1 INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), AND THE INTERNET ACCEPTABLE USE POLICY As part of the College IT programme we offer pupils filtered access to the Internet. Before being allowed to use the internet, all pupils must obtain parental permission and both you and your child must have signed and returned a form as evidence of both your approval and acceptance of the College rules on this matter. Access to the internet can enable pupils to explore thousands of libraries, databases, and bulletin boards while exchanging messages with other internet users throughout the world. The College will take reasonable steps to monitor access but families should be warned that some material accessible via the internet may contain items that are illegal, defamatory, inaccurate or potentially offensive to some people. While our aim for internet use is to further educational goals and objectives, pupils may find ways to access other materials as well. We believe that the benefits to pupils from access to the internet, in the form of information resources and opportunities for collaboration, exceed any disadvantage. Ultimately however, parents and guardians of minors are responsible for setting and conveying the standards that their children should follow when using media and information sources. To that end, the College supports and respects each family s right to decide whether or not to apply for access. During school, teachers will suggest appropriate materials. The College reserves the right to monitor pupils access. Outside College, families bear the same responsibility for such guidance as pupils use information sources such as television, telephones, movies, radio and other potentially offensive media. The College s Anti-Bullying Policy includes a section on Cyberbullying. GENERAL USE OF THE ICT FACILITIES While the College makes every attempt to ensure a reliable service it cannot be liable for any loss of a pupil s work, howsoever caused. It is the pupil s responsibility to ensure adequate backups of their work by saving it in their allocated filespace on the network server or CD/memory stick. The College cannot accept responsibility for work completed on pupil s own computers. The College provides a range of ICT facilities to be used for teaching purposes for pupils own work or research in relation to their studies. Pupils are not allowed to: Tamper with, or change, network, operating system, machine or software settings
2 Tamper with any item of hardware Install software Run any software other than that provided specifically for them, for College use, as published periodically by the ICT Department and Library Attempting to log in as another user, abusing the or internet facility or attempting to hack into or to gain access to files or systems to which specific access has not been given, will be regarded as very serious breaches of College discipline. No food or drink should be brought into nor consumed in any computer area. Misuse of ICT hardware or software may result in a lengthy ban from the network as well as additional sanctions. Pupils must only send under their own allocated name and address. Encryption of messages is not permitted. Users should note that is subject to random scrutiny by staff. The College will not permit the sending or receiving of messages greater than a certain length (currently 10Mb). File attachments may only be sent if they relate directly to a pupil s work. PUPILS OWN COMPUTERS Though the College provides computing facilities in Houses, some pupils may wish, where there is space to accommodate them, to bring their own personal computers or laptops into the College for use during term time. These remain the responsibility of the pupil and should be kept secure at all times. The College recommends the use of Kensington Locks or similar devices for this purpose. Such equipment should, in addition, be security marked in a clear manner. Pupils should not lend their laptop computers to other pupils. They are responsible for making backups of any school work stored on their own laptop computer. Please note that every year some pupils lose important school work, sometimes with serious consequences for their examination results, as a result of failing to back up their work. While the College IT staff will make every effort to help pupils having problems with their own computer, they cannot offer a repair or maintenance service to pupils. CONNECTION OF LAPTOPS OR DEVICES TO THE SCHOOL NETWORK There are many advantages for pupils in connecting their laptops or devices to the College network: Access to their network file space A location for backing up work Access to a printer Access to the internet
3 However, the College has a responsibility to provide an IT service which is reliable and virus free. Laptops may be connected to our network subject to a number of conditions in addition to those already mentioned: The operating system should be kept up to date while at home with all the latest security patches. It must have an up-to-date virus checker. Pupils should not use the College network connection to download programs, videos or movies, music or MP3 files, Windows updates or any other files likely to use up excessive bandwidth and degrade our service to those using it for educational purposes. Pupils should not run any peer to peer file sharing software, such as Kazaa. Pupils should not do anything that may result in the introduction of viruses into the College system. While the College takes every precaution to keep its network virus free, it cannot accept responsibility for any virus infection of a pupil s laptop. Pupils will have to apply to the IT department and be in possession of a wireless network card compatible with the g (preferable) or the b wireless standards. These are available in most computer stores and many new laptops have wireless capability built in. Most laptops can be successfully connected, but where possible Windows XP Professional should be installed, though it is not essential. The IT department will note the details of the laptop, check security marking and possession of a computer lock prior to configuring our system to accept the connection. Pupils will be issued with any software needed and instructions to configure any settings on their own machine. CONCLUSION The Director of IT, Mr C J Davies, will be available to answer any further questions that you may have at this stage. Please call him on , or alternatively him at
