Guidance on Cyber Bullying

Size: px
Start display at page:

Download "Guidance on Cyber Bullying"

Transcription

1 Guidance on Cyber Bullying Human Resources

2 HR Policies Discipline Grievance Bullying and harassment Equal opportunities Stress management Sickness absence Staff handbook Social media Dignity at work Mediation ICTS Policies Acceptable use policy policy Student Regulations IT handbook Cyber Bullying Resource MMU Newsletters Student Services Policies Student handbook Counselling links Health and Safety Policies

3 What is Cyber Bullying? Cyber bullying is the term used to define bullying behaviour that takes place via mobile phone or over the internet through s, instant messaging and social networking websites. Texts, messages or images are sent or posted on sites, which hurt, intimidate or embarrass another person. Cyber bullying is not carried out face to face and people often don t know the identity of the person targeting them. But cyber bullying is no different from any other form of bullying; the behaviour is the same and the impact is no less devastating. Advances in technology are simply providing alternative means of reaching people where malicious messages were once written on books or toilet walls, they can now be sent via mobile phone or the internet. Some cyber bullying is clearly deliberate and aggressive, but it is important to recognise that some incidents of cyber bullying are known to be unintentional and the result of simply not thinking about the consequences. What may be sent as a joke may not be received as one, and indeed the reach of technology means the sender may not see the impact of the message on the receiver. There is also less opportunity for either party to resolve any misunderstanding or to feel empathy. It is important that everyone is aware of the effects of their actions. With cyber bullying, bystanders can easily become perpetrators by passing on or showing to others images designed to humiliate, for example, or by taking part in online polls or discussion groups. They may not recognise themselves as participating in bullying, but their involvement compounds the misery for the person targeted. Although bullying is not a specific criminal offence in UK law, there are criminal laws that can apply in terms of harassment or threatening behaviour. For example and particularly pertinent for cyber bullying threatening and menacing communications. In fact, some cyber bullying activities could be criminal offences under a range of different laws, including: Protection from Harassment Act 1997 Crime & Disorder Act 1998 Communications Act 2003 Defamation Malicious Communications Act 1988 Public Order Act 1986 Obscene Publications Act 1959 Computer Misuse Act 1990 The Technology Mobile Phones are used for much more than talking and texting, including downloading and forwarding pictures and film clips, checking e mail, accessing the internet and listening to music. The wide range of activities phones are used for, coupled with the phone s role in managing social networks, makes the phone a powerful and important tool. As well as being able to store music, take photos and video and send these to other phones, people can also share this content with other phones via short range wireless connections, such as blue tooth. Mobiles have been used to cyber bully in a number of ways: making offensive calls; sending offensive text messages; taking and sharing humiliating images; videoing and sharing acts of bullying and assault via camera phone (sometimes misleadingly called Happy Slapping ). Content can be posted on line or sent from phone to phone, or shared using a short-range wireless device, bypassing the phone network altogether. Instant Messenger (IM)/Skype/Facetime are applications that allows people to talk in real time (i.e. live) with other people on a pre-selected friend/buddy list. IM programmes usually require you to download the application to your computer, although there are some web based services available which do not need installing. IM programmes let you see which of your contacts are online when you are, and let you chat using text while you are using your computer. Like social networking sites, IM services work between a network

4 of people who have signed up to the same service and given each other permission to see and talk to each other when they are online. Unlike chat rooms which are typically public and open to anyone signed up to the chat service, IM is more private, usually taking place between two people. Windows Live Messenger is a popular IM programme. Voice Over Internet Protocols (VOIP) are becoming increasingly popular since they offer unlimited free phone calls anywhere in the world, using an internet connected computer and microphone. Again, calls only take place between two people who have downloaded the same application. Some instant messenger products can hold up to 600 buddies or contacts. Bullies can use IM to send offensive messages or content to other users. People can also hack into IM accounts and send offensive messages to contacts. Chat Rooms and Message Boards Typically chat rooms are thematically organised around interest, age and location. Chat rooms allow groups of people from across the world to hold text (and sometimes voice) conversations in real time. Public chat rooms can be populated by anyone, since accounts usually only require an address to verify a user s identity. Most chat rooms do not carry age verification; therefore children can visit chat rooms of an adult nature. People can behave inappropriately or abusively. The nature of chat room exchanges tend to be less inhibited than when people meet in the real world for the first time and people can be persuaded to give out too much personal information and contact details. Offensive or threatening messages can be sent, without the target necessarily knowing who they are from. Groups may ostracise and ignore individuals. is now an essential part of most people s working lives. accounts are provided by organisations, broadband providers or other internet companies. can be used to send inappropriate images and to forward private information. Computer viruses and spam are common hazards. Web-based can also be used by people wanting to remain anonymous in order to send malicious or offensive mail. People can send bullying or threatening messages via , or repeatedly send unwanted messages. Unsuitable images can be forwarded inappropriately. Webcams are small digital cameras which work with computers. They can be used to record photographs or video, which can then be posted on the internet or forwarded. Most commonly they are used to see someone that you are talking to online. People can be persuaded or threatened into doing things on a webcam that they might not have otherwise done. Once someone else has the content, they are at risk of being further manipulated or threatened. Social Network Sites such as Twitter, Facebook and Bebo let users create their own homepages, set up blogs and add friends. Social network sites typically allow users to set up a profile page, listing their interest and other details, and they enable contact with other users. Many focus on internet or services. They may also provide blogging or other website creation tools. Many people view the social network site they use as the hub of their online activity and will spend a lot of time on their pages. Profiles and blogs may contain a lot of detailed and personal information about themselves and their friends. This can be misused by bullies to gain information about an individual, their interests and tastes as well as their location or contact details. Many people mistakenly view publicly available sites as private and personal places, and post photographs for their immediate friends which may be inappropriate or embarrassing in other contexts. Sites which are not made private or registered as belonging to an over 18 year old, are easy to search for and may be indexed and cached by search engines such as Google. Social network sites can be abused in a number of ways. Most allow comments to be left (although some sites enable users to review/approve content before it is shown), and offensive comments may be posted. People might use their own sites to spread rumours or make unpleasant comments about other people, or post humiliating images or video of them. Fake profiles are also fairly common, and these might be used to pretend to be someone else in order to bully, harass or get them into trouble.

5 Guidance on Dealing with Bullying and Harassment by Electronic Means Use the Dignity at Work Policy and Procedures Bullying or harassment via electronic means (for example, via , social networking sites, the Web and mobile phones) is covered by the University s Dignity at Work Policy and Procedure ( humanresources). If you are experiencing unfair treatment of this nature, the same procedure should be followed as for other forms of harassment. The Equality Team s web page has further information, including what you can do and where you can get confidential help ( What additional action could you take? It is important that you save any evidence of harassment/bullying that has taken place. For example, you could take screen shots of the offending posts or images and save s. You could also consider the following (where appropriate): Blocking or banning the user from contacting you Ensuring any personal contact details available on the web are made private, or only accessible to people you trust Follow the University guidelines to keep yourself safe on social networking sites, (see page 9 of this guidance). All UK Mobile operators have nuisance call centres set up and/or procedures in place to deal with such instances. You should acquaint yourself with your providers services in this area. What can be done? 1 When University computing facilities have been used? If a student or member of staff is using the University s computer facilities to harass another member of the University (staff or student), a record of this is likely to be found on the IT servers. Confidential server log files record which sites users have visited and when, and also keep records of when s have been sent or received and sometimes their content. This applies whether the website is hosted by the university or is an external website. Complaints can be investigated under the Dignity at Work Policy, the Disciplinary Procedures or Grievance procedures or the Student Complaint procedures. 2 When the harassment/bullying is external to the University? If harassment has taken place using equipment that is not part of the University system for both the sender and the recipient, it is much harder for the University to gather evidence. Internet service providers have complaints procedures which can be followed, but will generally only provide data to the police. However, it is still possible for IT Services to take action to protect you, such as blocking s from external addresses or providing advice on how you could get an offensive posting on a social networking site removed. The University has a duty of care towards students and staff, and will take action, including disciplinary action if necessary, whether the harassment /bullying is taking place using university equipment or not. It is important that if you are being harassed/bullied in any way, that you seek help and support so that the effective action can be taken. The University has a number of Dignity at Work Advisors who you can speak to in confidence about such issues. Their details can be found at

6 Guidelines for Making the Most of Social Networking Sites Facebook, Friends Reunited and LinkedIn are all examples of social networking sites. They re a great way to chat with friends, family and colleagues or meet people with similar interests. The down side is that your personal details could be seen by anyone, so it s important to remember these points of cyber safety: 1 Restrict access to your profile page to people you know and trust; this reduces the risk of identity theft or stalking. 2 It could be easier than you think for prospective employers to see your profile, however well protected it is. Many employers do look at these sites, so make sure you are happy that your content is suitable for your family, employers and casual acquaintances to see. 3 Be as careful as you can when you chat online about your studies, work, personal life or social events as you would when talking to a stranger. Your posts on newsgroups and online communities may be in the public domain in archives where they can be found years later. 4 Only make comments about a named individual that would be acceptable face to face. Laws on bullying, stalking and defamation can apply online and the penalties can be severe. 5 Your photographs can be viewed, searched or copied unless you protect them. If you don t protect them straight away, copies may be held on archives indefinitely. 6 If you display photos of other people, only add their names if they ve given permission they may not want their image to be easy to find. 7 Copyright laws apply online. If you use content that you didn t create yourself, remember to get permission. 8 Take care when discussing details of your whereabouts you may wish to keep private where you are planning to go and when you will not be at home. 9 Use a different password from the one you use at the university or for online banking. 10 If you use a site which asks you to choose an alias, you can maintain your privacy by making sure that it isn t associated with your real name or University address. Useful Links StopText bully a website dedicated to mobile phone bullying, contains advice for young people, including how to contact your operator Chatdanger a website that informs about the potential dangers online (including bullying) and advice about how to stay safe while chatting Digizen Digizen focuses on responsible use of the internet. Digital citizenship is about building safe spaces and communities, and using online presence to grow and shape your world in a safe, creative way Child Exploitation and Online Protection Centre provides information and advice for online safety Respectme offers practical advice and guidance for adults on addressing bullying behaviour

7 Review This guidance has been screened to determine its impact on groups which are protected by law using the University s Equality Impact Assessment process. This guidance will be reviewed in two years, or earlier if legislative requirements change. Last Date of Review: February AT

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

Cyberbullying A whole-school community issue

Cyberbullying A whole-school community issue Cyberbullying A whole-school community issue Introduction Today s children and young people have grown up in a world that is very different from that of most adults. Many young people experience the internet

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

TAVISTOCK COLLEGE POLICIES & PROCEDURES

TAVISTOCK COLLEGE POLICIES & PROCEDURES TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Guidelines for Preventing and Dealing with Bullying Issues

Guidelines for Preventing and Dealing with Bullying Issues Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

Networking and Social Media Policy

Networking and Social Media Policy Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools

More information

Social Networking Policy

Social Networking Policy Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies

More information

Social Networking Policy

Social Networking Policy Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour

More information

Finchley Catholic High School. Anti Bullying Policy

Finchley Catholic High School. Anti Bullying Policy Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can

More information

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School: Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

SOCIAL MEDIA POLICY. Introduction

SOCIAL MEDIA POLICY. Introduction Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes

More information

Cybersafety and protocols for conducting online life?

