1 Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the Internet and 4. Sanctions 5. Disclaimer 1. Aims of the Acceptable Use Policy (AUP) The following is schools policy governing the acceptable use of computers including Internet and . It is a dynamic document in that it will respond to the ever-changing ICT Environment at the school, as we attempt to stay up to date with ICT advancements. It will therefore be added to and amended as applicable. A main thrust of the document is to highlight the personal responsibility of the computer user at school whether it is for drafting coursework on a Word Processor or using the Internet. The objectives of the AUP are to; Allow staff and students the chance to access computer equipment, the Internet and , as and when they wish, for educational purposes. Set guidelines for acceptable use of equipment, hardware and software, so staff and students are aware of what is acceptable and not acceptable. Protect students and staff from undesirable information, particularly on the World Wide Web (WWW). Provide rules which are consistent, and in agreement with the Data Protection Act and Local LEA. 2. General Computer Use The following are guidelines that set out the acceptable use of equipment and use of computers generally around the school. Again this is to provide an environment where computers are accessible to staff and students alike, when needed. Demand for access is always likely to be greater than the resources available with regard to computers, a priority system is in place that will ensure that those with the greatest need have access. These are set out below and displayed around the school where there are computers:- First priority ICT Lessons taking place or lessons that have been booked in advance Second priority Students using the computers with their planners signed Third Priority Private study or schoolwork
2 Fourth Priority Other use - within the general rules of computers as displayed around the school Passwords Passwords are the responsibility of the user and in no circumstances should they be disclosed in any way. Auditing software on the network tracks usage of computers by username: therefore if a username and password has been used it will be assumed to have been used by the owner, and therefore any consequences will devolve upon that owner. Passwords should be changed regularly and contain a combination of letters and numbers as these are harder to 'crack'. If you suspect somebody knows your password then contact a member of staff. User areas User areas are the responsibility of the user. File space is given to users based on the requirements of the work they are doing. It is hoped that students will keep their user area tidy and get rid of any unwanted or out of date files. The students may purchase a USB to copy some of their work onto if their user area contains large graphics files for example. Some files are unacceptable to be used or saved in the user area An example of an illegal file would be a game or program (.exe file) downloaded from the Internet. Computer damage Any incident of damage to computers needs to be reported to a member of staff immediately. USB Disks Virus protection will be installed and updated regularly on computers. Use of floppy disks will be reviewed. Personal floppy disks that are brought into school are automatically virus checked on every PC. If help is needed, then contact a member of staff. 3. Use of Internet and The school uses a filtered, broadband Internet service provider for and Internet access. These are seen as an integral part of a large majority of schemes of work to enrich and extend learning activities. Students will be allowed to use the Internet to search for information and resources to meet their learning objectives in school. Students will need to be aware that there is no regulatory authority body for the Internet. Anyone, anywhere can publish material. It is not censored for opinion, bias or validity of information. Students will be taught methods to validate information from the Internet by cross-referencing. Instruction on carrying out structured searches of the Internet. Including lists of acknowledged sources of information that they have used for research purposes. Telling a member of staff immediately if they find material that makes them feel uncomfortable. Students will be taught how to use to communicate with people they know and those they do not. Following forms a code of conduct we require computer users at the school to follow:- 1. you must obtain the permission of your parent(s)/career(s) before you can be allowed to use the Internet 2. the work/activity on the Internet must be directly related to your school work.
3 3. private use of the Internet in school is forbidden. 4. do not disclose to anyone, any password or login name you have been given. 5. do not give out personal addresses, telephone numbers (Mobile or landline) or fax numbers of any person at the school. 6. the use of names or photographs of students on the school website will require written permission from parent(s)/career(s). 7. no unauthorised games are to be played on the network 8. do not download, use or upload any material that is under copyright. Always seek permission from the owner before using any material from the Internet. If in doubt, or you cannot obtain permission, do not use the material. 9. in no circumstances should you view, upload or download any material which is likely to be unsuitable for children or schools. This applies to any material of a violent, dangerous, racist or inappropriate sexual content. If you are not sure about this, or any other materials, you must ask your teacher. 10. be polite and appreciate that other users might have views different from your own. The use of strong language, swearing or aggressive approaches is forbidden. Do not state anything that could be interpreted as libel. 11. use of 'chat rooms' (unless used for a specific lesson under supervision from a teacher) is forbidden. 12. use of web based , such as Hotmail or Excite Mail, is forbidden. 13. The school will always endeavour to supervise students at all times. This may include supervision by teachers or support staff. Computers will be placed in public places where screens are visible, and all users must agree to random checking on computer records of sites visited or files kept on user areas. 14. on discovering unsuitable material the WWW. Address (URL) and the content must be reported without delay to a member of staff. This site will then be filtered so it is inaccessible. 15. Internet use at school will be monitored regularly. 16. the school will work closely with parents, the LA, DCSF and the Internet service provider to ensure systems to protect students are reviewed and continuously improved. 17. senior students and staff will have open, but monitored Internet access for research purposes and continued professional development. 18. the use of attachments to is forbidden for personal use and permission must be sought by students for attachments to be sent or received for schoolwork. 19. when applicable, police and/or local authorities may be involved. Early contact will be made to establish the legal position and discuss necessary strategies.
4 4. Consequences Failure to comply with these rules will result in one or more of the following: 1. On the first (or with former miscreants, the next) breach of the code, a letter is sent home with a reminder of this policy, and the user loses use of internet and and use of computers around the school out of lessons for a period of least 1 school month. 2. On the second breach, students are detained at breaks and lunchtimes for a week and an afterschool detention is given through a specific letter to parents. Computer use is withdrawn for 2 months. 3. On a third breach, again students are detained at breaks and lunchtimes, and an after-school detention is given. The break and lunchtime detentions continue until the parents come in to school to discuss the issue with senior staff, and where necessary, governors. Computer use is withdrawn until parents discuss the matter with the appropriate Director of Studies. There are some circumstances in which the procedure will automatically start at stage 3. Once again it is seen as the student's responsibility to use computers, the Internet and appropriately and legally. It is hoped that with parents, students can discuss the possibilities and opportunities of its proper use and the advantages that it could bring their schoolwork. Disclaimer The school will supervise students and take all reasonable precautions to ensure that users access only appropriate material. In line with local LA s policy, the school will provide a filtered Internet service. No system can be completely effective and a combination of approaches will in addition be required to supervise adequately. All staff, governors, parents and advisers will work to establish agreement that every reasonable measure has been taken. As a result of the process involved in publishing information on the Internet, it is not possible to guarantee that unsuitable material will never appear on a computer screen. Neither the school nor the local LA can accept liability for the materials accessed, or any consequences thereof. If you do not understand any part of this Acceptable Use Policy, please contact schools ICT staff or any senior member of staff.
5 APPENDIX A STAFF USE OF COMPUTERS AND SCHOOL NETWORK Staff: Read the policy below. You must then work within this policy and must support it at all times. THE ICT USE POLICY All Internet activity should be appropriate to staff professional activity or the student's education. Access should only be made via the authorised account and password, which should not be made available to any other person. Activity that threatens the integrity of the School ICT systems, or activity that attacks or corrupts other systems, is forbidden. Users are responsible for all sent/received and retained, and for contacts made that may result in being received. Staff should not use Social Networking Sites to contact students at any time. Use for personal financial gain, gambling, political purposes or advertising is forbidden. Copyright of materials must be respected at all times. Posting anonymous messages and forwarding chain letters is strictly forbidden. As can be forwarded or inadvertently sent to the wrong person, the same professional levels of language and content should be applied as for letters or other media. Use of the network to access inappropriate materials such as pornographic, racist or offensive material is forbidden. Having material of a pornographic [sexual or violent], racist or which is seen as offensive by Trinity High School, in a Trinity High School folder or sending or receiving such material may lead /severe disciplinary action. All users will at all times respect the privacy of other users work/account areas. Trinity High School will ensure that all possible steps are taken to protect users from accessing offensive sites. Trinity High School will ensure that the security of users personal data, where held, will be secure and Trinity High School will operate within the Data Protection Act
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education
Poplar Street Primary School ICT Security and Acceptable Use Policy E-Safety policy 2013/14 Working Together Aiming High! 1 Contents 1. Introduction... 3 2. Policy Objectives... 3 3. Application... 3 4.
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
Policy Document Information and Communication Technology and E-Safety Acceptable Use Policy Mission Statement The school is committed to the use of ICT across the curriculum and to providing all students
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
Information and ICT Security Policy Care Excellence Partnership Updated May 2011 Due for review July 2012 Senior Information Risk Owner (SIRO) P. Tilson I:drive/Policies/Information and ICT Security Status
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
Information Security Policy The purpose of this Policy is to describe the procedures and processes in place to ensure the secure and safe use of the federation s network and its resources and to protect
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
Data protection and security a summary for schools Recent legislation on data protection and freedom of information has given greater rights to the individual and alongside them, greater responsibilities
Witton Middle School e-safety Policy This e-safety Policy has been put together using guidance from the Worcestershire Local Authority (LA) and is based on the guidance provided by Becta. Our Vision Witton
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
Data Security Policy Member of Staff Responsible ICT Team Author: Sunil Pindoria Dated 03/02/2015 Date of next review 03/02/2016 Page 1 CONTENTS INTRODUCTION... 3 MONITORING... 4 BREACHES... 5 DATA SECURITY...
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
Information Systems Acceptable Use Policy (covers ILT/ICT/IS*) You are expected to read, understand & sign this policy as a condition of your use of Wiltshire College systems. This policy is in place to
Guideline Cyber-safety: Keeping Children Safe in a Connected World This document is currently under review. Please direct any queries regarding this document to the policy officer listed in Table 1. Insert