4 Epsom College ICT Network Access Policy Date November 2012 Access to the School s ICT Network and the Internet is provided for the purposes of educational research and learning. The purpose of this policy is to provide rules for the appropriate use of the Network and the Internet. Pupils and parents should carefully read and then sign the following agreement. If a signed agreement has not been returned to the school then the student will not be allowed access to the Internet. Student Agreement I understand that use of the Network and access to the Internet from Epsom College must be in support of educational research or learning, and I agree to the following: I will keep my password secure and will only use a network computer whilst logged on with my correct username and password. I will refrain from accessing any newsgroups, links, list-servers, Web Pages or other areas of cyberspace that would be considered as offensive by the School or my parents/guardians, because of pornographic, racist, violent, illegal, illicit or other content. I shall not attempt to tamper with hardware or software settings on school machines, move a machine form its designated location or connect any other machines to the school network I am responsible for rejecting these links if any appear inadvertently during my research. I will not use valuable Internet time playing non-educational games or using Chat programmes. I will not download materials that may be copyrighted. I will not violate copyright laws. I will be courteous and use appropriate language in any I may send to other users and understand that the laws of libel and copyright may apply to . Plagiarism is unacceptable. I will use downloaded materials in an appropriate manner in assignments, listing them in a bibliography and clearly specif~uing directly quoted material. I will not reveal any personal information of any type about others or myself. I will not damage any computer systems. I must have a clear project in mind when I ask for access to the Internet. If I violate any of these terms I will be denied access to the Internet for a period of time determined by the School and punished accordingly. My actions may also be responsible for the denial of Internet access to innocent parties. I realise that my access may be monitored directly or indirectly by college staff. I shall use the College Internet service only for or educational purposes. I shall not use it to purchase goods, send mobile phone text messages or to download programs. Student Signature:...
5 Date:... Current Year Group:... Parental Agreement As the parent/guardian of... I hereby acknowledge that I have read the agreement on student use of the Internet and discussed it with him/her. I understand that this access is designed for educational purposes. I recognise that, while every effort will be made to monitor student use of the Internet, it is impossible to continually monitor all controversial materials. I acknowledge that while questionable material exists on the Internet, a user who actively seeks it is ultimately responsible for bringing such material into school. I therefore do not hold the School responsible for any such materials acquired on the Internet. Parent / Guardian signature:... Dale:...
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
TABLET POLICY MANUAL Information and Procedures For Students Revised: Tuesday, August 18, 2015 Page 1 MT. VERNON TOWNSHIP HIGH SCHOOL TABLET PROGRAM We believe that the use of the KUNO 4 tablets and access
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Poplar Street Primary School ICT Security and Acceptable Use Policy E-Safety policy 2013/14 Working Together Aiming High! 1 Contents 1. Introduction... 3 2. Policy Objectives... 3 3. Application... 3 4.
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
NORTHWEST OHIO COMPUTER ASSOCIATION PROGRAM OF THE NORTHERN BUCKEYE EDUCATION COUNCIL NETWORK MANAGEMENT SECURITY POLICY The Board of Directors and staff of the Northwest Ohio Computer Association Program
Jefferson County School District Information Technology Policies and Procedures 575 S. Water Street Monticello, FL 32344 (850) 342-0100 www.jeffersonschooldistrict.org June 2014 Table of Contents 1.0 Overview...
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Tablet - Laptop Policy, Procedures, and Information 2013-2014 School Year Chester Area HS/MS Chester, South Dakota Chester Area HS/MS Tablet/laptop Program The focus of the 1:1 Classroom Connections Program
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Information Technology Policies and Procedures Wakulla County School District March 2014 Table of contents TABLE OF CONTENTS... 1 1.0 OVERVIEW... 2 2.0 PURPOSE... 2 3.0 SCOPE... 2 4.0 ACCEPTABLE USE POLICY...
Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education
Policy Document Information and Communication Technology and E-Safety Acceptable Use Policy Mission Statement The school is committed to the use of ICT across the curriculum and to providing all students
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
Student/Parent Tablet Program Handbook 2013-2014 1 Learning in today s world is not limited to textbooks. Students in Chester County School District will be using dynamic, current content from the web.
ST. MARGARET CLITHEROW ROMAN CATHOLIC PRIMARY SCHOOL www.clitherow.herts.sch.uk firstname.lastname@example.org E-SAFETY POLICY Ownership: Curriculum Committee Document Date: October 2012 Review Date: October
NORTH SHORE SCHOOL DISTRICT COMPUTER NETWORK ACCEPTABLE USE POLICY Please read the following before signing the attached legally binding contract. Introduction Internet access is now available to students,
Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions
Information and ICT Security Policy Care Excellence Partnership Updated May 2011 Due for review July 2012 Senior Information Risk Owner (SIRO) P. Tilson I:drive/Policies/Information and ICT Security Status
Kensington Hall/Middle School for Girls Technology Appropriate Use Policy 2014-2015 School Year PART I: SCHOOL NETWORK AND RESOURCES The Academy of the Sacred Heart Information Network (ASHNet) consists
R ACCEPTABLE USE OF COMPUTER NETWORKS/ COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only.
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable