ST MARY S COLLEGE STUDENT 1:1 LAPTOP PROGRAM YEARS Policy and Guidelines Booklet
|
|
- Barbra Little
- 8 years ago
- Views:
Transcription
1 ST MARY S COLLEGE STUDENT 1:1 LAPTOP PROGRAM YEARS 7-12 Policy and Guidelines Booklet
2 Contents 1. St. Mary s College Vision for Learning and teaching Overview of Student and Parent Responsibilities Acceptable Use of Information and Communication Technology Resources Conditions of Use of St Mary s College ICT Resources Student and Parent Laptop Guidelines... 8 ST MARY S COLLEGE ICT Resources Acceptable Use of ICT Form ST MARY S COLLEGE ICT Resources Access Consent Form EXTERNAL ICT SERVICES CONSENT FORM
3 1. St Mary s College Vision for Learning and teaching Our Vision for learning and teaching Learning will be engaging and challenging, building the capacity for students to connect, collaborate and be critical thinkers. Our girls will be equipped to contribute and be responsible citizens in a digital world. A technology rich learning environment will provide a platform for innovative teaching, and learning that is lifelong and lifewide... Anywhere, anytime!! To achieve this, St Mary s College students will need: Personal easy access to a technological device which enables them to collaborate with others for learning, work and skill development Resources and abilities to gather, evaluate, create and produce relevant information and knowledge, reflect and think over those processes, and communicate effectively with others about them Contemporary skills Checklist for St Mary s College Students as 21 st Century learners Knowledge Building Do students move beyond reproducing information to building knowledge, and is that knowledge cross-disciplinary? Collaboration Do students collaborate with other people and create interdependent work products? Use of Technology for Learning Do students use ICT in ways that support knowledge building, and do and learn things that could not be done without ICT? Problem Solving & Innovation Do students solve problems and implement their solutions in the real world? Self-Regulation Does the learning activity have multiple stages, and call on students to plan their work and assess their work over time? Skilled Communication Do students produce extended communication that is organized around a central theme and is well developed? 2
4 2. Overview of Student and Parent Responsibilities Learning will not take place only inside schools and colleges, but in communities, workplaces and families. The shift to thinking about learning beyond the classroom requires a shift in our thinking about the fundamental organizational unit of education from the school, an institution where learning is organized, defined and contained to the learner, an intelligent agent with the potential to learn from any and all of her encounters with the world around her. Students and parents will be responsible for the overall care of the laptop. Students will have full local administrator rights to the laptop. Students will be trained to be competent users of their assigned laptop. A laptop carry bag will be supplied. Students will be required to carry the laptop within this bag at all times. Other laptop bags are not permitted to be used. The laptop is to be treated with care and stored in the carry bag supplied when not in use. The College reserves the right to regular hardware, software and data inspections, Students will be subject to the terms of the ICT Acceptable Use Policy if there is any evidence of misuse or inappropriate usage. All students will be responsible for the regular backup of their data via the means recommended by the College. All laptops will include software to assist the learning of the student. Students must not delete any software supplied by the College, however, they are permitted to add additional folders and appropriate software to assist with organising their work and enhance their responsible use of technology in everyday life. Students will also be able to install additional home-based printers, scanners and other peripheral devices if they wish. Students must be aware of and abide by the ICT Acceptable Use Policy (see section 3). Failure to abide by the user agreement could result in disciplinary action, or in the event of damage, a financial cost to the parent (refer to Section 4 - Student and Parent Laptop Guidelines). Laptops will be recharged at home each night ready for the next school day. The laptop can be connected to the student s home internet at the parent s discretion. Parents are encouraged to supervise proper usage of laptops at home, especially whilst students are using the internet. Tom Bentley, DEMOS 3
5 3. Acceptable Use of Information and Communication Technology Resources Information & Communication Technology (ICT) has become of critical importance to schools in facilitating and supporting learning, teaching and other administrative activities for teachers, students, parents and administrators. St Mary s College has established significant computing and communication resources to support these activities. These resources include: All network services, computer equipment and software, owned, leased or used under licence by Brisbane Catholic Education Centre & the College; Computer facilities maintained by other bodies but available for use through an agreement or agreements with Brisbane Catholic Education. St Mary s College is bound by legislation and good stewardship of resources to ensure the appropriate use of its ICT. Increased legislation and adherence to regulatory authorities relating to ICT compels the College to review its internal policies and procedures to ensure compliance. ICT resources