance of Internet safety at the school who will: o o Keep up to date with emerging risks and threats through technology use. Receive regular updates from the Headteacher in regards to training, identified risks and any incidents. Headteacher Reporting to the governing body, the Headteacher has overall responsibility for Internet safety within our school. The day-to-day management of this will be delegated to a member of staff, the Internet safety Officer (or more than one), as indicated below. The Headteacher will ensure that: Internet safety training throughout the school is planned and up to date and appropriate to the recipient, i.e. students, all staff, senior leadership team and governing body, parents. The designated Internet safety Officer(s) has had appropriate CPD in order to undertake the day to day duties. All Internet safety incidents are dealt with promptly and appropriately. Internet safety Officer The day-to-day duty of Internet safety Officer is devolved to Nick Hutchings. The Internet safety Officer will: Keep up to date with the latest risks to children whilst using technology; familiarize him/herself with the latest research and available resources for school and home use. Written by Simon English (based on Alan Mackenzie -. Page 4 of 23

5 Review this policy regularly and bring any matters to the attention of the Headteacher. Advise the Headteacher, governing body on all Internet safety matters. Engage with parents and the school community on Internet safety matters at school and/or at home. Liaise with the local authority, IT technical support and other agencies as required. Retain responsibility for the Internet safety incident log; ensure staff know what to report and ensure the appropriate audit trail. Ensure any technical Internet safety measures in school (e.g. Internet filtering software, behaviour management software) are fit for purpose through liaison with the local authority and/or IT Technical Support. Make him/herself aware of any reporting function with technical Internet safety measures, i.e. internet filtering reporting function; liaise with the Headteacher and responsible governor to decide on what reports may be appropriate for viewing. Computing Technical Support Staff Technical support staff are responsible for ensuring that: The IT technical infrastructure is secure; this will include at a minimum: o Anti-virus is fit-for-purpose, up to date and applied to all capable devices. o Windows (or other operating system) updates are regularly monitored and devices updated as appropriate. o Any Internet safety technical solutions such as Internet filtering are operating correctly. o Filtering levels are applied appropriately and according to the age of the user; that categories of use are discussed and agreed with the Internet safety officer and Headteacher. o Passwords are applied correctly to all users regardless of age (Note: this will require discussion as to when passwords should be changed.) Passwords for staff will be a minimum of 8 characters and not relate to family members or pets. o The IT System Administrator password is to be changed on a monthly (30 day) basis. All Staff/Users Staff/Users/Governors are to ensure that: All details within this policy are understood. If anything is not understood it should be brought to the attention of the Headteacher. Any Internet safety incident is reported to the Internet safety Officer (and an Internet safety Incident report is made), or in his/her absence to the Headteacher. If you are unsure the matter is to be raised with the Internet safety Officer or the Headteacher to make a decision. The reporting flowcharts contained within this Internet safety policy are fully understood. Written by Simon English (based on Alan Mackenzie Page 5 of 23

6 All Students The boundaries of use of computing equipment and services in this school are given in the student Acceptable Use Policy; any deviation or misuse of computing equipment or services will be dealt with in accordance with the behaviour policy. Internet safety is embedded into our curriculum; students will be given the appropriate advice and guidance by staff. Similarly all students will be fully aware how they can report areas of concern whilst at school or outside of school. Parents and Carers Parents play the most important role in the development of their children; as such the school will ensure that parents have the skills and knowledge they need to ensure the safety of children outside the school environment. Through parents evenings, school newsletters and the website the school will keep parents up to date with new and emerging Internet safety risks, and will involve parents in strategies to ensure that students are empowered. Parents must also understand the school needs to have rules and safeguarding procedures in place to ensure that their child can be properly safeguarded. As such, parents will sign the student Acceptable Use Policy as part of the admissions process before any access can be granted to school computing equipment or services. Internet safety Committee Chaired by the Governor responsible for Internet safety, the Internet safety Committee is responsible: to advise on changes to the Internet safety policy. to establish the effectiveness (or not) of Internet safety training and awareness in the school. to recommend further initiatives for Internet safety training and awareness at the school. Established from volunteer students, parents, Internet safety Officer, responsible Governor and others as required, the Internet safety Committee will meet on a termly basis. Written by Simon English (based on Alan Mackenzie -. Page 6 of 23

7 Technology The NCPC Schools use a range of devices including PC s, laptops, Apple Mac and ipads. In order to safeguard the student and in order to prevent loss of personal data we employ the following assistive technology: Internet Filtering we use Essex County Council proxy filtering that prevents unauthorized access to illegal websites. It also prevents access to inappropriate websites; appropriate and inappropriate is determined by the age of the user and will be reviewed in line with this policy or in response to an incident, whichever is sooner. The Computing Coordinator, Internet safety Officer and IT Support are responsible for ensuring that the filtering is appropriate and that any issues are brought to the attention of the Headteacher. Any items that are deemed inappropriate are to be reported to Essex Broadband Team. Filtering we use McAfee anti-virus software and Malwares software that prevents any infected to be sent from the school, or to be received by the school. Our system is Microsoft Office 365, which has been set up and endorsed by Essex County Council. Infected is defined as: an that contains a virus or script (i.e. malware) that could be damaging or destructive to data; spam such as a phishing message. Encryption All school devices that hold personal data (as defined by the Data Protection Act 1998) are encrypted. No data is to leave the school on an un-encrypted device; all devices that are kept on school property and which may contain personal data are encrypted. Any breach (i.e. loss/theft of device such as laptop or USB flashdrives/memory sticks) is to be brought to the attention of the Headteacher immediately. The Headteacher will liaise with the local authority to ascertain whether a report needs to be made to the Information Commissioner s Office. (Note: Encryption does not mean password protected.) Passwords all staff will be unable to access any device without a unique username and password. Staff passwords will change on a termly basis or if there has been a compromise, whichever is sooner. The Computing Coordinator and IT Support will be responsible for ensuring that passwords are changed. Anti-Virus All capable devices will have anti-virus software. This software will be updated at least weekly for new virus definitions. IT Support will be responsible for ensuring this task is carried out, and will report to the Headteacher if there are any concerns. All USB peripherals such as Flashdrives/Memory Sticks are to be scanned for viruses before use. Written by Simon English (based on Alan Mackenzie Page 7 of 23

8 Safe Use Internet Use of the Internet in school is a privilege, not a right. Internet use will be granted: to staff upon signing this Internet safety and the staff Acceptable Use Policy; students upon signing and returning their acceptance of the Acceptable Use Policy. All users/staff are reminded that s are subject to Freedom of Information requests, and as such the service is to be used for professional work-based s only. s of a personal nature are not permitted. Similarly use of personal addresses for work purposes is not permitted. All Users (Office, Teaching Staff including Teaching Assistants and Learning Support Assistants, Governors and the PTA) will be given their own address, solely for the purpose of business communication. Students are permitted to use the school VLE, and as such will be given their own address which will be for internal school environment only. Photos and videos Digital media such as photos and videos are covered in the schools Photographic Policy, and is re-iterated here for clarity. All parents must sign a photo/video release slip as part of the admission form; non-return of the permission slip will not be assumed as acceptance. The children that do not have permission will be asked at the beginning of the academic year if they wish to be included on the permission form. This will also ascertain if parents give permission for newspaper publication. The format for both newspaper publication and website will only include the child s first name. It will not give the child s last name. Social Networking there are many social networking services available; The NCPC Schools do not endorse or engage with parents and the wider school community through social networks. The following social media services are not permitted for use within the NCPC Schools during the hours of 8:30am and 3:30pm; should staff wish to use other social media, permission must first be sought via the Internet safety Officer who will advise the Headteacher for a decision to be made. Any new service will be risk assessed before use is permitted. Blogging used by staff and students in school via the Learn Anywhere Virtual Learning Environment. A broadcast service, such as Twitter or Facebook, is a one-way communication method in order to share school information with the wider school community. No persons will be followed or friended on these services and as such no two-way communication will take place. Written by Simon English (based on Alan Mackenzie -. Page 8 of 23

9 Staff Members are strongly advised that being friends with other staff is high risk. Staff members that are also parents are very strongly advised not to be friends with parents and staff. In addition, the following is to be strictly adhered to: Permission slips (via the school photographic policy) must be consulted before any image or video of any child is uploaded. There is to be no identification of students using first name and surname; first name only is to be used. Where services are comment enabled, comments are to be set to moderated. All posted data must conform to copyright law; images, videos and other resources that are not originated by the school are not allowed unless the owner s permission has been granted or there is a license which allows for such use (i.e. creative commons). Notice and take down policy should it come to the schools attention that there is a resource which has been inadvertently uploaded, and the school does not have copyright permission to use that resource, it will be removed within one working day. Incidents - Any Internet safety incident is to be brought to the immediate attention of the Internet safety Officer, or in his/her absence the Headteacher. The Internet safety Officer will assist you in taking the appropriate action to deal with the incident and to fill out an incident log. Training and Curriculum - It is important that the wider school community is sufficiently empowered with the knowledge to stay as risk free as possible whilst using digital technology; this includes updated awareness of new and emerging issues. As such, the NCPC Schools will have an annual programme of training which is suitable to the audience. Internet safety for students is embedded into the curriculum; whenever Computing is used in the school, staff will ensure that there are positive messages about the safe use of technology and risks as part of the student s learning. This will take place over the whole academic year using the Computing Curriculum that is suitable for the new National Curriculum As well as the programme of training we will establish further training or lessons as necessary in response to any incidents. Safer Internet Day will be highlighted as part of an assembly and posters will be placed around the school. The Internet safety Officer is responsible for recommending a programme of training and awareness for the school year to the Headteacher and responsible Governor for consideration and planning. Should any member of staff feel they have had inadequate or insufficient training generally or in any particular area this must be brought to the attention of the Headteacher for further CPD. The Internet safety Training Programme can be found in the School Improvement Plan. Written by Simon English (based on Alan Mackenzie Page 9 of 23

10 Staff ICT Acceptable Use Policy As a professional organisation with responsibility for children s safeguarding it is important that all staff take all possible and necessary measures to protect data and information systems from infection, unauthorised access, damage, loss, abuse and theft. All members of staff have a responsibility to use the school s computer system in a professional, lawful, and ethical manner. To ensure that members of staff are fully aware of their professional responsibilities when using Information Communication Technology and the school systems, they are asked to read, along side the DfE Teacher Standards, and then sign this Acceptable Use Policy. This is not an exhaustive list and all members of staff are reminded that ICT use should be consistent with the school ethos, other appropriate policies and the Law. I understand that Information Systems and ICT include networks, data and data storage, online and offline communication technologies and access devices. Examples include mobile phones, PDAs, digital cameras, and social media sites. School owned information systems must be used appropriately. I understand that the Computer Misuse Act 1990 makes the following criminal offences: to gain unauthorised access to computer material; to gain unauthorised access to computer material with intent to commit or facilitate commission of further offences or to modify computer material without authorisation. I understand that any hardware and software provided by my workplace for staff use can only be used by members of staff and only for educational use. To prevent unauthorised access to systems or personal data, I will not leave any information system unattended without first logging out or locking my login as appropriate. In accordance with the Internet safety Policy, I will ask for consent to use personal Computing equipment from the Head Teacher who will set the boundaries of personal use. I will respect system security and I will not disclose any password or security information. I will change my password on a regular basis and make sure that it is Strong (containing numbers and letters not relating to family members, pets or the like). I will not attempt to install any purchased or downloaded software, including browser toolbars, or hardware without permission from the system manager. I will ensure that any personal data of pupils, staff or parents/carers is kept in accordance with the Data Protection Act This means that all personal data will be obtained and processed fairly and lawfully, only kept for specific purposes, held no longer than necessary and will be kept private and secure with appropriate security measures in place, whether used in the workplace, hosted online (only within countries or sites with suitable data protection controls) or accessed remotely. Any data which is being removed from the school site (such as via or on memory sticks, portable hard drives or CDs) will be encrypted by a method Written by Simon English (based on Alan Mackenzie -. Page 10 of 23

11 approved by the school. Any images or videos of pupils will only be used as stated in the school image use policy and will always take into account parental consent. I will not keep professional documents which contain school-related sensitive or personal information (including images, files, videos etc.) on any personal devices (such as laptops, digital cameras, mobile phones), unless they are secured and encrypted. I will protect the devices in my care from unapproved access or theft. I will not store any personal information on the school computer system that is unrelated to school activities, such as personal photographs, files or financial information. I will respect copyright and intellectual property rights. I have read and understood the school Internet safety policy which covers the requirements for safe ICT use, including using appropriate devices, safe use of social media websites and the supervision of pupils within the classroom and other working spaces. o The recommendation is that users of Social Media should not bring the School into disrepute or undermine the ethos of the school or any of it s staff; I am reminded that being friends or following parents or pupils, past or present, is high risk and should be treated with the utmost caution. Any incident that may bring the school and/or it s staff into disrepute will be taken very seriously. I will report all incidents of concern regarding children s online safety to the Designated Child Protection Coordinator and/or the Internet safety Coordinator as soon as possible. I will report any accidental access, receipt of inappropriate materials, filtering breaches or unsuitable websites to the Head and/or the Internet safety Coordinator who will contact the designated lead for filtering as soon as possible. I will not attempt to bypass any filtering and/or security systems put in place by the school. If I suspect a computer or system has been damaged or affected by a virus or other malware or if I have lost any school related documents or files, then I will report this to the Computing Subject Leader as soon as possible. My electronic communications with pupils, parents/carers and other professionals will only take place via work approved communication channels e.g. via a school provided address or telephone number. My use of ICT and information systems will always be compatible with my professional role, whether using school or personal systems. This includes the use of , text, social media, social networking, gaming, web publications and any other devices or websites. My use of ICT will not interfere with my work duties and will be in accordance with the school AUP and the Law. I will not create, transmit, display, publish or forward any material that is likely to harass, cause offence, inconvenience or needless anxiety to any other person, or anything which could bring my professional role or the school into disrepute. Written by Simon English (based on Alan Mackenzie Page 11 of 23

12 I will promote Internet safety with the pupils in my care and will help them to develop a responsible attitude to safety online, system use and to the content they access or create. If I have any queries or questions regarding safe and professional practise online either in school or off site, then I will raise them with the Internet safety Coordinator or the Head Teacher. I understand that my use of the information systems, Internet and may be monitored and recorded to ensure policy compliance. I understand that I require consent from all parties if I wish to upload a photograph or video to any form of social media, internet site or service images (e.g Facebook, Instagram, Twitter et al) The School may exercise its right to monitor the use of information systems, including Internet access and the interception of s in order to monitor compliance with this Acceptable Use Policy and the School s Data Security Policy. Where it believes unauthorised and/or inappropriate use of the service s information system or unacceptable or inappropriate behaviour may be taking place, the School will invoke its disciplinary procedure. If the School suspects that the system may be being used for criminal purposes or for storing unlawful text, imagery or sound, the matter will be brought to the attention of the relevant law enforcement organisation. I have read and understood and agree to comply with the Staff ICT Acceptable Use Policy. Signed: Print Name: Date: Accepted by: Print Name: Written by Simon English (based on Alan Mackenzie -. Page 12 of 23

13 Children s SMART Rules for Internet Use EYFS and Key Stage 1 Written by Simon English (based on Alan Mackenzie Page 13 of 23

14 KS 2 SMART Rules Why we Filter the Internet Introduction Whilst sometimes seen as one of the more frustrating IT services in schools, Internet filtering is one item in the Internet safety toolbox that is of particular importance. When talking about an Internet filter there are two important aspects: Very broadly speaking Filtering - this is a pro-active measure to ensure (as much as possible) or prevent users from accessing illegal or inappropriate (by age) websites. Monitoring - this is a reactive measure and for the most part means searching, browsing or interrogating filter logs (known as the cache) for Internet misuse. Written by Simon English (based on Alan Mackenzie -. Page 14 of 23

15 These terms are important; mention to anyone that you are monitoring their Internet use and the immediate vision is of somebody sat at a computer screen watching every move and click; that is simply not the case. The fact that an Internet filter is in place to filter and monitor activity is of particular importance because you then have questions raised of morality such as, It s my human right to privacy, big brother is watching, and others. Consider CCTV at your school; everybody knows it is there because you can see it and there are (or should be) signs telling people that they are being monitored; everybody knows why it is there whether they agree with it or not...it is justified for the protection and safety of children and staff whilst in school, and also the protection of the building and its contents. But what about Internet filtering? How many of your parents know that the online activity of their child may be monitored? How many of your staff know? Importantly, do they know why? Whilst the answer should be yes to all, I know that isn t the case and normally with good reason; how do you know what you don t know? As with many things we do in life it is all about managing expectations, commonly known as justifying ourselves. But it is that justification that gives us precedence for doing something that others may deem controversial. Why do we Filter and Monitor? Schools filter Internet activity for two reasons: We filter to ensure (as much as possible) that children and young people (and to some extent adults) are not exposed to illegal or inappropriate websites. These sites are (or should be) restricted by category dependent on the age of the user. Exposure would include browsing to specifically look for such material, or as a consequence of a search that returns inappropriate results. (as much as possible) that the school has mitigated any risk to the children and young people, and thereby reduces any liability to the school by making reasonable endeavours to ensure the safety of those children and young people. We monitor for assurance (as much as possible) that no inappropriate or illegal activity has taken place. To add to any evidential trail for disciplinary action if necessary. Written by Simon English (based on Alan Mackenzie Page 15 of 23

16 A right to privacy? Everybody has a right to privacy, whether adult or child. But in certain circumstances there is a reduced expectation of privacy. In the context of this guide, that reduction is for security and safeguarding. This expectation is applicable whether it is school-owned equipment, or personally owned equipment used on the school network (and in some cases even if that personally owned equipment isn t used on the school network, but is used in school or for school business). Managing Expectations It is the expectations of the user that is particularly important; this will include school staff, students and parents/guardians of the students. Consent is not a requirement, however you are required by law (Data Protection Act 1998) to make all reasonable efforts to inform users that you are monitoring them. By making reasonable efforts you are working with the students and parents, not just merely telling them. In reality, very few schools actually monitor Internet activity, and neither do local authorities or RBC s (remember, monitor is different to filter). Whether that is right or not is out of scope for this paper, but the fact is you could; in fact Ofsted make clear that schools should be managing their own filter, and this would include monitoring for inappropriate activity, overly-restrictive filtering or otherwise. Of course, some will disagree with what you are doing, but that is their right and again consent is not a requirement. It is the understanding, not the consent that is important. Summary Filtering is different to monitoring. You do not require consent. But you must tell users if you do monitor, or if you have the facility to monitor. Set user expectations; explain under what circumstances it may be a requirement to monitor. Ensure you have a good statement in your Internet safety Policy. Ensure you have informed users that Internet use May be subject to monitoring in your Acceptable Use Policy. Ensure parents are informed, the reason why monitoring may take place, and they sign as read and understood. Written by Simon English (based on Alan Mackenzie -. Page 16 of 23

17 Number: Reported By: (name of staff member) Reported To: (e.g. Head, e-safety Officer) W h e n : When: Sample e-safety Incident Log Review Date: Result of Review: Signature (Headteacher) Date: Signature (esafety Officer) Date:

18 No. Activity Risk Likelihood Impact Score Control Measure Owner 1. Internet browsing Access to inappropriate/illegal content - staff Essex Broadband team e-saftey officer 1. Internet browsing Access to inappropriate/illegal content - students Internet safety Officer IT Support Essex Broadband team 2. Blogging/For um on VLE Inappropriate comments Monitoring system with VLE admins. Flagged Messages e- mailed to admin users. Internet safety Officer Computing Subject Leader 2. Blogging/For um on VLE Using copyright material Curriculum Internet safety Officer Computing Subject Leader 3. Staff laptops Staff taking laptops home access to inappropriate/illegal content at home Acceptable Use Policy All staff Head Internet safety Officer 4 Data Staff taking sensitive data home on unencrypted HDD/USB drives Staff issued with encrypted devices and/or password protection Internet safety Officer, Issue Password protection/encrypted drives to users 5 Cyber Bullying s on the VLE, digital communication from outside being brought into school Internet safety in the Curriculum All Staff in Internet safety lesson through curriculum 6 Photographs Transportation using unencrypted data storage Refer to AUP A l l Written by Simon English (based on Alan Mackenzie Page 18 of 23

19 7 Data protection - misuse Staff using personal ICT equipment AUP states to check with HT and/or Internet safety Officer H e a d Internet safety Officer 8 Personal Cameras/photo taking devices Refer to AUP Internet safety Officer Head 9 Parents taking pictures of other children At assemblies, School Sports Day, Christmas productions etc then posting on Social Media (not being aware of PPG/LAC/ Vulnerable groups Parents made aware they are able to take photos of only their own child, not to post on Social media, but able to to family etc. H e a d Designated Child Safety Officers Internet safety Officer 10 Safeguarding Safeguarding / LAC / Child Protection Staff aware of LACs (if applicable) and photographic permissions in school Des Chi Safety Officers Office Staff Internet safety Officer Photographic permissions Staff aware of Permissions - list in register boxes Des Chi Safety Officers Office Staff Internet safety Officer 11 Data Protection Unlocked computers with confidential information (SIMS admin users in front office, class teacher users of SIMS) Users to refer to AUP, if walking away from machine, lock. If not locked, then lock it. A l l u s e r s ICT Subject Leaders Internet safety Officer Page 19 of 23

20 Head Supply Teacher s having access to school server Permissions set to limit the access on the school server PEP Computer s Internet safety Officer Head 12 Staff uploading children s work to Social Media (e.g.pinterest) AUP - acceptable use A l l S t a f f 13 Children s Mobile Phones Theft while on site Parents inform the school in writing that their children will be bringing a mobile to school. It states in the school documentation that only Yr 6 should bring in a mobile phone because of walking home alone. H e a d Internet safety Officer 14 Children s Mobile Phones Photographs being taken of staff, pupils / uploaded to social media Curriculum Internet safety lesson reminding children that permission must be sought from the Photographee before taking the picture (privacy laws) PSHE Lessons on the effect of Cyber- Bullying Safer Internet Day ICT Subject Leaders Teaching Staff Curriculum Risk AssessmentLikelihood: How likely is it that the risk could happen (foreseeability). Impact: What would be the impact to the school (e.g. this could be in terms of legality, reputation, complaints from parents, reporting in press etc.) Likelihood and Impact are between 1 and 3, 1 being the lowest. Written by Simon English (based on Alan Mackenzie Page 20 of 23

21 Multiply Likelihood and Impact to achieve score. LEGEND/SCORE: 1 3 = Low Risk 4 6 = Medium Risk 7 9 = High Risk Owner: The person who will action the risk assessment and recommend the mitigation to Headteacher and Governing Body. Final decision rests with Headteacher and Governing Body Page 21 of 23

22 Inappropriate Activity Flow Chart A concern is raised Who is involved? Member of Staff Pupil Child Protection Issue? Child Protection Issue? No Yes No Yes Report to Headteacher Report to Headteache r and Child Protection Officer Consider: Inform parents Risk assess Counselling Discipline Referral Report to Headteache r and Child Protection Officer Consider: Risk assess Counselling Discipline Referral Report to: Safeguardin g Police Report to: Safeguardin g Police If you are in any doubt, consult the Headteacher, Child Protection Officer or Safeguarding Team Written by Simon English (based on Alan Mackenzie Page 22 of 23

23 Illegal Activity Flowchart A concern is raised Who is involved? Member of Staff Pupil Child Protection Issue? No Yes Report to: Police Safeguarding Inform Parents Refer to Police Inform Safeguarding Secure evidence in locked storage. Report to: Note: NEVER investigate NEVER show to others for your own assurance DO NOT let others handle evidence Police only Police Safeguarding Page 23 of 23

Simon Langton Grammar School for Boys E-Safety Policy

Simon Langton Grammar School for Boys E-Safety Policy Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,

More information

E- Safety and Digital Photography - College ICT

E- Safety and Digital Photography - College ICT Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

Berwick Academy Policy on E Safety

Berwick Academy Policy on E Safety Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

St Vincent s Catholic Primary School e-safety Policy

St Vincent s Catholic Primary School e-safety Policy St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety

More information

Internet, E-Safety & Acceptable Use Policy

Internet, E-Safety & Acceptable Use Policy Date March 2016 Review Date 2018-2019 Internet, E-Safety & Acceptable Use Policy The Internet is becoming as commonplace as the telephone or TV and its effective use is an essential life-skill. Unmediated

More information

Acceptable Use Policy (AUP) School Computing

Acceptable Use Policy (AUP) School Computing Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

John of Rolleston Primary School

John of Rolleston Primary School John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership

More information

E-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy

E-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy E-Safety Policy Reviewed and Adopted: July 2014 Reviewed by: HT/ LTS Next Review: July 2015 Annual Policy 1 1. Introduction Internet is an essential element of life in 21st Century; it is also a part of

More information

How To Ensure Your School Is Safe Online

How To Ensure Your School Is Safe Online Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of

More information

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School: Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership

More information

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including

More information

e-safety Policy Broadclyst Community Primary School

e-safety Policy Broadclyst Community Primary School e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy

More information

4. The Importance of Internet Use in the Primary Curriculum

4. The Importance of Internet Use in the Primary Curriculum Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Roskear Primary & Nursery School. E-Safety Policy

Roskear Primary & Nursery School. E-Safety Policy E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed

More information

E-SAFETY POLICY. The Kingswinford School - a science college. December 2014. Every Child a Scientist. Page 1

E-SAFETY POLICY. The Kingswinford School - a science college. December 2014. Every Child a Scientist. Page 1 The Kingswinford School - a science college E-SAFETY POLICY December 2014 Page 1 E-Safety Policy - Advice and Guidance Setting This guidance applies to all members of the school community (including staff,

More information

St Bernadette s Catholic Primary School. E-Safety Policy

St Bernadette s Catholic Primary School. E-Safety Policy St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational

More information

ICT Security Policy for Schools

ICT Security Policy for Schools WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of

More information

Policies & Procedures. Moat Community College E-Safety Policy

Policies & Procedures. Moat Community College E-Safety Policy Moat Community College E-Safety Policy Vision Statement Moat Community College embraces the positive impact and educational benefits that can be achieved through appropriate use of the Internet and associated

More information

e-safety Policy for Hertsmere Jewish Primary School

e-safety Policy for Hertsmere Jewish Primary School e-safety Policy for Hertsmere Jewish Primary School Reviewed by: Mrs R Wolman, Miss C Stephens and Miss G Geffin Reviewed on: February 2015 Date of Next Review: February 2016 Policy Review This policy

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour

More information

Archbishop Beck Catholic Sports College

Archbishop Beck Catholic Sports College Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety

More information

Sydney Technical High School

Sydney Technical High School Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of

More information

Networking and Social Media Policy

Networking and Social Media Policy Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Deputy Head Acting Head of Care ICT Manager Director of Social Care Estates Manager. Richard Green Lyn Henwood Tyrone da Silva Denise Banks Rob Taylor

Deputy Head Acting Head of Care ICT Manager Director of Social Care Estates Manager. Richard Green Lyn Henwood Tyrone da Silva Denise Banks Rob Taylor Chailey Heritage Foundation encompasses; Chailey Heritage School Chailey Heritage Residential Futures@Chailey Heritage Simon Yates Richard Green Lyn Henwood Tyrone da Silva Denise Banks Rob Taylor Headteacher

More information

Wilsthorpe Community School

Wilsthorpe Community School Wilsthorpe Community School Online Safety Policy REVIEWED March 2016 Introduction This Online Safety Policy has been written by the school, building on LA policy and government guidance. It has been agreed

More information

Related Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities

Related Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities Category Security Document Name e-safety Procedures Accountable Body Brantridge School Governing Body Reference SY.P2.02 Date Ratified Version 2.1 Last Update March 2015 Related Policies & Documents Document

More information

FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:

FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review: FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer

More information

St Edward s Church of England Academy. E-Safety Policy

St Edward s Church of England Academy. E-Safety Policy St Edward s Church of England Academy E-Safety Policy Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and

More information

Bring Your Own Device Program: User Charter

Bring Your Own Device Program: User Charter Bring Your Own Device Program: User Charter Turramurra High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. The wireless network and

More information

Social Networking Policy

Social Networking Policy Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies

More information

Strathfield Girls High School Bring your Own Device User Charter

Strathfield Girls High School Bring your Own Device User Charter Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.

More information

E-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school.

E-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school. E-Safety Policy Development / Monitoring / Review of the policy This policy applies to all members of the school (including staff, students / pupils, volunteers, parents / carers, visitors, community users)

More information

[Name of School] E-safety policy

[Name of School] E-safety policy [Name of School] E-safety policy Adopted: Review date: Note: Blue boxes contain advisory notes which should be read and deleted. These indicate where schools need to make decisions or choices. This policy

More information

Witton Middle School

Witton Middle School Witton Middle School e-safety Policy This e-safety Policy has been put together using guidance from the Worcestershire Local Authority (LA) and is based on the guidance provided by Becta. Our Vision Witton

More information

Protocol for Acceptable Use of Internet and Email by Staff E-Safety Procedures Safeguarding & Child Protection Policy

Protocol for Acceptable Use of Internet and Email by Staff E-Safety Procedures Safeguarding & Child Protection Policy Category Document Name Accountable Body Security E-Safety Policy RADIUS Trust Reference SY.P2 Date Ratified 11 th December 2014 Version 3.1 Last Update 31 st March 2015 Related Documents Document Protocol

More information

E-SAFETY POLICY. Signed. for school. Signed for Governors. Date..

E-SAFETY POLICY. Signed. for school. Signed for Governors. Date.. E-SAFETY POLICY Signed. for school Signed for Governors Date.. RATIONALE E-safety encompasses Internet technologies and electronic communications such as mobile phones as well as collaboration tools and

More information

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage. Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or

More information

HAZELDENE LOWER SCHOOL

HAZELDENE LOWER SCHOOL HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016

More information

CARRAMAR PUBLIC SCHOOL

CARRAMAR PUBLIC SCHOOL CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school

More information

EMERSON PARK ACADEMY

EMERSON PARK ACADEMY 1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

School Information Security Policy

School Information Security Policy School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...

More information

E-Safety Policy & Procedures

E-Safety Policy & Procedures E-Safety Policy & Procedures Version Policy Originator: Equality Impact Assessed: Approved by: SMT Date Approved: April 2015 Review Interval: Annually Last Review Date: - Next Review Date: April 2016 Audience:

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

HP Laptop & Apple ipads

HP Laptop & Apple ipads Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview

More information

SALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL

SALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL SALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL E SAFETY Policy October 2012 Page 1 Saltford C of E Primary School E-Safety Policy Oct 2012 Table of Contents BACKGROUND / RATIONALE... 3 DEVELOPMENT / MONITORING

More information

E Safety Policy. 1.0 Background

E Safety Policy. 1.0 Background E Safety Policy 1.0 Background New technologies have become integral to the lives of children and young people in today s society, both within the UTC and in their lives outside the UTC. The internet and

More information

1 The benefits of Internet access for education... 2. 2 Whole-Academy network security strategies... 2. 2.1 Hardware and software infrastructures...

1 The benefits of Internet access for education... 2. 2 Whole-Academy network security strategies... 2. 2.1 Hardware and software infrastructures... CITY ROAD PRIMARY ACADEMY ACCEPTABLE AND RESPONSIBLE USE OF IT RESOURCES (INTERNET ACCESS AND EMAIL POLICY STAFF AND STUDENTS) Contents 1 The benefits of Internet access for education... 2 2 Whole-Academy

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

Social Networking Policy

Social Networking Policy Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful

More information

1. Introduction. 2. Roles & Responsibilities. Governing Body. Headteacher

1. Introduction. 2. Roles & Responsibilities. Governing Body. Headteacher Category Security Document Name E-safety Procedures Accountable Body Grafham Grange School Governing Body Reference SY.P2.01 Date Ratified 27 th August 2015 Version 1.0 Last Update August 2015 Related

More information

Oratory R.C. Primary and Nursery School. Shine as to be a light to others E-SAFETY POLICY

Oratory R.C. Primary and Nursery School. Shine as to be a light to others E-SAFETY POLICY Oratory R.C. Primary and Nursery School Shine as to be a light to others E-SAFETY POLICY Reviewed by Safeguarding, Health and Safety and Premises Committee: 1.10.14 Approved by the Governing Body: 15.10.14

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

King David Primary School Staff Social Networking Policy

King David Primary School Staff Social Networking Policy King David Primary School Staff Social Networking Policy This policy should be read in conjunction with other relevant policies e.g. school ICT Policy including acceptable or unacceptable usage, Disciplinary

More information

E-Safety Policy Last reviewed 2012 Updated October 2014

E-Safety Policy Last reviewed 2012 Updated October 2014 E-Safety Policy Last reviewed 2012 Updated October 2014 Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Responsible Computer Use Policy for Students

Responsible Computer Use Policy for Students Responsible Computer Use Policy for Students Introduction By using the Sheldon College Network and ICT Services students agree to accept the terms and conditions outlined in this document. This policy

More information

Computer Facilities and External Networks Acceptable Use by Students

Computer Facilities and External Networks Acceptable Use by Students Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic

More information

Bring Your Own Device Program: 2015 User Agreement

Bring Your Own Device Program: 2015 User Agreement Bring Your Own Device Program: 2015 User Agreement Asquith Girls High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. Asquith Girls High

More information

Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.

Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community. Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes

More information

Data Protection and Information Security Policy and Procedure

Data Protection and Information Security Policy and Procedure Data Protection and Information Security Policy and Procedure Document Detail Category: Data Protection Authorised By: Full Governing Body Author: School Business Manager Version: 1 Status: Approved May

More information

Reviewed: 21 March 2016

Reviewed: 21 March 2016 Reviewed: 21 March 2016 Next Review Autumn 2017 School Photography Policy 1. Background At Good Shepherd Primary School we recognise that photography is a useful tool, and it is used routinely in many

More information

Internet and Online Security Policy

Internet and Online Security Policy Internet and Online Security Policy Policy Updated: Spring 2015 Adopted by Staff and Governors: Spring 2015 Date for Review: Spring 2016 1 Internet and Online Security Policy Contents 1 Aims and Objectives...

More information

baseline for outstanding practice

baseline for outstanding practice Primrose Hill.. Primary School Computing Policy: A baseline for outstanding practice September 2015 Review date: September 2016 Appendix KEY PRINCIPLES Teaching at Primrose Hill is Learning Centred, meaning

More information

Virginia Primary School Learning Together, Learning for our Future

Virginia Primary School Learning Together, Learning for our Future Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of

More information

STAFF & GOVERNOR USE OF SOCIAL MEDIA AND INTERNET SITES POLICY

STAFF & GOVERNOR USE OF SOCIAL MEDIA AND INTERNET SITES POLICY Page 1 of 7 Alveston CofE Primary School has adopted this policy from the Local Authority. INTRODUCTION Social media includes online social forums such as Facebook, Twitter and LinkedIn, and websites such

More information

LINGFIELD NOTRE DAME USE OF PHOTOGRAPHS POLICY SENIOR SCHOOL. To achieve high academic standards in a relaxed but disciplined atmosphere

LINGFIELD NOTRE DAME USE OF PHOTOGRAPHS POLICY SENIOR SCHOOL. To achieve high academic standards in a relaxed but disciplined atmosphere LINGFIELD NOTRE DAME USE OF PHOTOGRAPHS POLICY SENIOR SCHOOL OUR SCHOOL AIMS To achieve high academic standards in a relaxed but disciplined atmosphere To develop self-worth in every student To promote

More information

Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.

Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY DATE: MARCH 2015 REVISION DATE: MARCH 2017

SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY DATE: MARCH 2015 REVISION DATE: MARCH 2017 SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY 1 DATE: MARCH 2015 REVISION DATE: MARCH 2017 Background / rationale New technologies have become integral to the lives of children

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9 Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of

More information

WHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES

WHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES WHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES Approved: December 2014, Full Governing Body Next review due: December 2016 The key aim of the whole school ICT team is to support

More information

How To Use Your Cell Phone At Renaissance Academy Charter School

How To Use Your Cell Phone At Renaissance Academy Charter School Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance

More information

The Internet Acceptable Use Policy (for parents and children)

The Internet Acceptable Use Policy (for parents and children) Contact: Susan Seale The Internet Acceptable Use Policy (for parents and children) This policy is made available via the school website, is provided to all parents (current and prospective) in the office,

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

Photography and filming in schools Code of Practice

Photography and filming in schools Code of Practice Photography and filming in schools Code of Practice Data Protection compliance September 2010 Photography and filming in schools September 2010 1 Contents 1. About this code 3 2. Complying with the Data

More information

Great Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy

Great Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy Great Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy November 2013 This policy was adopted on:... Date of last review:... Signed:... Great Horwood C.E. Combined School Page 1 Acceptable

More information

Cardinal Heenan Catholic High School

Cardinal Heenan Catholic High School Cardinal Heenan Catholic High School E-Safety policy Approved by Full Governing Body: July 2015 Reviewed: Jul 2015 Signature (Chair of Governors): Next Review Date: Summer 2017 Key people in school Deputy

More information

E-Safety Policy. Please read this policy in conjunction with the policies listed below:

E-Safety Policy. Please read this policy in conjunction with the policies listed below: E-Safety Policy Policy Code: ICT2 Policy Start Date: July 2015 Policy Review Date: September 2015 Please read this policy in conjunction with the policies listed below: SW5 Safeguarding and Child Protection

More information

360 Degree Safe Cymru SELF REVIEW TOOL

360 Degree Safe Cymru SELF REVIEW TOOL 360 Degree Safe Cymru SELF REVIEW TOOL UPDATED OCTOBER 2014 The South West Grid for Learning Trust, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0845 601 3203 Email: enquiries@swgfl.org.uk

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

How To Understand The Bring Your Own Device To School Policy At A School

How To Understand The Bring Your Own Device To School Policy At A School The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS

More information

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program. Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring

More information

Kenmore State High School Student Laptop Charter

Kenmore State High School Student Laptop Charter Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6

More information

E-Safety Policy (Parent/Pupil) March 2013

E-Safety Policy (Parent/Pupil) March 2013 E-Safety Policy (Parent/Pupil) March 2013 1 ICT, Internet, Intranet and E-Mail Policy (Parent/Pupil) 1. Policy statement The purpose of this document is to set out detailed guidance for parents of pupils

More information

Greystanes High School Student Bring Your Own Device (BYOD) Policy

Greystanes High School Student Bring Your Own Device (BYOD) Policy Greystanes High School Student Bring Your Own Device (BYOD) Policy Objectives 1. To facilitate and promote the bringing of a computing device to school by students for use in their education. 2. To provide

More information

This Policy applies to all pupils including EYFS

This Policy applies to all pupils including EYFS Policy for Photographs and Photography This Policy applies to all pupils including EYFS Introduction Photography in schools is subject to the Data Protection Act 1998 regarding the rights of individuals

More information

STEP Academy Trust E-Safety and Data Security Policy

STEP Academy Trust E-Safety and Data Security Policy STEP Academy Trust E-Safety and Data Security Policy Date of Policy: July 2015 Review: July 2018 Contents Introduction Computer viruses Data security E-safety in the curriculum Managing the internet Mobile

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

Acceptable Use Policy - Staff

Acceptable Use Policy - Staff Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy 1. Introduction The Foundation is committed to providing a technology based learning environment that creates opportunities to support and extend learning and teaching in all

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

ICT Safe and Acceptable Use Policy for Students

ICT Safe and Acceptable Use Policy for Students ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...

More information