ST MARY S COLLEGE STUDENT 1:1 LAPTOP PROGRAM YEARS Policy and Guidelines Booklet

Size: px
Start display at page:

Download "ST MARY S COLLEGE STUDENT 1:1 LAPTOP PROGRAM YEARS 7-12. Policy and Guidelines Booklet"

Transcription

1 ST MARY S COLLEGE STUDENT 1:1 LAPTOP PROGRAM YEARS 7-12 Policy and Guidelines Booklet

2 Contents 1. St. Mary s College Vision for Learning and teaching Overview of Student and Parent Responsibilities Acceptable Use of Information and Communication Technology Resources Conditions of Use of St Mary s College ICT Resources Student and Parent Laptop Guidelines... 8 ST MARY S COLLEGE ICT Resources Acceptable Use of ICT Form ST MARY S COLLEGE ICT Resources Access Consent Form EXTERNAL ICT SERVICES CONSENT FORM

3 1. St Mary s College Vision for Learning and teaching Our Vision for learning and teaching Learning will be engaging and challenging, building the capacity for students to connect, collaborate and be critical thinkers. Our girls will be equipped to contribute and be responsible citizens in a digital world. A technology rich learning environment will provide a platform for innovative teaching, and learning that is lifelong and lifewide... Anywhere, anytime!! To achieve this, St Mary s College students will need: Personal easy access to a technological device which enables them to collaborate with others for learning, work and skill development Resources and abilities to gather, evaluate, create and produce relevant information and knowledge, reflect and think over those processes, and communicate effectively with others about them Contemporary skills Checklist for St Mary s College Students as 21 st Century learners Knowledge Building Do students move beyond reproducing information to building knowledge, and is that knowledge cross-disciplinary? Collaboration Do students collaborate with other people and create interdependent work products? Use of Technology for Learning Do students use ICT in ways that support knowledge building, and do and learn things that could not be done without ICT? Problem Solving & Innovation Do students solve problems and implement their solutions in the real world? Self-Regulation Does the learning activity have multiple stages, and call on students to plan their work and assess their work over time? Skilled Communication Do students produce extended communication that is organized around a central theme and is well developed? 2

4 2. Overview of Student and Parent Responsibilities Learning will not take place only inside schools and colleges, but in communities, workplaces and families. The shift to thinking about learning beyond the classroom requires a shift in our thinking about the fundamental organizational unit of education from the school, an institution where learning is organized, defined and contained to the learner, an intelligent agent with the potential to learn from any and all of her encounters with the world around her. Students and parents will be responsible for the overall care of the laptop. Students will have full local administrator rights to the laptop. Students will be trained to be competent users of their assigned laptop. A laptop carry bag will be supplied. Students will be required to carry the laptop within this bag at all times. Other laptop bags are not permitted to be used. The laptop is to be treated with care and stored in the carry bag supplied when not in use. The College reserves the right to regular hardware, software and data inspections, Students will be subject to the terms of the ICT Acceptable Use Policy if there is any evidence of misuse or inappropriate usage. All students will be responsible for the regular backup of their data via the means recommended by the College. All laptops will include software to assist the learning of the student. Students must not delete any software supplied by the College, however, they are permitted to add additional folders and appropriate software to assist with organising their work and enhance their responsible use of technology in everyday life. Students will also be able to install additional home-based printers, scanners and other peripheral devices if they wish. Students must be aware of and abide by the ICT Acceptable Use Policy (see section 3). Failure to abide by the user agreement could result in disciplinary action, or in the event of damage, a financial cost to the parent (refer to Section 4 - Student and Parent Laptop Guidelines). Laptops will be recharged at home each night ready for the next school day. The laptop can be connected to the student s home internet at the parent s discretion. Parents are encouraged to supervise proper usage of laptops at home, especially whilst students are using the internet. Tom Bentley, DEMOS 3

5 3. Acceptable Use of Information and Communication Technology Resources Information & Communication Technology (ICT) has become of critical importance to schools in facilitating and supporting learning, teaching and other administrative activities for teachers, students, parents and administrators. St Mary s College has established significant computing and communication resources to support these activities. These resources include: All network services, computer equipment and software, owned, leased or used under licence by Brisbane Catholic Education Centre & the College; Computer facilities maintained by other bodies but available for use through an agreement or agreements with Brisbane Catholic Education. St Mary s College is bound by legislation and good stewardship of resources to ensure the appropriate use of its ICT. Increased legislation and adherence to regulatory authorities relating to ICT compels the College to review its internal policies and procedures to ensure compliance. ICT resources are supplied in line with the following principles: access to ICT is provided subject to need and availability of resources; privacy, confidentiality and respect of the personal rights of others is maintained; the importance of the cost-efficient use of the ICT is recognised; users engage in ethical, legal and responsible use of ICT. The Conditions of Use of ICT Resources has been developed to inform users of their rights, responsibilities and obligations when using ICT resources, consistent with Brisbane Catholic Education s requirement that all such resources are used in an ethical, legal and responsible manner. Policy Update This policy will be updated as necessary. All attempts will be made to adhere to the above policy, but particular circumstances (such as technological advancements) may require the Principal to depart from the stated policy. 4