are supplied in line with the following principles: access to ICT is provided subject to need and availability of resources; privacy, confidentiality and respect of the personal rights of others is maintained; the importance of the cost-efficient use of the ICT is recognised; users engage in ethical, legal and responsible use of ICT. The Conditions of Use of ICT Resources has been developed to inform users of their rights, responsibilities and obligations when using ICT resources, consistent with Brisbane Catholic Education s requirement that all such resources are used in an ethical, legal and responsible manner. Policy Update This policy will be updated as necessary. All attempts will be made to adhere to the above policy, but particular circumstances (such as technological advancements) may require the Principal to depart from the stated policy. 4
6 4. Conditions of Use of St Mary s College ICT Resources i. By accessing and using the ICT resources provided by St Mary s College, you are agreeing to abide by this Conditions of Use of ICT Resources statement. ii. iii. These conditions apply to all St Mary s College ICT resources, regardless of how they are accessed. This includes access to all installed computers, through users own hardware (for example, personal laptops, PDAs or other similar technology) whether wired or wireless, or remote access over the internet through users own resources. While staff and students (in particular, ICT staff engaged by the College) may be called upon in the course of their duties to undertake activities beyond those permitted by the terms of this Agreement, it is expected that any such activities undertaken must be done in accordance with the spirit of this statement. Ethical, Legal and Responsible Use of ICT Resources iv. St Mary s College requires all users of its ICT resources to do so in an ethical, legal and responsible manner. v. Users of St Mary s College ICT resources must be aware that use of these resources is subject to the full range of laws that apply to the internet, communications and to the use of computers, and St Mary s College policies. Such law and principles includes users obligations in relation to copyright, plagiarism, intellectual property, breach of confidence, defamation, privacy, bullying/harassment, vilification and anti-discrimination legislation, the creation of contractual obligations, and other civil and criminal laws. vi. St Mary s College s ICT resources must not be used for unauthorised commercial activities and/or personal gain. Actions performed using St Mary s College ICT resources must comply with the terms of any licence agreement for the use of software programs and other online resources. Copyright and Intellectual Property Rights vii. viii. Users must not, through the use of St Mary s College ICT resources, copy, download, store or transmit material which infringes copyright or the intellectual property rights of others without appropriate approval. Such material includes music files, movies, videos or any other form of media. Users should be aware that actions performed using computer and network resources, regardless of any disclaimers that might be made, ultimately reflect on our College and community as a whole. This is particularly relevant where users post or submit material in a way that makes it publicly available over the internet. 5
7 Security and Privacy ix. Users have a role to play in ensuring the security and privacy of information transmitted by use of the ICT resources. Users are issued with unique usernames and passwords, which must be kept strictly confidential at all times. x. Users must protect systems, information and accounts by: Choosing a secure password which is changed regularly (a secure password is one that is difficult to guess, for example, containing a combination of letters and numbers and not simply a name or date of birth) Using access to ICT resources only as authorised by the College; Respecting the privacy and confidentiality of information that they may come across through access to the resources; Only downloading, installing or using authorised software; Reporting any breach or prospective breach of network security to the appropriate technical personnel or the ICT Services Help Desk. xi. Unacceptable conduct by users which could result in a breach of security or privacy includes: Disclosing your username and password details to another person; Disclosing other private or confidential information to unauthorised persons; Gaining unauthorised access to any systems by any means; Using St Mary s College ICT resources to attack or compromise another system or network; Downloading, installing or using unauthorised software programs, specifically software that allows illegal download of content such as YouTube downloader, bit torrent software, bear share or other software to download music or video without payment. Legal software such as itunes is permitted. Deliberately installing computer viruses or other malicious programs; Accessing or intercepting others electronic communications without permission. xii. xiii. Continued use of a computer infected with a virus. Users should not, as a general rule, display personal information about themselves in a way that is publicly available. Where such disclosure is made through authorised avenues (for example, by the use of or an official website), users should be aware that invasions of privacy may sometimes occur and it is outside St Mary s College s control to prevent such instances from occurring. Users are reminded that should not be used to send urgent, sensitive or confidential information. xiv. Users must, however, be aware that the operation and maintenance of ICT systems often requires the backup and caching of data, the logging of activity and the monitoring of general usage patterns and as such, complete confidentiality and privacy cannot be guaranteed. St Mary s College may also be required to inspect or provide copies of 6
