Guidance on Cyber Bullying
|
|
- Imogene Fleming
- 7 years ago
- Views:
Transcription
1 Guidance on Cyber Bullying Human Resources
2 HR Policies Discipline Grievance Bullying and harassment Equal opportunities Stress management Sickness absence Staff handbook Social media Dignity at work Mediation ICTS Policies Acceptable use policy policy Student Regulations IT handbook Cyber Bullying Resource MMU Newsletters Student Services Policies Student handbook Counselling links Health and Safety Policies
3 What is Cyber Bullying? Cyber bullying is the term used to define bullying behaviour that takes place via mobile phone or over the internet through s, instant messaging and social networking websites. Texts, messages or images are sent or posted on sites, which hurt, intimidate or embarrass another person. Cyber bullying is not carried out face to face and people often don t know the identity of the person targeting them. But cyber bullying is no different from any other form of bullying; the behaviour is the same and the impact is no less devastating. Advances in technology are simply providing alternative means of reaching people where malicious messages were once written on books or toilet walls, they can now be sent via mobile phone or the internet. Some cyber bullying is clearly deliberate and aggressive, but it is important to recognise that some incidents of cyber bullying are known to be unintentional and the result of simply not thinking about the consequences. What may be sent as a joke may not be received as one, and indeed the reach of technology means the sender may not see the impact of the message on the receiver. There is also less opportunity for either party to resolve any misunderstanding or to feel empathy. It is important that everyone is aware of the effects of their actions. With cyber bullying, bystanders can easily become perpetrators by passing on or showing to others images designed to humiliate, for example, or by taking part in online polls or discussion groups. They may not recognise themselves as participating in bullying, but their involvement compounds the misery for the person targeted. Although bullying is not a specific criminal offence in UK law, there are criminal laws that can apply in terms of harassment or threatening behaviour. For example and particularly pertinent for cyber bullying threatening and menacing communications. In fact, some cyber bullying activities could be criminal offences under a range of different laws, including: Protection from Harassment Act 1997 Crime & Disorder Act 1998 Communications Act 2003 Defamation Malicious Communications Act 1988 Public Order Act 1986 Obscene Publications Act 1959 Computer Misuse Act 1990 The Technology Mobile Phones are used for much more than talking and texting, including downloading and forwarding pictures and film clips, checking e mail, accessing the internet and listening to music. The wide range of activities phones are used for, coupled with the phone s role in managing social networks, makes the phone a powerful and important tool. As well as being able to store music, take photos and video and send these to other phones, people can also share this content with other phones via short range wireless connections, such as blue tooth. Mobiles have been used to cyber bully in a number of ways: making offensive calls; sending offensive text messages; taking and sharing humiliating images; videoing and sharing acts of bullying and assault via camera phone (sometimes misleadingly called Happy Slapping ). Content can be posted on line or sent from phone to phone, or shared using a short-range wireless device, bypassing the phone network altogether. Instant Messenger (IM)/Skype/Facetime are applications that allows people to talk in real time (i.e. live) with other people on a pre-selected friend/buddy list. IM programmes usually require you to download the application to your computer, although there are some web based services available which do not need installing. IM programmes let you see which of your contacts are online when you are, and let you chat using text while you are using your computer. Like social networking sites, IM services work between a network
4 of people who have signed up to the same service and given each other permission to see and talk to each other when they are online. Unlike chat rooms which are typically public and open to anyone signed up to the chat service, IM is more private, usually taking place between two people. Windows Live Messenger is a popular IM programme. Voice Over Internet Protocols (VOIP) are becoming increasingly popular since they offer unlimited free phone calls anywhere in the world, using an internet connected computer and microphone. Again, calls only take place between two people who have downloaded the same application. Some instant messenger products can hold up to 600 buddies or contacts. Bullies can use IM to send offensive messages or content to other users. People can also hack into IM accounts and send offensive messages to contacts. Chat Rooms and Message Boards Typically chat rooms are thematically organised around interest, age and location. Chat rooms allow groups of people from across the world to hold text (and sometimes voice) conversations in real time. Public chat rooms can be populated by anyone, since accounts usually only require an address to verify a user s identity. Most chat rooms do not carry age verification; therefore children can visit chat rooms of an adult nature. People can behave inappropriately or abusively. The nature of chat room exchanges tend to be less inhibited than when people meet in the real world for the first time and people can be persuaded to give out too much personal information and contact details. Offensive or threatening messages can be sent, without the target necessarily knowing who they are from. Groups may ostracise and ignore individuals. is now an essential part of most people s working lives. accounts are provided by organisations, broadband providers or other internet companies. can be used to send inappropriate images and to forward private information. Computer viruses and spam are common hazards. Web-based can also be used by people wanting to remain anonymous in order to send malicious or offensive mail. People can send bullying or threatening messages via , or repeatedly send unwanted messages. Unsuitable images can be forwarded inappropriately. Webcams are small digital cameras