6 4. Conditions of Use of St Mary s College ICT Resources i. By accessing and using the ICT resources provided by St Mary s College, you are agreeing to abide by this Conditions of Use of ICT Resources statement. ii. iii. These conditions apply to all St Mary s College ICT resources, regardless of how they are accessed. This includes access to all installed computers, through users own hardware (for example, personal laptops, PDAs or other similar technology) whether wired or wireless, or remote access over the internet through users own resources. While staff and students (in particular, ICT staff engaged by the College) may be called upon in the course of their duties to undertake activities beyond those permitted by the terms of this Agreement, it is expected that any such activities undertaken must be done in accordance with the spirit of this statement. Ethical, Legal and Responsible Use of ICT Resources iv. St Mary s College requires all users of its ICT resources to do so in an ethical, legal and responsible manner. v. Users of St Mary s College ICT resources must be aware that use of these resources is subject to the full range of laws that apply to the internet, communications and to the use of computers, and St Mary s College policies. Such law and principles includes users obligations in relation to copyright, plagiarism, intellectual property, breach of confidence, defamation, privacy, bullying/harassment, vilification and anti-discrimination legislation, the creation of contractual obligations, and other civil and criminal laws. vi. St Mary s College s ICT resources must not be used for unauthorised commercial activities and/or personal gain. Actions performed using St Mary s College ICT resources must comply with the terms of any licence agreement for the use of software programs and other online resources. Copyright and Intellectual Property Rights vii. viii. Users must not, through the use of St Mary s College ICT resources, copy, download, store or transmit material which infringes copyright or the intellectual property rights of others without appropriate approval. Such material includes music files, movies, videos or any other form of media. Users should be aware that actions performed using computer and network resources, regardless of any disclaimers that might be made, ultimately reflect on our College and community as a whole. This is particularly relevant where users post or submit material in a way that makes it publicly available over the internet. 5

7 Security and Privacy ix. Users have a role to play in ensuring the security and privacy of information transmitted by use of the ICT resources. Users are issued with unique usernames and passwords, which must be kept strictly confidential at all times. x. Users must protect systems, information and accounts by: Choosing a secure password which is changed regularly (a secure password is one that is difficult to guess, for example, containing a combination of letters and numbers and not simply a name or date of birth) Using access to ICT resources only as authorised by the College; Respecting the privacy and confidentiality of information that they may come across through access to the resources; Only downloading, installing or using authorised software; Reporting any breach or prospective breach of network security to the appropriate technical personnel or the ICT Services Help Desk. xi. Unacceptable conduct by users which could result in a breach of security or privacy includes: Disclosing your username and password details to another person; Disclosing other private or confidential information to unauthorised persons; Gaining unauthorised access to any systems by any means; Using St Mary s College ICT resources to attack or compromise another system or network; Downloading, installing or using unauthorised software programs, specifically software that allows illegal download of content such as YouTube downloader, bit torrent software, bear share or other software to download music or video without payment. Legal software such as itunes is permitted. Deliberately installing computer viruses or other malicious programs; Accessing or intercepting others electronic communications without permission. xii. xiii. Continued use of a computer infected with a virus. Users should not, as a general rule, display personal information about themselves in a way that is publicly available. Where such disclosure is made through authorised avenues (for example, by the use of or an official website), users should be aware that invasions of privacy may sometimes occur and it is outside St Mary s College s control to prevent such instances from occurring. Users are reminded that should not be used to send urgent, sensitive or confidential information. xiv. Users must, however, be aware that the operation and maintenance of ICT systems often requires the backup and caching of data, the logging of activity and the monitoring of general usage patterns and as such, complete confidentiality and privacy cannot be guaranteed. St Mary s College may also be required to inspect or provide copies of 6