8 electronic communications where required to by law, or where the auditing of use and investigation of possible misuses of ICT resources is required. xv. The College recommends the use of third party services 1 such as JacPlus; Pearson Places; Clickview Online; Google Drive (cloud storage and document sharing) for students. The College may disclose personal information about an individual to an external service provider for the limited purpose of storing and managing the information, for instance, when using public Internet services to create learning and teaching content. xvi. The school may also disclose personal information to overseas recipients, for instance, when storing personal information and data with cloud service providers, which are situated outside Australia. Selected services are carefully reviewed against Privacy Principles detailed in the Australian Privacy Act 2. The College completes due diligence checks recommended by Brisbane Catholic Education before using external service providers. External Service Providers used at the College will be listed on the Parent Portal. Other services may be added at any time at the discretion of the College Principal. Additional Conditions Relating to Specific Resources xvii. The uses of the following resources is subject to additional Conditions of Use, which must be read in conjunction with this document: Student Conditions of Use Breaches of these Conditions of Use xviii. xix. The breach of these Conditions of Use will be taken seriously and may result in disciplinary action being taken. See Basic Principles for Use of St Mary s College laptops. Examples of possible consequences for breach of these Conditions of Use range from loss or restriction of access to ICT resources, to formal disciplinary action for breach of School Behaviour Management policy (students) or Code of Conduct (staff). Cases of serious, deliberate, and/or criminal breach will be referred to external authorities and may result in civil or criminal proceedings. 1 Services not directly provided or necessarily endorsed by Brisbane Catholic Education. 2 The Commonwealth Privacy Act 1988 and Privacy Amendment (Enhancing Privacy Protection) Act 2012 which came into operation in March
9 5. Student and Parent Laptop Guidelines 1. Education Purposes Students are to use their laptop computer for educational purposes. The laptop computer comes pre-installed with all the necessary software for student use. The College reserves the right to carry out software, hardware and data inspections of laptop computers at any time. 2. Student Responsibilities Laptops are to be cared for and kept free from risk of damage at all times. This will mean that at times the laptop will need to be closed and placed in its protective case if the risk of damage is reasonably foreseeable. a. Laptops are to be kept clean and free from graffiti and stickers. b. It is the student s responsibility to charge their laptop computer at home each evening. A limited number of spare chargers are available from the icentre. c. Students are not to remove any identification labels from their laptop computer. d. While travelling to and from school or when not in use, laptop computers are to be carried in the College issued protective case and placed in school bags. e. The software loaded on the laptop computers is licensed to the College. Students are not permitted to copy, transfer or delete software. f. Students are responsible for data backup and software upgrade. (Please refer to point 4 and 5 for more details.) g. Students are not to share the use of laptops with other students. 3. Parent Responsibilities a. Ensure students fulfil their responsibilities as outlined above. b. Supervise student use of the computer when at home including their Internet use. c. Ensure the student has their computer at school each day in a condition that will enable it to be usable for any educational purpose. d. Comply with the policy of the school in relation to the return/transfer of the device in the event of the student leaving the school prior to the end of Year 12. 8
10 4. Data Backup and Software Upgrading a. Students are responsible for the backup of all data. Data should be backed up on to the student s home drive on the school network, on to the student s Google Drive provided by the College or an approved storage device. b. The College may not be able to restore data from local hard drives with problems. c. Students are responsible to ensure that all software is kept up to date. (eg. Operating System and installed Virus Software). 5. Technical Support a. Students will be given full local administrator rights of their laptop computer. b. Students will be trained on how to support and maintain their laptop computer. c. In the event of a software malfunction students may contact the College icentre/it Support for assistance and re-imaging of their laptop. Students should ensure that their laptop is always backed up to help facilitate re-imaging if necessary. 6. Use of the College Wireless Network and Internet Access a. The use of the College Wireless Network and all associated infrastructure are available for educational use with student laptop computers. b. The internet is only to be accessed through the College Wireless Network while at school, i.e. connecting a laptop to a private wireless internet device or phone to gain access to internet whilst at school is not permitted. Your help in supporting this policy would be appreciated. c. The downloading of large files is not permitted due to bandwidth restrictions. Streaming of media such as You-Tube or music (Spotify, MP3Jam) is not permitted due to bandwidth restrictions except when directly instructed by your teacher or supervisor. d. Students are not to remove the virus software provided and replace it with another type of virus software. e. Specific network settings are not to be removed or altered as this could affect the laptop computer s ability to connect to the College Wireless Network. 9
11 7. Loss, Theft and Repairs a. All instances of loss, damage or theft must be reported to the College icentre/it Support personnel as soon as possible during term time. During non-term time, students are to contact the College Office. b. In the event of a hardware malfunction a report must be made to the College as soon as possible for warranty repair to be organised. c. Laptops incurring accidental damage will be repaired as soon as possible. Some of these repairs may incur an excess fee to be paid before a spare is issued to a student. LCD Screen: $100 Motherboard and Internal Parts $100 Keyboard $40 Power Adaptor (replacement) $30 Battery (replacement) $60 Extensive damage (several parts) $150 Cosmetic damage (plastic parts, casing) will not be repaired under warranty. Two repairs at these costs on a laptop are covered per calendar year. A third repair will incur full costs. d. Loss of a laptop will incur a fee of $ e. Damage to a laptop that occurs while it is lost will need to be paid for in full by the student. f. Carrying a laptop without the College-issued protective case will void all insurance and any damage sustained will need to be paid for in full. This could be up to the full replacement cost of the laptop where substantial damage has occurred. g. Theft of a laptop will incur an excess of $ to be met by the parents/carers. Theft will require a police report and/or crime investigation number. 8. Assessment and Homework a. Students are encouraged to use their laptop computer for homework and assessment tasks. However, the loss of data or hardware malfunction cannot be grounds for the appeal of any assessment task or homework. b. Students are to ensure that any assessment submitted via their laptop computer is their own work. 9. Classroom Usage a. Student laptop computers are to be brought to school each day, however the classroom teacher will manage the use of the laptop computers in the classroom. b. No student is to take out or use a laptop computer without the permission of the classroom teacher. c. When in use the laptop should be placed on a table or desk. The laptop should not be carried around whilst the screen is open. 10
12 10. Outside class usage a. Laptops are only to be used outside in areas that are safe and free from risks that could cause damage. When not in use, laptops are to be stored in the laptop carry case in the student s locker. b. When at home, laptops should not be used or left on a bed or floor as this is one of the major locations where damage is reported to have occurred. 11. Ownership a. Students have use of the laptop computer whilst they are enrolled at the College. When leaving the College, students are to return the laptop computer and accessories in good order on the last day of the student s enrolment. Should the laptop be returned in suitable condition there will be no further costs to the Parent/Guardian. b. At the end of the agreed program period, the laptop must be returned to the College, where arrangements will be made to have the devices re-imaged, removing unlicensed software. c. At the end of the agreed program period and at the discretion of the Principal taking into account the needs of the College, parents may be able to purchase the device and a payout figure will be negotiated at this time. 12. Appeals a. Please refer to the College s Grievance and Complaints Policy. 11
13 ST MARY S COLLEGE ICT Resources Acceptable Use of ICT Form User Acceptance I, the student named below hereby agree to comply with all requirements as set out in the Acceptable Use of Information & Communications Technology Resources statement and all other relevant laws and restrictions in my access to the various information and communication technology resources through the BCE and College network. I have received the laptop with details below in good condition with no faults. Name: Academic Year: PC: In particular, I agree that Conditions of Acceptable Use Student Initials 1. I will use the laptop for ethical, legal and responsible purposes only 2. I will always take care of the laptop 3. I will always carry the laptop in the College issued protective case and keep the laptop in my locker when not in use. 4. I will take the laptop home each day and fully charge it for next day use 5. I will not remove the labels on the front or back of the laptop. 6. I will not graffiti or put stickers on the laptop. 7. I will close the laptop and put it away if it might be damaged. 8. I will not allow other students to use the laptop 9. I will not leave the laptop unattended unless it is at home or in my locker. This includes leaving the laptop in classroom if unsupervised by a teacher. 10, I will back up any valuable data on the laptop on a regular basis and before bringing in for repair or reimaging. Backups can be made to the College H Drive, to a student s Google Drive, or any USB Device. School IT staff do not have time to retrieve lost data. 11. I understand that I am fully responsible for any damage if I do not follow these guidelines. 12. I understand that a fee will be charged by the College if a laptop is damaged. Student Signature: Student Number: DATE: Laptop Serial #: 12
14 ST MARY S COLLEGE ICT Resources Access Consent Form This Consent Form must be signed and returned prior to the student being granted (continued) access to the internet and other information and communication technology resources. Parents/carers are encouraged to review and discuss the contents of the Acceptable Use of Information & Communications Technology Resources statement with the student, and answer any questions that they may have. By signing this Consent Form, both parents/carers and the student are agreeing to the terms of access as set out in the Acceptable Use of Information & Communications Technology Resources statement, and acknowledge that they will be responsible in the event of any breach and that appropriate disciplinary steps may result. Any queries in relation to this material should be directed to the College Information Services Leader. User Acceptance I, the student named below hereby agree to comply with all requirements as set out in the Acceptable Use of Information & Communications Technology Resources statement and all other relevant laws and restrictions in my access to the various information and communication technology resources through the BCE and College network. Name: Academic Year: PC: Signature: Parent/Carer Consent I acknowledge that some material available on the internet may be objectionable and that in addition to the Acceptable Use of Information & Communications Technology Resources statement, I have discussed appropriate restrictions for the student when accessing or sharing information or material over the internet. I acknowledge that I am entering into a partnership with the College to promote ethical, legal and responsible use of ICT resources. Name: Date: Signature: 13
15 EXTERNAL ICT SERVICES CONSENT FORM As a parent/legal guardian of: (Please Print Student s first name and surname) I, (Please print Parent/Legal Guardian First Name and Surname understand that St Mary s College may disclose personal information about an individual to an external service provider for the limited purpose of storing and managing the information, for instance, when using public Internet services to create learning and teaching content. The school may also disclose personal information to overseas recipients, for instance, when storing personal information and data with cloud service providers, which are situated outside Australia. Further information is outlined in Brisbane Catholic Education s Privacy Policy, which sets out how each school and the BCE Office (BCEO) manages personal information provided to or collected by it. Further information is outlined in Brisbane Catholic Education s Privacy Policy, which sets out how each school and the BCE Office (BCEO) manages personal information provided to or collected by it. 14
St Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet
St Peter Claver College Student 1:1 Laptop Program Years 7-12 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Acceptable use of ICT resources
More informationHP Laptop & Apple ipads
Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview
More informationStudent Laptop Program
Student Laptop Program Student Name: Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 3 2. Overview of Student and Parent Responsibilities... 4
More informationSt John Fisher College
2015 Information Technologies (IT) Policy and Guidelines Booklet For Students and Parents TABLE OF CONTENTS INTRODUCTION... 2 IT ACCEPTABLE USE POLICY... 3 STUDENT AND PARENT LOAN LAPTOP COMPUTER GUIDELINES...
More informationStudent Laptop Computer Program
Student Laptop Computer Program v0.1 29 October 2009 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Overview of Student and Parent Responsibilities...
More informationSt Columban s College 1:1 Laptop Guidelines & Policy Booklet
St Columban s College 1:1 Laptop Guidelines & Policy Booklet St Columban's College 1:1 Laptop Program Page 1 TABLE OF CONTENTS OVERVIEW 2 SECTION 1 THE 1:1 MACBOOK PROGRAM 3 SECTION 2 STUDENT RESPONSIBILITIES
More informationUnity College Student 1:1 Laptop Computer Program Policy and Guidelines Booklet
Unity College Student 1:1 Laptop Computer Program Policy and Guidelines Booklet Year 2015 TABLE OF CONTENTS TABLE OF CONTENTS... 1 EDUCATIONAL OPPORTUNITIES OF A 1 TO 1 LAPTOP PROGRAM... 2 OVERVIEW OF
More informationONE TO ONE LAPTOP PROGRAMME POLICY
ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...
More informationKenmore State High School Student Laptop Charter
Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6
More informationSt Vincent s Primary School 1 : 1 Laptop Program Agreement and Policy Information Booklet
St Vincent s Primary School 1 : 1 Laptop Program Agreement and Policy Information Booklet Table of Contents Section 1. Overview Section 2. The 1 to 1 Laptop Program 2.1 The Laptop 2.2 Programs and Resources
More informationLEEMING SENIOR HIGH SCHOOL. Bring Your Own Device Information and Policy 2015
LEEMING SENIOR HIGH SCHOOL Bring Your Own Device Information and Policy 2015 1 1 Dear Parent/Guardian Since the ending of the Federal Government s Digital Education Revolution funding, Leeming SHS can
More informationHow To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
More informationNAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures. (March 2012)
NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures (March 2012) Contents Ownership... 3 Privately-owned devices... 4 Optional peripherals... 4 Warranty & Insurance... 4 Stolen or Lost Laptops...
More informationSydney Technical High School
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
More informationStudent Laptop User Charter
Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both
More informationBring Your Own Device Program: User Charter
Bring Your Own Device Program: User Charter Turramurra High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. The wireless network and
More information1:1 COMPUTER PROGRAM LAPTOP POLICY
1:1 COMPUTER PROGRAM LAPTOP POLICY STATEMENT The focus of learning with laptops at Greater Clark County Schools (GCCS) is to prepare students for their future, a world of digital technology and information.
More informationDigital Device LOAN CHARTER
Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to
More informationDIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
More informationSaint Martin s Catholic Academy
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
More informationLowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy
BYOD Program 2015 BYOD Student Agreement/Acceptable Use Policy/Online Services Policy The student and parent/guardian must carefully read the above contract before signing it. Any questions should be addressed
More informationICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More informationAuthorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together
Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:
More information1 to 1 Laptop Programs Brisbane Catholic Education
1 to 1 Laptop Programs Brisbane Catholic Education Introduction What is a one to one program? A 1 to 1 laptop program provides every student and teacher access to his or her own laptop computer in a wireless
More informationStrathfield Girls High School Bring your Own Device User Charter
Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.
More informationSchool Information Security and Privacy in the Cloud
School Information Security and Privacy in the Cloud Information Sheet and FAQ s Staying competitive in today s digital world means using technology in ways that are innovative in scope and reach. The
More informationCalwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement
111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use
More informationStudents are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
More informationThe Fulham Boys School ipad Acceptable Use Policy, Procedures and Information
The Fulham Boys School ipad Acceptable Use Policy, Procedures and Information Except where specifically stated otherwise, the policies, procedures and information within this document apply to all ipads
More informationSOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
More informationBring Your Own Device Program: 2015 User Agreement
Bring Your Own Device Program: 2015 User Agreement Asquith Girls High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. Asquith Girls High
More informationParent FAQ s. 1:1 Laptop Program. Introduction. 1-to-1 devices and student learning. Will students use computers too much for schoolwork?
Introduction What is a one-to-one program? One-to-one learning provides every student and teacher access to his or her own laptop computer in a wireless environment allowing students to learn at their
More informationCC. TECHNOLOGY ACCEPTABLE USE POLICY. 1. Purpose
CC. TECHNOLOGY ACCEPTABLE USE POLICY 1. Purpose a. The Children s Internet Protection Act (CIPA), 47 U.S.C. 254(h)(5), and South Dakota Consolidated Statues Section 22-24-55 require public schools to implement
More informationBox Hill Senior Secondary College/MYSC
Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication
More informationEastwood Local Schools Laptop Policies and Handbook
Eastwood Local Schools Laptop Policies and Handbook Table of Contents Program Overview - 3 Acceptable Use Policy - 4 Information Technology Resources Responsibilities & Agreement - 7 District Laptop Service
More informationDiploma of IT student Laptop Policy
Diploma of IT student Laptop Policy We are very excited to launch our new laptop Program for Evocca College students. This program will enable you to access technology at home and at the college. We have
More informationipad Acceptable Use Regulation
ipad Acceptable Use Regulation The Mamaroneck School District has purchased Apple ipads for selected students of the Mamaroneck School District. These students will be issued ipads with predetermined applications
More informationNazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures
Nazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures 1. Introduction Nazareth Catholic College acknowledges the increasing use of Information and Communication
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationCYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL
CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important
More informationNational Secondary School Computer Fund Meridan State College Q4 Take Home Tablet Charter. Student NSSCF Charter