which work with computers. They can be used to record photographs or video, which can then be posted on the internet or forwarded. Most commonly they are used to see someone that you are talking to online. People can be persuaded or threatened into doing things on a webcam that they might not have otherwise done. Once someone else has the content, they are at risk of being further manipulated or threatened. Social Network Sites such as Twitter, Facebook and Bebo let users create their own homepages, set up blogs and add friends. Social network sites typically allow users to set up a profile page, listing their interest and other details, and they enable contact with other users. Many focus on internet or services. They may also provide blogging or other website creation tools. Many people view the social network site they use as the hub of their online activity and will spend a lot of time on their pages. Profiles and blogs may contain a lot of detailed and personal information about themselves and their friends. This can be misused by bullies to gain information about an individual, their interests and tastes as well as their location or contact details. Many people mistakenly view publicly available sites as private and personal places, and post photographs for their immediate friends which may be inappropriate or embarrassing in other contexts. Sites which are not made private or registered as belonging to an over 18 year old, are easy to search for and may be indexed and cached by search engines such as Google. Social network sites can be abused in a number of ways. Most allow comments to be left (although some sites enable users to review/approve content before it is shown), and offensive comments may be posted. People might use their own sites to spread rumours or make unpleasant comments about other people, or post humiliating images or video of them. Fake profiles are also fairly common, and these might be used to pretend to be someone else in order to bully, harass or get them into trouble.
5 Guidance on Dealing with Bullying and Harassment by Electronic Means Use the Dignity at Work Policy and Procedures Bullying or harassment via electronic means (for example, via , social networking sites, the Web and mobile phones) is covered by the University s Dignity at Work Policy and Procedure ( humanresources). If you are experiencing unfair treatment of this nature, the same procedure should be followed as for other forms of harassment. The Equality Team s web page has further information, including what you can do and where you can get confidential help ( What additional action could you take? It is important that you save any evidence of harassment/bullying that has taken place. For example, you could take screen shots of the offending posts or images and save s. You could also consider the following (where appropriate): Blocking or banning the user from contacting you Ensuring any personal contact details available on the web are made private, or only accessible to people you trust Follow the University guidelines to keep yourself safe on social networking sites, (see page 9 of this guidance). All UK Mobile operators have nuisance call centres set up and/or procedures in place to deal with such instances. You should acquaint yourself with your providers services in this area. What can be done? 1 When University computing facilities have been used? If a student or member of staff is using the University s computer facilities to harass another member of the University (staff or student), a record of this is likely to be found on the IT servers. Confidential server log files record which sites users have visited and when, and also keep records of when s have been sent or received and sometimes their content. This applies whether the website is hosted by the university or is an external website. Complaints can be investigated under the Dignity at Work Policy, the Disciplinary Procedures or Grievance procedures or the Student Complaint procedures. 2 When the harassment/bullying is external to the University? If harassment has taken place using equipment that is not part of the University system for both the sender and the recipient, it is much harder for the University to gather evidence. Internet service providers have complaints procedures which can be followed, but will generally only provide data to the police. However, it is still possible for IT Services to take action to protect you, such as blocking s from external addresses or providing advice on how you could get an offensive posting on a social networking site removed. The University has a duty of care towards students and staff, and will take action, including disciplinary action if necessary, whether the harassment /bullying is taking place using university equipment or not. It is important that if you are being harassed/bullied in any way, that you seek help and support so that the effective action can be taken. The University has a number of Dignity at Work Advisors who you can speak to in confidence about such issues. Their details can be found at
6 Guidelines for Making the Most of Social Networking Sites Facebook, Friends Reunited and LinkedIn are all examples of social networking sites. They re a great way to chat with friends, family and colleagues or meet people with similar interests. The down side is that your personal details could be seen by anyone, so it s important to remember these points of cyber safety: 1 Restrict access to your profile page to people you know and trust; this reduces the risk of identity theft or stalking. 2 It could be easier than you think for prospective employers to see your profile, however well protected it is. Many employers do look at these sites, so make sure you are happy that your content is suitable for your family, employers and casual acquaintances to see. 3 Be as careful as you can when you chat online about your studies, work, personal life or social events as you would when talking to a stranger. Your posts on newsgroups and online communities may be in the public domain in archives where they can be found years later. 4 Only make comments about a named individual that would be acceptable face to face. Laws on bullying, stalking and defamation can apply online and the penalties can be severe. 5 Your photographs can be viewed, searched or copied unless you protect them. If you don t protect them straight away, copies may be held on archives indefinitely. 6 If you display photos of other people, only add their names if they ve given permission they may not want their image to be easy to find. 7 Copyright laws apply online. If you use content that you didn t create yourself, remember to get permission. 8 Take care when discussing details of your whereabouts you may wish to keep private where you are planning to go and when you will not be at home. 9 Use a different password from the one you use at the university or for online banking. 10 If you use a site which asks you to choose an alias, you can maintain your privacy by making sure that it isn t associated with your real name or University address. Useful Links StopText bully a website dedicated to mobile phone bullying, contains advice for young people, including how to contact your operator Chatdanger a website that informs about the potential dangers online (including bullying) and advice about how to stay safe while chatting Digizen Digizen focuses on responsible use of the internet. Digital citizenship is about building safe spaces and communities, and using online presence to grow and shape your world in a safe, creative way Child Exploitation and Online Protection Centre provides information and advice for online safety Respectme offers practical advice and guidance for adults on addressing bullying behaviour
7 Review This guidance has been screened to determine its impact on groups which are protected by law using the University s Equality Impact Assessment process. This guidance will be reviewed in two years, or earlier if legislative requirements change. Last Date of Review: February AT
Staying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationCyberbullying A whole-school community issue
Cyberbullying A whole-school community issue Introduction Today s children and young people have grown up in a world that is very different from that of most adults. Many young people experience the internet
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationTAVISTOCK COLLEGE POLICIES & PROCEDURES
TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationGuidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
More informationHUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
More informationNetworking and Social Media Policy
Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools
More informationSocial Networking Policy
Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies
More informationSocial Networking Policy
Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationEASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
More informationFinchley Catholic High School. Anti Bullying Policy
Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can
More informationRoles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
More informationE-safety: Protecting your child online. Information for parents
E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools
More informationSOCIAL MEDIA POLICY. Introduction
Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes
More informationCybersafety and protocols for conducting online life?
Cybersafety and protocols for conducting online life? Sunderland is an exciting place to live. We lead the way in making use of services online. We are one of the most connected cities in the UK. Whatever
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More informationSibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
More informationSaint Martin s Catholic Academy
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
More informationCYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL
CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important
More informationSocial Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
More informationMobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 1. VISIT THE NUT HEALTH AND SAFETY POST www.teachers.org.uk. Camera Mobile Phones Health and Safety Issues
Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 1 VISIT THE NUT HEALTH AND SAFETY POST www.teachers.org.uk Camera Mobile Phones Health and Safety Issues Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 2 To view
More informationesmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2
Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationBullying and Harassment at Work Policy
Bullying and Harassment at Work Policy i) Statement Everyone should be treated with dignity and respect at work, irrespective of their status or position within the organisation. Bullying and harassment
More informationICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
More informationArchbishop Beck Catholic Sports College
Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety
More informationSimon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationFIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
More informationKing David Primary School Staff Social Networking Policy
King David Primary School Staff Social Networking Policy This policy should be read in conjunction with other relevant policies e.g. school ICT Policy including acceptable or unacceptable usage, Disciplinary
More informationSocial Networking Protocol for Schools Managed Staff
Social Networking Protocol for Schools Managed Staff Created by HR Consultancy June 2010 1 Social Networking Protocol 2010 Contents 1. Purpose 2. Scope 3. School s Expectations 4. Safeguarding 5. Monitoring
More informationDevelopment / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
More informationINFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF
INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF go.qub.ac.uk/socialmedia WHY ARE SOCIAL MEDIA TOOLS IMPORTANT TO QUEEN S UNIVERSITY? The term social media is used to describe a range of communication
More informationAcceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
More informationThe European Marine Energy Centre Ltd. HARASSMENT AND BULLYING POLICY
The European Marine Energy Centre Ltd. HARASSMENT AND BULLYING POLICY Table of Contents 1 Policy Statement... 3 2 Scope... 3 3 Definitions... 3 4 Detailed Guidelines... 5 4.1 What to do if you are being
More informationSocial Networking Procedure
Social Networking Procedure Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out Wiltshire Safeguarding Children Board s policy on social networking. This document aims to: Assist adults working
More informationJOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT
JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.
More informationBLACKPOOL COUNCIL Topic Social Media Policy
1. Introduction 1.1 The widespread use of social media, particularly social networking sites, necessitates Blackpool has a policy in place to ensure that appropriate control mechanisms exist to minimise
More informationTechnology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
More informationCommon Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationSt Vincent s Catholic Primary School e-safety Policy
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
More informationNortheast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY
Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have
More informationBy Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
More informationSocial Network Protocol & Policy
Social Network Protocol & Policy Prepared by: Stoke HR Implementation Date: July 2015 Review date: July 2016 RAISING ASPIRATIONS. TRANSFORMING LIVES. Social Networking Protocol for Schools & Academies
More informationAcceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
More informationDallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationWISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk
WISE Online: An Internet and Mobile Phone Guide http://esafety.ngfl-cymru.org.uk File sharing and Copyright Everyone loves to file share to get music files. But here are some points to take note of: Downloading
More informationSeptember 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
More informationRoskear Primary & Nursery School. E-Safety Policy
E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed
More informationWakefield Public Schools Technology Acceptable Use Policy
Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of
More informationInternet Safety. A guide to staying smart & safe online
Internet Safety A guide to staying smart & safe online What you will learn Privacy how to keep your information safe & secure Safety how to protect yourself & your family online It s not just about computers
More informationInstant Messaging and Chat Rooms Play It Safe!
CMSGu2011-09 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Instant Messaging and Chat Rooms Play It Safe! National Computer Board Mauritius
More informationCharles Williams Church in Wales Primary School. Bullying Prevention Policy. June 2014 Review date June 2016. A Definition Of Bullying
Charles Williams Church in Wales Primary School Bullying Prevention Policy June 2014 Review date June 2016 This Bullying Prevention Policy acknowledges the Welsh Government s Respecting Others: Anti- Bullying
More informationJohn of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
More informationICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
More informatione-safety Policy Broadclyst Community Primary School
e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy
More informationSocial Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)
Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter
More informationAnti Bullying Policy
WEST HATCH HIGH SCHOOL THE BEST THAT I CAN BE Anti Bullying Policy Policy reviewed December 2015 Signed ANTI-BULLYING POLICY This policy takes full account of the school s legal obligations under the Education
More informationST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS
ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS Contents:- 1. College policy. 2. Roles and Responsibilities 3. College procedures. 4. College rules for internet use by students. 5.
More informationAcceptable Use Policy Internet and Email - Students
Acceptable Use Policy Internet and Email - Students Ref HR01 Acceptable Use Policy Internet and Email - Students Review Date: August 2016 North East Scotland College All rights reserved INTRODUCTION Information
More informationWELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY
WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within
More informationDEALING WITH WORKPLACE BULLYING - A WORKER S GUIDE NOVEMBER 2013
DEALING WITH WORKPLACE BULLYING - A WORKER S GUIDE NOVEMBER 2013 Safe Work Australia is an Australian Government statutory agency established in 2009. Safe Work Australia consists of representatives of
More informationGRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY
GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Approved: 4 September 2014 Review Date: Page 1 of 7 GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Introduction Schools have a duty of care for pupils and
More informationPolicy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low
Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy
More informationE-Safety and Acceptable Use Policy
E-Safety and Acceptable Use Policy This policy has been written in consultation with pupils and staff so that they understand that there are dangers associated with Internet use, and they know what behaviour
More informationHuman Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More informationThe Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
More informationStudent use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
More informationINTERNET AND EMAIL POLICY
Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationMiddlesbrough College : We re better without bullying THE FUTURE IS OURS SAFE, FUN AND CONNECTED
Middlesbrough College : We re better without bullying THE FUTURE IS OURS SAFE, FUN AND CONNECTED ANTI-BULLYING WEEK 18-22 NOVEMBER 2013 What is Bullying? Middlesbrough College students define bullying
More informationINFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY
INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY Your access to, and use of, the Heathfield High School IT System must be - Only for school use with regard to your subject work. In accordance
More informationA guide for managers and employers. Bullying and harassment at work
A guide for managers and employers Bullying and harassment at work Acas can help with your employment relations needs Every year Acas helps employers and employees from thousands of workplaces. That means
More informationRespect at Work SN 2/03
Respect at Work SN 2/03 NERC Policy Covering Bullying and Harassment This Staff Notice replaces the following Notices: SN 17/89 - Sexual Harassment SN 7/99 - Harassment - an informal procedure SMPN 82
More informationDIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
More informationElectronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)
Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to
More informatione-safety for Parents
e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationSocial Media Guidance for Staff
Social Media Guidance for Staff May 2013 Social media guidance aims Establish practical and reasonable guidelines to help staff in their professional use of social media. Promote a safe environment to
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationOXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
More informationAcceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
More informationInternet, E-Safety & Acceptable Use Policy
Date March 2016 Review Date 2018-2019 Internet, E-Safety & Acceptable Use Policy The Internet is becoming as commonplace as the telephone or TV and its effective use is an essential life-skill. Unmediated
More informationInternet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014
Internet Acceptable Use Policy A council-wide information management policy Version 1.5 June 2014 Copyright Notification Copyright London Borough of Islington 20134This document is distributed under the
More informationTECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
More informationE-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school.
E-Safety Policy Development / Monitoring / Review of the policy This policy applies to all members of the school (including staff, students / pupils, volunteers, parents / carers, visitors, community users)
More informationCardinal Heenan Catholic High School
Cardinal Heenan Catholic High School E-Safety policy Approved by Full Governing Body: July 2015 Reviewed: Jul 2015 Signature (Chair of Governors): Next Review Date: Summer 2017 Key people in school Deputy
More informationWilsthorpe Community School
Wilsthorpe Community School Online Safety Policy REVIEWED March 2016 Introduction This Online Safety Policy has been written by the school, building on LA policy and government guidance. It has been agreed
More informationMobile Phones By Students - A Model For School & College Safety
AEU POLICY ON ACCEPTABLE USE OF MOBILE PHONES BY STUDENTS IN SCHOOL/COLLEGES 2008 Background The mobile phone is a tool which has in recent years come to pervade nearly all of areas of society. In schools
More informationSocial Media Policy For Staff
Social Media Policy For Staff 1 Owlswick School and Home Social Media Policy Introduction The Internet provides a range of social media tools that allow users to interact with one another, for example
More informationBullying and harassment at work:
Bullying and harassment at work: a guide for RCN members Healthy workplace, healthy you Dignity at work Healthy workplace, healthy you 3 Introduction The nursing workforce should be treated fairly and
More informationAcceptable Use of Internet and Digital Technology
Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB on: Reviewed policy shared with staff on: Policy to be reviewed again on: Committee responsible for review: Acceptable Use
More informationParker School s ipad Reference Manual
Parker School s ipad Reference Manual Introduction Contents Acceptable Use Policy Overview Parker School s Network Guidelines Introduction User Requirements ipad and ipad Accessory Requirements How to
More informationCYBERSAFETY USE AGREEMENT for Cambridge High School Students
CYBERSAFETY USE AGREEMENT for Cambridge High School Students Cambridge High School This document is comprised of this cover page and three sections: Section A: Introduction Section B: Cybersafety Rules
More informationCybersmart Guide for Families
Australia s regulator for broadcasting, the internet, radiocommunications and telecommunications www.acma.gov.au Cybersmart Guide for Families Safe internet use in the library and at home Introduction
More information[Name of School] E-safety policy
[Name of School] E-safety policy Adopted: Review date: Note: Blue boxes contain advisory notes which should be read and deleted. These indicate where schools need to make decisions or choices. This policy
More information