Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
|
|
|
- Austin Matthews
- 10 years ago
- Views:
Transcription
1 Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the Internet and 4. Sanctions 5. Disclaimer 1. Aims of the Acceptable Use Policy (AUP) The following is schools policy governing the acceptable use of computers including Internet and . It is a dynamic document in that it will respond to the ever-changing ICT Environment at the school, as we attempt to stay up to date with ICT advancements. It will therefore be added to and amended as applicable. A main thrust of the document is to highlight the personal responsibility of the computer user at school whether it is for drafting coursework on a Word Processor or using the Internet. The objectives of the AUP are to; Allow staff and students the chance to access computer equipment, the Internet and , as and when they wish, for educational purposes. Set guidelines for acceptable use of equipment, hardware and software, so staff and students are aware of what is acceptable and not acceptable. Protect students and staff from undesirable information, particularly on the World Wide Web (WWW). Provide rules which are consistent, and in agreement with the Data Protection Act and Local LEA. 2. General Computer Use The following are guidelines that set out the acceptable use of equipment and use of computers generally around the school. Again this is to provide an environment where computers are accessible to staff and students alike, when needed. Demand for access is always likely to be greater than the resources available with regard to computers, a priority system is in place that will ensure that those with the greatest need have access. These are set out below and displayed around the school where there are computers:- First priority ICT Lessons taking place or lessons that have been booked in advance Second priority Students using the computers with their planners signed Third Priority Private study or schoolwork
2 Fourth Priority Other use - within the general rules of computers as displayed around the school Passwords Passwords are the responsibility of the user and in no circumstances should they be disclosed in any way. Auditing software on the network tracks usage of computers by username: therefore if a username and password has been used it will be assumed to have been used by the owner, and therefore any consequences will devolve upon that owner. Passwords should be changed regularly and contain a combination of letters and numbers as these are harder to 'crack'. If you suspect somebody knows your password then contact a member of staff. User areas User areas are the responsibility of the user. File space is given to users based on the requirements of the work they are doing. It is hoped that students will keep their user area tidy and get rid of any unwanted or out of date files. The students may purchase a USB to copy some of their work onto if their user area contains large graphics files for example. Some files are unacceptable to be used or saved in the user area An example of an illegal file would be a game or program (.exe file) downloaded from the Internet. Computer damage Any incident of damage to computers needs to be reported to a member of staff immediately. USB Disks Virus protection will be installed and updated regularly on computers. Use of floppy disks will be reviewed. Personal floppy disks that are brought into school are automatically virus checked on every PC. If help is needed, then contact a member of staff. 3. Use of Internet and The school uses a filtered, broadband Internet service provider for and Internet access. These are seen as an integral part of a large majority of schemes of work to enrich and extend learning activities. Students will be allowed to use the Internet to search for information and resources to meet their learning objectives in school. Students will need to be aware that there is no regulatory authority body for the Internet. Anyone, anywhere can publish material. It is not censored for opinion, bias or validity of information. Students will be taught methods to validate information from the Internet by cross-referencing. Instruction on carrying out structured searches of the Internet. Including lists of acknowledged sources of information that they have used for research purposes. Telling a member of staff immediately if they find material that makes them feel uncomfortable. Students will be taught how to use to communicate with people they know and those they do not. Following forms a code of conduct we require computer users at the school to follow:- 1. you must obtain the permission of your parent(s)/career(s) before you can be allowed to use the Internet 2. the work/activity on the Internet must be directly related to your school work.
3 3. private use of the Internet in school is forbidden. 4. do not disclose to anyone, any password or login name you have been given. 5. do not give out personal addresses, telephone numbers (Mobile or landline) or fax numbers of any person at the school. 6. the use of names or photographs of students on the school website will require written permission from parent(s)/career(s). 7. no unauthorised games are to be played on the network 8. do not download, use or upload any material that is under copyright. Always seek permission from the owner before using any material from the Internet. If in doubt, or you cannot obtain permission, do not use the material. 9. in no circumstances should you view, upload or download any material which is likely to be unsuitable for children or schools. This applies to any material of a violent, dangerous, racist or inappropriate sexual content. If you are not sure about this, or any other materials, you must ask your teacher. 10. be polite and appreciate that other users might have views different from your own. The use of strong language, swearing or aggressive approaches is forbidden. Do not state anything that could be interpreted as libel. 11. use of 'chat rooms' (unless used for a specific lesson under supervision from a teacher) is forbidden. 12. use of web based , such as Hotmail or Excite Mail, is forbidden. 13. The school will always endeavour to supervise students at all times. This may include supervision by teachers or support staff. Computers will be placed in public places where screens are visible, and all users must agree to random checking on computer records of sites visited or files kept on user areas. 14. on discovering unsuitable material the WWW. Address (URL) and the content must be reported without delay to a member of staff. This site will then be filtered so it is inaccessible. 15. Internet use at school will be monitored regularly. 16. the school will work closely with parents, the LA, DCSF and the Internet service provider to ensure systems to protect students are reviewed and continuously improved. 17. senior students and staff will have open, but monitored Internet access for research purposes and continued professional development. 18. the use of attachments to is forbidden for personal use and permission must be sought by students for attachments to be sent or received for schoolwork. 19. when applicable, police and/or local authorities may be involved. Early contact will be made to establish the legal position and discuss necessary strategies.
4 4. Consequences Failure to comply with these rules will result in one or more of the following: 1. On the first (or with former miscreants, the next) breach of the code, a letter is sent home with a reminder of this policy, and the user loses use of internet and and use of computers around the school out of lessons for a period of least 1 school month. 2. On the second breach, students are detained at breaks and lunchtimes for a week and an afterschool detention is given through a specific letter to parents. Computer use is withdrawn for 2 months. 3. On a third breach, again students are detained at breaks and lunchtimes, and an after-school detention is given. The break and lunchtime detentions continue until the parents come in to school to discuss the issue with senior staff, and where necessary, governors. Computer use is withdrawn until parents discuss the matter with the appropriate Director of Studies. There are some circumstances in which the procedure will automatically start at stage 3. Once again it is seen as the student's responsibility to use computers, the Internet and appropriately and legally. It is hoped that with parents, students can discuss the possibilities and opportunities of its proper use and the advantages that it could bring their schoolwork. Disclaimer The school will supervise students and take all reasonable precautions to ensure that users access only appropriate material. In line with local LA s policy, the school will provide a filtered Internet service. No system can be completely effective and a combination of approaches will in addition be required to supervise adequately. All staff, governors, parents and advisers will work to establish agreement that every reasonable measure has been taken. As a result of the process involved in publishing information on the Internet, it is not possible to guarantee that unsuitable material will never appear on a computer screen. Neither the school nor the local LA can accept liability for the materials accessed, or any consequences thereof. If you do not understand any part of this Acceptable Use Policy, please contact schools ICT staff or any senior member of staff.
5 APPENDIX A STAFF USE OF COMPUTERS AND SCHOOL NETWORK Staff: Read the policy below. You must then work within this policy and must support it at all times. THE ICT USE POLICY All Internet activity should be appropriate to staff professional activity or the student's education. Access should only be made via the authorised account and password, which should not be made available to any other person. Activity that threatens the integrity of the School ICT systems, or activity that attacks or corrupts other systems, is forbidden. Users are responsible for all sent/received and retained, and for contacts made that may result in being received. Staff should not use Social Networking Sites to contact students at any time. Use for personal financial gain, gambling, political purposes or advertising is forbidden. Copyright of materials must be respected at all times. Posting anonymous messages and forwarding chain letters is strictly forbidden. As can be forwarded or inadvertently sent to the wrong person, the same professional levels of language and content should be applied as for letters or other media. Use of the network to access inappropriate materials such as pornographic, racist or offensive material is forbidden. Having material of a pornographic [sexual or violent], racist or which is seen as offensive by Trinity High School, in a Trinity High School folder or sending or receiving such material may lead /severe disciplinary action. All users will at all times respect the privacy of other users work/account areas. Trinity High School will ensure that all possible steps are taken to protect users from accessing offensive sites. Trinity High School will ensure that the security of users personal data, where held, will be secure and Trinity High School will operate within the Data Protection Act
ICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
Berwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
John of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
St Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
EMERSON PARK ACADEMY
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
How To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
Wilsthorpe Community School
Wilsthorpe Community School Online Safety Policy REVIEWED March 2016 Introduction This Online Safety Policy has been written by the school, building on LA policy and government guidance. It has been agreed
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
St Vincent s Catholic Primary School e-safety Policy
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
Simon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
E- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
Acceptable Use Policy - Staff
Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
Acceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
Sydney Technical High School
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
Related Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities
Category Security Document Name e-safety Procedures Accountable Body Brantridge School Governing Body Reference SY.P2.02 Date Ratified Version 2.1 Last Update March 2015 Related Policies & Documents Document
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Digital Device LOAN CHARTER
Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to
Students KS2-3 Acceptable Use Policy
Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
Archbishop Beck Catholic Sports College
Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety
Sibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
Strathfield Girls High School Bring your Own Device User Charter
Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.
CARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
1. Introduction. 2. Roles & Responsibilities. Governing Body. Headteacher
Category Security Document Name E-safety Procedures Accountable Body Grafham Grange School Governing Body Reference SY.P2.01 Date Ratified 27 th August 2015 Version 1.0 Last Update August 2015 Related
Bring Your Own Device Program: 2015 User Agreement
Bring Your Own Device Program: 2015 User Agreement Asquith Girls High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. Asquith Girls High
Witton Middle School
Witton Middle School e-safety Policy This e-safety Policy has been put together using guidance from the Worcestershire Local Authority (LA) and is based on the guidance provided by Becta. Our Vision Witton
Student Laptop User Charter
Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Dulwich College ICT Acceptable Use Policy
Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
4. The Importance of Internet Use in the Primary Curriculum
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
DIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
Acceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
WORKPLACE INTERNET, EMAIL AND NETWORK USAGE POLICY
WORKPLACE INTERNET, EMAIL AND NETWORK USAGE POLICY MAY 2013 DOCUMENT SUMMARY Document Number Responsible Officer P0 DO0008.2 Assistant Directors Effective Date May 2013 Superseded Docs Workplace Internet,
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
Internet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
Virginia Primary School Learning Together, Learning for our Future
Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of
How To Understand The Bring Your Own Device To School Policy At A School
The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS
Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
Policies & Procedures. Moat Community College E-Safety Policy
Moat Community College E-Safety Policy Vision Statement Moat Community College embraces the positive impact and educational benefits that can be achieved through appropriate use of the Internet and associated
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
STUDENT WEBMAIL. User Guide. Realise Your Potential
STUDENT WEBMAIL User Guide Realise Your Potential Email acceptable usage policy & safety tips Email is a wonderful tool for sending and receiving information quickly and securely to tutors, teachers or
SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY DATE: MARCH 2015 REVISION DATE: MARCH 2017
SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY 1 DATE: MARCH 2015 REVISION DATE: MARCH 2017 Background / rationale New technologies have become integral to the lives of children