National Secondary School Computer Fund Meridan State College Q4 Take Home Tablet Charter Student NSSCF Charter Contents Student NSSCF Charter... 3 NSSCF overview... 3 Device care... 4 Data security and
More informationJGSC Laptop Agreement
JGSC Laptop Agreement The mission of the 1:1 program at JGSC is to create an innovative, collaborative learning environment for students and teachers. Together, they will implement creative uses of educational
More informationNOTRE DAME PREPARATORY AND MARIST ACADEMY
NOTRE DAME PREPARATORY AND MARIST ACADEMY Parent/Student Microsoft Surface Terms and Agreement Contract Notre Dame Preparatory School and Marist Academy is committed to preparing its students for a 21
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationBRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective
More informationConditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
More informationCARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
More informationStudent Laptop Computer Program Policy, Procedures and Guidelines
St James College TableofContents 1.0 Vision 2.0 Curriculum 2.1 Introductionfunding 2.2 Rationale 2.3 Stakeholders 2.4 CurriculumPlan 2.5 Areasofgeneralusage 2.6 Schoolareaswherelaptopsaretobeused 2.7 Howtheprogramistobeimplemented
More informationILLINOIS LUTHERAN S CHROMEBOOK AGREEMENT
ILLINOIS LUTHERAN S CHROMEBOOK AGREEMENT Students across the junior high/high school will be issued Google Chromebooks for use in school and at home. This document provides students and their parents/guardians
More informationSTFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
More informationIowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and
More informationONE-2-ONE LEARNING LAPTOP PROGRAM 2011
GLENUNGA INTERNATIONAL HIGH SCHOOL ONE-2-ONE LEARNING LAPTOP PROGRAM 2011 Department of Education and Children s Services T/A South Australian Government Schools CRICOS Provider No. 00018A 1. VISION and
More informationLaptops for Students Program
Laptops for Students Program Technology Use Agreement Handbook Expanding Learning to the 21st Century and Beyond PAGE 1 OF 13 Table of Contents Laptop Policy & Procedures Handbook 3 Objectives 3 Laptop
More informationINFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
More informationTri-city College Prep High School Tablet Program Handbook
Tri-city College Prep High School Tablet Program Handbook The focus of the Tablet Initiative at Tri-city College Prep High School is to prepare students for their future, a world of digital technology
More informationThe Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
More informationElectronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)
Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to
More informationAP 417 Information and Communication Services
AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for
More informationAcceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
More informationAcceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
More informationEMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
More informationUSE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
More informationTerms and Conditions
Terms and Conditions Version 1.4 September, 2012 A Kensington Terrace Toowong Queensland 4066 T (07) 3309 3500 E mail@bbc.qld.edu.au F (07) 3371 2679 W http://www.bbc.qld.edu.au Table of Contents 1. Introduction...
More informationComputer Facilities and External Networks Acceptable Use by Students
Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic
More informationFrequently Asked Questions for parents
Frequently Asked Questions for parents I had intended to purchase a laptop for my child. Should I proceed? All students in Years 10 to 12 at Kenmore State High School will have access to a high quality,
More informationOCS Student / Parent Laptop Agreement
OCS Student / Parent Laptop Agreement Terms and Conditions of Use By signing this form, the student and the student s parent/guardian certify that they have thoroughly read, understand, and accept the
More informationStudent Tablet Guide
Student Tablet Guide Contents 1. School Day 2. A list of Do s 3. A list of Do Not s 4. Support Model 5. FAQ 6. File management 7. Backing up 8. Online citizenship 9. Parents 10. Tablet Keys and Ports Front
More informationMarion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
More informationHow To Make A Contract Between A Client And A Hoster
Web Hosting Terms & Conditions Please read these web-hosting terms carefully, as they set out our and your rights and obligations in relation to our web hosting services. AGREEMENT: Whereas: (1) The Ruby
More informationTameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
More informationCOMMUNICATION AND NETWORK POLICY
COMMUNICATION AND NETWORK POLICY Always within REACH MOUNT BAKER SOUTH PRIMARY SCHOOL IPAD LOAN AGREEMENT Purpose To facilitate participation in all aspects of Mount Barker South Primary School curriculum.
More informationCARE COURTESY COOPERATION CHALLENGE COMMITMENT
2016 Laptops at Chancellor State College Information and Procedures Handbook Including: Chancellor Laptop Program Bring Your Own Device National Secondary Schools Computer Fund (Phased out by end of 2016)
More informationOne-to-One Technology Initiative Table of Contents
One-to-One Technology Initiative Table of Contents 1. Acceptable Use... 2-4 General Staff Responsibilities Parent and Guardian Responsibilities User Responsibilities Consequences 2. ipad Identification
More informationLaptop Provision Loreto College, Ballarat
Laptop Provision Loreto College, Ballarat Overview Loreto College is committed to providing all students with relevant, rigorous and engaging learning opportunities and understands that students learn
More informationMelville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students
Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3
More informationComputers and Internet Policy and Procedure
Computers and Internet Policy and Procedure Computers and Internet Policy and Procedure Modification history Date Modification Person responsible 18/01/12 Modification of existing policy Roger Stevens
More information2015-2016 ISD 518 FUTURE READY. Tablet Procedures and Information
21ST CENTURY SKILLS LEARNING ANYTIME, ANYWHERE OPTIONAL INSURANCE FUTURE READY Tablet Procedures and Information Worthington ISD 518 wants to ensure students develop the skills and knowledge necessary
More informationRegulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears.
Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES 1. Definitions In this regulation unless a contrary intention appears Authority means (i) in relation to the central facilities and computing and
More informationREMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
More informationWebsite Hosting Agreement
Website Hosting Agreement This Agreement is Between: (1) Tutch Media Limited, a company registered in England whose office is at 121c London Road, Knebworth, Herts, SG3 6EX ( the Host ) and (2) The Client
More informationGARDENVALE PRIMARY SCHOOL BYOD
GARDENVALE PRIMARY SCHOOL BYOD (Bring Your Own Device) POLICY This policy operates in conjunction with the Victorian Department of Education and Early Childhood development and Gardenvale Primary School
More informationTECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
More informationHow To Use A Tablet/Laptop At A School District Computer At Home
Tablet - Laptop Policy, Procedures, and Information 2013-2014 School Year Chester Area HS/MS Chester, South Dakota Chester Area HS/MS Tablet/laptop Program The focus of the 1:1 Classroom Connections Program
More informationAcceptable Use Guidelines
Attachment to the Computer and Information Security and Information Management Policies Acceptable Use Guidelines NZQA Quality Management System Supporting Document Purpose These Acceptable Use Guidelines
More informationBYOD Policy 2016 Bring Your Own Device Acceptable Use Policy
BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy Approved by Leadership Team 27 th April 2016 Approved by the Governing Body: 18 th May 2016 Review Due: May 2017 Rationale The Beaconsfield
More informationMeridian Public Schools Laptop Policy
Meridian Public Schools Laptop Policy The focus of the learning with laptops program at Meridian Public School is to prepare students for their future, a world of digital technology and information. As
More informationBring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Purpose is committed to supporting student learning experiences within a highly functioning environment. Our classrooms are reliant on a range of leading-edge technologies
More informationHEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY
HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY This policy applies whenever you are using Heathfield High School information technology equipment or services. It should be read in
More informationDevice: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.
Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring
More informationBright Local Schools BYOD Acceptable Use Policy
Bright Local Schools BYOD Acceptable Use Policy Why Bring Your Own Device at Bright Local Schools? Bright Local is dedicated to providing 21st Century instruction to all its students. We feel we must provide
More informationData Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
More informationBRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 5 08/25/2015 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective
More informationNational Secondary School Computer Fund Meridan State College Q3 Take Home Laptop Charter. Student NSSCF Charter
National Secondary School Computer Fund Meridan State College Q3 Take Home Laptop Charter Student NSSCF Charter Contents STUDENT NSSCF CHARTER... 3 NSSCF OVERVIEW... 3 DEVICE CARE... 4 DATA SECURITY AND
More informationAlbany Senior High School
Albany Senior High School Bring your own device (BYOD) Usage Policy for Students and Parents BYOD Usage Policy S:\AdminShared\Teaching Staff\ICT\BYOD\BYOD Policy for Parents.doc Table of Contents 1 Introduction
More informationBring Your Own x. INFORMATION AND PROCEDURES HANDBOOK Version 2014-12-10
Bring Your Own x INFORMATION AND PROCEDURES HANDBOOK Version 2014-12-10 Contents BYOx Transition Plan... 3 Forward... 3 Introduction... 3 BYOx Vision... 4 Software and Applications... 4 Microsoft Office...
More informationAshland High School Tablet Policy, Procedures, and Information 2012-13
Ashland High School Tablet Policy, Procedures, and Information 2012-13 The focus of the tablet program at AHS is to provide tools and resources to the 21st Century Learner. Excellence in education requires
More informationThe Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
More informationTEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015
TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015 Tekamah-Herman Community Schools is proud to offer our High School Students Apple MacBook Air computers for use at school
More information