8 electronic communications where required to by law, or where the auditing of use and investigation of possible misuses of ICT resources is required. xv. The College recommends the use of third party services 1 such as JacPlus; Pearson Places; Clickview Online; Google Drive (cloud storage and document sharing) for students. The College may disclose personal information about an individual to an external service provider for the limited purpose of storing and managing the information, for instance, when using public Internet services to create learning and teaching content. xvi. The school may also disclose personal information to overseas recipients, for instance, when storing personal information and data with cloud service providers, which are situated outside Australia. Selected services are carefully reviewed against Privacy Principles detailed in the Australian Privacy Act 2. The College completes due diligence checks recommended by Brisbane Catholic Education before using external service providers. External Service Providers used at the College will be listed on the Parent Portal. Other services may be added at any time at the discretion of the College Principal. Additional Conditions Relating to Specific Resources xvii. The uses of the following resources is subject to additional Conditions of Use, which must be read in conjunction with this document: Student Conditions of Use Breaches of these Conditions of Use xviii. xix. The breach of these Conditions of Use will be taken seriously and may result in disciplinary action being taken. See Basic Principles for Use of St Mary s College laptops. Examples of possible consequences for breach of these Conditions of Use range from loss or restriction of access to ICT resources, to formal disciplinary action for breach of School Behaviour Management policy (students) or Code of Conduct (staff). Cases of serious, deliberate, and/or criminal breach will be referred to external authorities and may result in civil or criminal proceedings. 1 Services not directly provided or necessarily endorsed by Brisbane Catholic Education. 2 The Commonwealth Privacy Act 1988 and Privacy Amendment (Enhancing Privacy Protection) Act 2012 which came into operation in March

9 5. Student and Parent Laptop Guidelines 1. Education Purposes Students are to use their laptop computer for educational purposes. The laptop computer comes pre-installed with all the necessary software for student use. The College reserves the right to carry out software, hardware and data inspections of laptop computers at any time. 2. Student Responsibilities Laptops are to be cared for and kept free from risk of damage at all times. This will mean that at times the laptop will need to be closed and placed in its protective case if the risk of damage is reasonably foreseeable. a. Laptops are to be kept clean and free from graffiti and stickers. b. It is the student s responsibility to charge their laptop computer at home each evening. A limited number of spare chargers are available from the icentre. c. Students are not to remove any identification labels from their laptop computer. d. While travelling to and from school or when not in use, laptop computers are to be carried in the College issued protective case and placed in school bags. e. The software loaded on the laptop computers is licensed to the College. Students are not permitted to copy, transfer or delete software. f. Students are responsible for data backup and software upgrade. (Please refer to point 4 and 5 for more details.) g. Students are not to share the use of laptops with other students. 3. Parent Responsibilities a. Ensure students fulfil their responsibilities as outlined above. b. Supervise student use of the computer when at home including their Internet use. c. Ensure the student has their computer at school each day in a condition that will enable it to be usable for any educational purpose. d. Comply with the policy of the school in relation to the return/transfer of the device in the event of the student leaving the school prior to the end of Year 12. 8

10 4. Data Backup and Software Upgrading a. Students are responsible for the backup of all data. Data should be backed up on to the student s home drive on the school network, on to the student s Google Drive provided by the College or an approved storage device. b. The College may not be able to restore data from local hard drives with problems. c. Students are responsible to ensure that all software is kept up to date. (eg. Operating System and installed Virus Software). 5. Technical Support a. Students will be given full local administrator rights of their laptop computer. b. Students will be trained on how to support and maintain their laptop computer. c. In the event of a software malfunction students may contact the College icentre/it Support for assistance and re-imaging of their laptop. Students should ensure that their laptop is always backed up to help facilitate re-imaging if necessary. 6. Use of the College Wireless Network and Internet Access a. The use of the College Wireless Network and all associated infrastructure are available for educational use with student laptop computers. b. The internet is only to be accessed through the College Wireless Network while at school, i.e. connecting a laptop to a private wireless internet device or phone to gain access to internet whilst at school is not permitted. Your help in supporting this policy would be appreciated. c. The downloading of large files is not permitted due to bandwidth restrictions. Streaming of media such as You-Tube or music (Spotify, MP3Jam) is not permitted due to bandwidth restrictions except when directly instructed by your teacher or supervisor. d. Students are not to remove the virus software provided and replace it with another type of virus software. e. Specific network settings are not to be removed or altered as this could affect the laptop computer s ability to connect to the College Wireless Network. 9

11 7. Loss, Theft and Repairs a. All instances of loss, damage or theft must be reported to the College icentre/it Support personnel as soon as possible during term time. During non-term time, students are to contact the College Office. b. In the event of a hardware malfunction a report must be made to the College as soon as possible for warranty repair to be organised. c. Laptops incurring accidental damage will be repaired as soon as possible. Some of these repairs may incur an excess fee to be paid before a spare is issued to a student. LCD Screen: $100 Motherboard and Internal Parts $100 Keyboard $40 Power Adaptor (replacement) $30 Battery (replacement) $60 Extensive damage (several parts) $150 Cosmetic damage (plastic parts, casing) will not be repaired under warranty. Two repairs at these costs on a laptop are covered per calendar year. A third repair will incur full costs. d. Loss of a laptop will incur a fee of $ e. Damage to a laptop that occurs while it is lost will need to be paid for in full by the student. f. Carrying a laptop without the College-issued protective case will void all insurance and any damage sustained will need to be paid for in full. This could be up to the full replacement cost of the laptop where substantial damage has occurred. g. Theft of a laptop will incur an excess of $ to be met by the parents/carers. Theft will require a police report and/or crime investigation number. 8. Assessment and Homework a. Students are encouraged to use their laptop computer for homework and assessment tasks. However, the loss of data or hardware malfunction cannot be grounds for the appeal of any assessment task or homework. b. Students are to ensure that any assessment submitted via their laptop computer is their own work. 9. Classroom Usage a. Student laptop computers are to be brought to school each day, however the classroom teacher will manage the use of the laptop computers in the classroom. b. No student is to take out or use a laptop computer without the permission of the classroom teacher. c. When in use the laptop should be placed on a table or desk. The laptop should not be carried around whilst the screen is open. 10

12 10. Outside class usage a. Laptops are only to be used outside in areas that are safe and free from risks that could cause damage. When not in use, laptops are to be stored in the laptop carry case in the student s locker. b. When at home, laptops should not be used or left on a bed or floor as this is one of the major locations where damage is reported to have occurred. 11. Ownership a. Students have use of the laptop computer whilst they are enrolled at the College. When leaving the College, students are to return the laptop computer and accessories in good order on the last day of the student s enrolment. Should the laptop be returned in suitable condition there will be no further costs to the Parent/Guardian. b. At the end of the agreed program period, the laptop must be returned to the College, where arrangements will be made to have the devices re-imaged, removing unlicensed software. c. At the end of the agreed program period and at the discretion of the Principal taking into account the needs of the College, parents may be able to purchase the device and a payout figure will be negotiated at this time. 12. Appeals a. Please refer to the College s Grievance and Complaints Policy. 11

13 ST MARY S COLLEGE ICT Resources Acceptable Use of ICT Form User Acceptance I, the student named below hereby agree to comply with all requirements as set out in the Acceptable Use of Information & Communications Technology Resources statement and all other relevant laws and restrictions in my access to the various information and communication technology resources through the BCE and College network. I have received the laptop with details below in good condition with no faults. Name: Academic Year: PC: In particular, I agree that Conditions of Acceptable Use Student Initials 1. I will use the laptop for ethical, legal and responsible purposes only 2. I will always take care of the laptop 3. I will always carry the laptop in the College issued protective case and keep the laptop in my locker when not in use. 4. I will take the laptop home each day and fully charge it for next day use 5. I will not remove the labels on the front or back of the laptop. 6. I will not graffiti or put stickers on the laptop. 7. I will close the laptop and put it away if it might be damaged. 8. I will not allow other students to use the laptop 9. I will not leave the laptop unattended unless it is at home or in my locker. This includes leaving the laptop in classroom if unsupervised by a teacher. 10, I will back up any valuable data on the laptop on a regular basis and before bringing in for repair or reimaging. Backups can be made to the College H Drive, to a student s Google Drive, or any USB Device. School IT staff do not have time to retrieve lost data. 11. I understand that I am fully responsible for any damage if I do not follow these guidelines. 12. I understand that a fee will be charged by the College if a laptop is damaged. Student Signature: Student Number: DATE: Laptop Serial #: 12

14 ST MARY S COLLEGE ICT Resources Access Consent Form This Consent Form must be signed and returned prior to the student being granted (continued) access to the internet and other information and communication technology resources. Parents/carers are encouraged to review and discuss the contents of the Acceptable Use of Information & Communications Technology Resources statement with the student, and answer any questions that they may have. By signing this Consent Form, both parents/carers and the student are agreeing to the terms of access as set out in the Acceptable Use of Information & Communications Technology Resources statement, and acknowledge that they will be responsible in the event of any breach and that appropriate disciplinary steps may result. Any queries in relation to this material should be directed to the College Information Services Leader. User Acceptance I, the student named below hereby agree to comply with all requirements as set out in the Acceptable Use of Information & Communications Technology Resources statement and all other relevant laws and restrictions in my access to the various information and communication technology resources through the BCE and College network. Name: Academic Year: PC: Signature: Parent/Carer Consent I acknowledge that some material available on the internet may be objectionable and that in addition to the Acceptable Use of Information & Communications Technology Resources statement, I have discussed appropriate restrictions for the student when accessing or sharing information or material over the internet. I acknowledge that I am entering into a partnership with the College to promote ethical, legal and responsible use of ICT resources. Name: Date: Signature: 13

15 EXTERNAL ICT SERVICES CONSENT FORM As a parent/legal guardian of: (Please Print Student s first name and surname) I, (Please print Parent/Legal Guardian First Name and Surname understand that St Mary s College may disclose personal information about an individual to an external service provider for the limited purpose of storing and managing the information, for instance, when using public Internet services to create learning and teaching content. The school may also disclose personal information to overseas recipients, for instance, when storing personal information and data with cloud service providers, which are situated outside Australia. Further information is outlined in Brisbane Catholic Education s Privacy Policy, which sets out how each school and the BCE Office (BCEO) manages personal information provided to or collected by it. Further information is outlined in Brisbane Catholic Education s Privacy Policy, which sets out how each school and the BCE Office (BCEO) manages personal information provided to or collected by it. 14

St Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet

St Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet St Peter Claver College Student 1:1 Laptop Program Years 7-12 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Acceptable use of ICT resources

More information

HP Laptop & Apple ipads

HP Laptop & Apple ipads Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview

More information

Student Laptop Program

Student Laptop Program Student Laptop Program Student Name: Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 3 2. Overview of Student and Parent Responsibilities... 4

More information

St John Fisher College

St John Fisher College 2015 Information Technologies (IT) Policy and Guidelines Booklet For Students and Parents TABLE OF CONTENTS INTRODUCTION... 2 IT ACCEPTABLE USE POLICY... 3 STUDENT AND PARENT LOAN LAPTOP COMPUTER GUIDELINES...

More information

Student Laptop Computer Program

Student Laptop Computer Program Student Laptop Computer Program v0.1 29 October 2009 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Overview of Student and Parent Responsibilities...

More information

St Columban s College 1:1 Laptop Guidelines & Policy Booklet

St Columban s College 1:1 Laptop Guidelines & Policy Booklet St Columban s College 1:1 Laptop Guidelines & Policy Booklet St Columban's College 1:1 Laptop Program Page 1 TABLE OF CONTENTS OVERVIEW 2 SECTION 1 THE 1:1 MACBOOK PROGRAM 3 SECTION 2 STUDENT RESPONSIBILITIES

More information

Unity College Student 1:1 Laptop Computer Program Policy and Guidelines Booklet

Unity College Student 1:1 Laptop Computer Program Policy and Guidelines Booklet Unity College Student 1:1 Laptop Computer Program Policy and Guidelines Booklet Year 2015 TABLE OF CONTENTS TABLE OF CONTENTS... 1 EDUCATIONAL OPPORTUNITIES OF A 1 TO 1 LAPTOP PROGRAM... 2 OVERVIEW OF

More information

ONE TO ONE LAPTOP PROGRAMME POLICY

ONE TO ONE LAPTOP PROGRAMME POLICY ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...

More information

Kenmore State High School Student Laptop Charter

Kenmore State High School Student Laptop Charter Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6

More information

St Vincent s Primary School 1 : 1 Laptop Program Agreement and Policy Information Booklet

St Vincent s Primary School 1 : 1 Laptop Program Agreement and Policy Information Booklet St Vincent s Primary School 1 : 1 Laptop Program Agreement and Policy Information Booklet Table of Contents Section 1. Overview Section 2. The 1 to 1 Laptop Program 2.1 The Laptop 2.2 Programs and Resources

More information

LEEMING SENIOR HIGH SCHOOL. Bring Your Own Device Information and Policy 2015

LEEMING SENIOR HIGH SCHOOL. Bring Your Own Device Information and Policy 2015 LEEMING SENIOR HIGH SCHOOL Bring Your Own Device Information and Policy 2015 1 1 Dear Parent/Guardian Since the ending of the Federal Government s Digital Education Revolution funding, Leeming SHS can

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures. (March 2012)

NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures. (March 2012) NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures (March 2012) Contents Ownership... 3 Privately-owned devices... 4 Optional peripherals... 4 Warranty & Insurance... 4 Stolen or Lost Laptops...

More information

Sydney Technical High School

Sydney Technical High School Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of

More information

Student Laptop User Charter

Student Laptop User Charter Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both

More information

Bring Your Own Device Program: User Charter

Bring Your Own Device Program: User Charter Bring Your Own Device Program: User Charter Turramurra High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. The wireless network and

More information

1:1 COMPUTER PROGRAM LAPTOP POLICY

1:1 COMPUTER PROGRAM LAPTOP POLICY 1:1 COMPUTER PROGRAM LAPTOP POLICY STATEMENT The focus of learning with laptops at Greater Clark County Schools (GCCS) is to prepare students for their future, a world of digital technology and information.

More information

Digital Device LOAN CHARTER

Digital Device LOAN CHARTER Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

Lowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy

Lowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy BYOD Program 2015 BYOD Student Agreement/Acceptable Use Policy/Online Services Policy The student and parent/guardian must carefully read the above contract before signing it. Any questions should be addressed

More information

ICT Safe and Acceptable Use Policy for Students

ICT Safe and Acceptable Use Policy for Students ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

1 to 1 Laptop Programs Brisbane Catholic Education

1 to 1 Laptop Programs Brisbane Catholic Education 1 to 1 Laptop Programs Brisbane Catholic Education Introduction What is a one to one program? A 1 to 1 laptop program provides every student and teacher access to his or her own laptop computer in a wireless

More information

Strathfield Girls High School Bring your Own Device User Charter

Strathfield Girls High School Bring your Own Device User Charter Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.

More information

School Information Security and Privacy in the Cloud

School Information Security and Privacy in the Cloud School Information Security and Privacy in the Cloud Information Sheet and FAQ s Staying competitive in today s digital world means using technology in ways that are innovative in scope and reach. The

More information

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement 111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use

More information

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage. Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or

More information

The Fulham Boys School ipad Acceptable Use Policy, Procedures and Information

The Fulham Boys School ipad Acceptable Use Policy, Procedures and Information The Fulham Boys School ipad Acceptable Use Policy, Procedures and Information Except where specifically stated otherwise, the policies, procedures and information within this document apply to all ipads

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

Bring Your Own Device Program: 2015 User Agreement

Bring Your Own Device Program: 2015 User Agreement Bring Your Own Device Program: 2015 User Agreement Asquith Girls High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. Asquith Girls High

More information

Parent FAQ s. 1:1 Laptop Program. Introduction. 1-to-1 devices and student learning. Will students use computers too much for schoolwork?

Parent FAQ s. 1:1 Laptop Program. Introduction. 1-to-1 devices and student learning. Will students use computers too much for schoolwork? Introduction What is a one-to-one program? One-to-one learning provides every student and teacher access to his or her own laptop computer in a wireless environment allowing students to learn at their

More information

CC. TECHNOLOGY ACCEPTABLE USE POLICY. 1. Purpose

CC. TECHNOLOGY ACCEPTABLE USE POLICY. 1. Purpose CC. TECHNOLOGY ACCEPTABLE USE POLICY 1. Purpose a. The Children s Internet Protection Act (CIPA), 47 U.S.C. 254(h)(5), and South Dakota Consolidated Statues Section 22-24-55 require public schools to implement

More information

Box Hill Senior Secondary College/MYSC

Box Hill Senior Secondary College/MYSC Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication

More information

Eastwood Local Schools Laptop Policies and Handbook

Eastwood Local Schools Laptop Policies and Handbook Eastwood Local Schools Laptop Policies and Handbook Table of Contents Program Overview - 3 Acceptable Use Policy - 4 Information Technology Resources Responsibilities & Agreement - 7 District Laptop Service

More information

Diploma of IT student Laptop Policy

Diploma of IT student Laptop Policy Diploma of IT student Laptop Policy We are very excited to launch our new laptop Program for Evocca College students. This program will enable you to access technology at home and at the college. We have

More information

ipad Acceptable Use Regulation

ipad Acceptable Use Regulation ipad Acceptable Use Regulation The Mamaroneck School District has purchased Apple ipads for selected students of the Mamaroneck School District. These students will be issued ipads with predetermined applications

More information

Nazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures

Nazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures Nazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures 1. Introduction Nazareth Catholic College acknowledges the increasing use of Information and Communication

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

National Secondary School Computer Fund Meridan State College Q4 Take Home Tablet Charter. Student NSSCF Charter

National Secondary School Computer Fund Meridan State College Q4 Take Home Tablet Charter. Student NSSCF Charter National Secondary School Computer Fund Meridan State College Q4 Take Home Tablet Charter Student NSSCF Charter Contents Student NSSCF Charter... 3 NSSCF overview... 3 Device care... 4 Data security and

More information

JGSC Laptop Agreement

JGSC Laptop Agreement JGSC Laptop Agreement The mission of the 1:1 program at JGSC is to create an innovative, collaborative learning environment for students and teachers. Together, they will implement creative uses of educational

More information

NOTRE DAME PREPARATORY AND MARIST ACADEMY

NOTRE DAME PREPARATORY AND MARIST ACADEMY NOTRE DAME PREPARATORY AND MARIST ACADEMY Parent/Student Microsoft Surface Terms and Agreement Contract Notre Dame Preparatory School and Marist Academy is committed to preparing its students for a 21

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014 BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

CARRAMAR PUBLIC SCHOOL

CARRAMAR PUBLIC SCHOOL CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school

More information

Student Laptop Computer Program Policy, Procedures and Guidelines

Student Laptop Computer Program Policy, Procedures and Guidelines St James College TableofContents 1.0 Vision 2.0 Curriculum 2.1 Introductionfunding 2.2 Rationale 2.3 Stakeholders 2.4 CurriculumPlan 2.5 Areasofgeneralusage 2.6 Schoolareaswherelaptopsaretobeused 2.7 Howtheprogramistobeimplemented

More information

ILLINOIS LUTHERAN S CHROMEBOOK AGREEMENT

ILLINOIS LUTHERAN S CHROMEBOOK AGREEMENT ILLINOIS LUTHERAN S CHROMEBOOK AGREEMENT Students across the junior high/high school will be issued Google Chromebooks for use in school and at home. This document provides students and their parents/guardians

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and

More information

ONE-2-ONE LEARNING LAPTOP PROGRAM 2011

ONE-2-ONE LEARNING LAPTOP PROGRAM 2011 GLENUNGA INTERNATIONAL HIGH SCHOOL ONE-2-ONE LEARNING LAPTOP PROGRAM 2011 Department of Education and Children s Services T/A South Australian Government Schools CRICOS Provider No. 00018A 1. VISION and

More information

Laptops for Students Program

Laptops for Students Program Laptops for Students Program Technology Use Agreement Handbook Expanding Learning to the 21st Century and Beyond PAGE 1 OF 13 Table of Contents Laptop Policy & Procedures Handbook 3 Objectives 3 Laptop

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

Tri-city College Prep High School Tablet Program Handbook

Tri-city College Prep High School Tablet Program Handbook Tri-city College Prep High School Tablet Program Handbook The focus of the Tablet Initiative at Tri-city College Prep High School is to prepare students for their future, a world of digital technology

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to

More information

AP 417 Information and Communication Services

AP 417 Information and Communication Services AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 (Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Terms and Conditions

Terms and Conditions Terms and Conditions Version 1.4 September, 2012 A Kensington Terrace Toowong Queensland 4066 T (07) 3309 3500 E mail@bbc.qld.edu.au F (07) 3371 2679 W http://www.bbc.qld.edu.au Table of Contents 1. Introduction...

More information

Computer Facilities and External Networks Acceptable Use by Students

Computer Facilities and External Networks Acceptable Use by Students Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic

More information

Frequently Asked Questions for parents

Frequently Asked Questions for parents Frequently Asked Questions for parents I had intended to purchase a laptop for my child. Should I proceed? All students in Years 10 to 12 at Kenmore State High School will have access to a high quality,

More information

OCS Student / Parent Laptop Agreement

OCS Student / Parent Laptop Agreement OCS Student / Parent Laptop Agreement Terms and Conditions of Use By signing this form, the student and the student s parent/guardian certify that they have thoroughly read, understand, and accept the

More information

Student Tablet Guide

Student Tablet Guide Student Tablet Guide Contents 1. School Day 2. A list of Do s 3. A list of Do Not s 4. Support Model 5. FAQ 6. File management 7. Backing up 8. Online citizenship 9. Parents 10. Tablet Keys and Ports Front

More information

Marion County School District Computer Acceptable Use Policy

Marion County School District Computer Acceptable Use Policy Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through

More information

How To Make A Contract Between A Client And A Hoster

How To Make A Contract Between A Client And A Hoster Web Hosting Terms & Conditions Please read these web-hosting terms carefully, as they set out our and your rights and obligations in relation to our web hosting services. AGREEMENT: Whereas: (1) The Ruby

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

COMMUNICATION AND NETWORK POLICY

COMMUNICATION AND NETWORK POLICY COMMUNICATION AND NETWORK POLICY Always within REACH MOUNT BAKER SOUTH PRIMARY SCHOOL IPAD LOAN AGREEMENT Purpose To facilitate participation in all aspects of Mount Barker South Primary School curriculum.

More information

CARE COURTESY COOPERATION CHALLENGE COMMITMENT

CARE COURTESY COOPERATION CHALLENGE COMMITMENT 2016 Laptops at Chancellor State College Information and Procedures Handbook Including: Chancellor Laptop Program Bring Your Own Device National Secondary Schools Computer Fund (Phased out by end of 2016)

More information

One-to-One Technology Initiative Table of Contents

One-to-One Technology Initiative Table of Contents One-to-One Technology Initiative Table of Contents 1. Acceptable Use... 2-4 General Staff Responsibilities Parent and Guardian Responsibilities User Responsibilities Consequences 2. ipad Identification

More information

Laptop Provision Loreto College, Ballarat

Laptop Provision Loreto College, Ballarat Laptop Provision Loreto College, Ballarat Overview Loreto College is committed to providing all students with relevant, rigorous and engaging learning opportunities and understands that students learn

More information

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3

More information

Computers and Internet Policy and Procedure

Computers and Internet Policy and Procedure Computers and Internet Policy and Procedure Computers and Internet Policy and Procedure Modification history Date Modification Person responsible 18/01/12 Modification of existing policy Roger Stevens

More information

2015-2016 ISD 518 FUTURE READY. Tablet Procedures and Information

2015-2016 ISD 518 FUTURE READY. Tablet Procedures and Information 21ST CENTURY SKILLS LEARNING ANYTIME, ANYWHERE OPTIONAL INSURANCE FUTURE READY Tablet Procedures and Information Worthington ISD 518 wants to ensure students develop the skills and knowledge necessary

More information

Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears.

Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears. Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES 1. Definitions In this regulation unless a contrary intention appears Authority means (i) in relation to the central facilities and computing and

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Website Hosting Agreement

Website Hosting Agreement Website Hosting Agreement This Agreement is Between: (1) Tutch Media Limited, a company registered in England whose office is at 121c London Road, Knebworth, Herts, SG3 6EX ( the Host ) and (2) The Client

More information

GARDENVALE PRIMARY SCHOOL BYOD

GARDENVALE PRIMARY SCHOOL BYOD GARDENVALE PRIMARY SCHOOL BYOD (Bring Your Own Device) POLICY This policy operates in conjunction with the Victorian Department of Education and Early Childhood development and Gardenvale Primary School

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

How To Use A Tablet/Laptop At A School District Computer At Home

How To Use A Tablet/Laptop At A School District Computer At Home Tablet - Laptop Policy, Procedures, and Information 2013-2014 School Year Chester Area HS/MS Chester, South Dakota Chester Area HS/MS Tablet/laptop Program The focus of the 1:1 Classroom Connections Program

More information

Acceptable Use Guidelines

Acceptable Use Guidelines Attachment to the Computer and Information Security and Information Management Policies Acceptable Use Guidelines NZQA Quality Management System Supporting Document Purpose These Acceptable Use Guidelines

More information

BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy

BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy Approved by Leadership Team 27 th April 2016 Approved by the Governing Body: 18 th May 2016 Review Due: May 2017 Rationale The Beaconsfield

More information

Meridian Public Schools Laptop Policy

Meridian Public Schools Laptop Policy Meridian Public Schools Laptop Policy The focus of the learning with laptops program at Meridian Public School is to prepare students for their future, a world of digital technology and information. As

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Purpose is committed to supporting student learning experiences within a highly functioning environment. Our classrooms are reliant on a range of leading-edge technologies

More information

HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY

HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY This policy applies whenever you are using Heathfield High School information technology equipment or services. It should be read in

More information

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program. Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring

More information

Bright Local Schools BYOD Acceptable Use Policy

Bright Local Schools BYOD Acceptable Use Policy Bright Local Schools BYOD Acceptable Use Policy Why Bring Your Own Device at Bright Local Schools? Bright Local is dedicated to providing 21st Century instruction to all its students. We feel we must provide

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5 BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 5 08/25/2015 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective

More information

National Secondary School Computer Fund Meridan State College Q3 Take Home Laptop Charter. Student NSSCF Charter

National Secondary School Computer Fund Meridan State College Q3 Take Home Laptop Charter. Student NSSCF Charter National Secondary School Computer Fund Meridan State College Q3 Take Home Laptop Charter Student NSSCF Charter Contents STUDENT NSSCF CHARTER... 3 NSSCF OVERVIEW... 3 DEVICE CARE... 4 DATA SECURITY AND

More information

Albany Senior High School

Albany Senior High School Albany Senior High School Bring your own device (BYOD) Usage Policy for Students and Parents BYOD Usage Policy S:\AdminShared\Teaching Staff\ICT\BYOD\BYOD Policy for Parents.doc Table of Contents 1 Introduction

More information

Bring Your Own x. INFORMATION AND PROCEDURES HANDBOOK Version 2014-12-10

Bring Your Own x. INFORMATION AND PROCEDURES HANDBOOK Version 2014-12-10 Bring Your Own x INFORMATION AND PROCEDURES HANDBOOK Version 2014-12-10 Contents BYOx Transition Plan... 3 Forward... 3 Introduction... 3 BYOx Vision... 4 Software and Applications... 4 Microsoft Office...

More information

Ashland High School Tablet Policy, Procedures, and Information 2012-13

Ashland High School Tablet Policy, Procedures, and Information 2012-13 Ashland High School Tablet Policy, Procedures, and Information 2012-13 The focus of the tablet program at AHS is to provide tools and resources to the 21st Century Learner. Excellence in education requires

More information

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015

TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015 TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015 Tekamah-Herman Community Schools is proud to offer our High School Students Apple MacBook Air computers for use at school

More information