Cybersafety and protocols for conducting online life? Cybersafety and protocols for conducting online life? Sunderland is an exciting place to live. We lead the way in making use of services online. We are one of the most connected cities in the UK. Whatever

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 1. VISIT THE NUT HEALTH AND SAFETY POST www.teachers.org.uk. Camera Mobile Phones Health and Safety Issues

Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 1. VISIT THE NUT HEALTH AND SAFETY POST www.teachers.org.uk. Camera Mobile Phones Health and Safety Issues Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 1 VISIT THE NUT HEALTH AND SAFETY POST www.teachers.org.uk Camera Mobile Phones Health and Safety Issues Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 2 To view

More information

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2 Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Bullying and Harassment at Work Policy

Bullying and Harassment at Work Policy Bullying and Harassment at Work Policy i) Statement Everyone should be treated with dignity and respect at work, irrespective of their status or position within the organisation. Bullying and harassment

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Archbishop Beck Catholic Sports College

Archbishop Beck Catholic Sports College Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety

More information

Simon Langton Grammar School for Boys E-Safety Policy

Simon Langton Grammar School for Boys E-Safety Policy Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

FIRBANK GRAMMAR SCHOOL

FIRBANK GRAMMAR SCHOOL FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

More information

King David Primary School Staff Social Networking Policy

King David Primary School Staff Social Networking Policy King David Primary School Staff Social Networking Policy This policy should be read in conjunction with other relevant policies e.g. school ICT Policy including acceptable or unacceptable usage, Disciplinary

More information

Social Networking Protocol for Schools Managed Staff

Social Networking Protocol for Schools Managed Staff Social Networking Protocol for Schools Managed Staff Created by HR Consultancy June 2010 1 Social Networking Protocol 2010 Contents 1. Purpose 2. Scope 3. School s Expectations 4. Safeguarding 5. Monitoring

More information

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including

More information

INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF

INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF go.qub.ac.uk/socialmedia WHY ARE SOCIAL MEDIA TOOLS IMPORTANT TO QUEEN S UNIVERSITY? The term social media is used to describe a range of communication

More information

Acceptable Use of ICT Policy. Learner School Policy

Acceptable Use of ICT Policy. Learner School Policy Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL

More information

The European Marine Energy Centre Ltd. HARASSMENT AND BULLYING POLICY

The European Marine Energy Centre Ltd. HARASSMENT AND BULLYING POLICY The European Marine Energy Centre Ltd. HARASSMENT AND BULLYING POLICY Table of Contents 1 Policy Statement... 3 2 Scope... 3 3 Definitions... 3 4 Detailed Guidelines... 5 4.1 What to do if you are being

More information

Social Networking Procedure

Social Networking Procedure Social Networking Procedure Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out Wiltshire Safeguarding Children Board s policy on social networking. This document aims to: Assist adults working

More information

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.

More information

BLACKPOOL COUNCIL Topic Social Media Policy

BLACKPOOL COUNCIL Topic Social Media Policy 1. Introduction 1.1 The widespread use of social media, particularly social networking sites, necessitates Blackpool has a policy in place to ensure that appropriate control mechanisms exist to minimise

More information

Technology Acceptable Use Policy

Technology Acceptable Use Policy Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop

More information

Common Facebook issues

Common Facebook issues Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

St Vincent s Catholic Primary School e-safety Policy

St Vincent s Catholic Primary School e-safety Policy St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

Social Network Protocol & Policy

Social Network Protocol & Policy Social Network Protocol & Policy Prepared by: Stoke HR Implementation Date: July 2015 Review date: July 2016 RAISING ASPIRATIONS. TRANSFORMING LIVES. Social Networking Protocol for Schools & Academies

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

WISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk

WISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk WISE Online: An Internet and Mobile Phone Guide http://esafety.ngfl-cymru.org.uk File sharing and Copyright Everyone loves to file share to get music files. But here are some points to take note of: Downloading

More information

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9 Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of

More information

Roskear Primary & Nursery School. E-Safety Policy

Roskear Primary & Nursery School. E-Safety Policy E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed

More information

Wakefield Public Schools Technology Acceptable Use Policy

Wakefield Public Schools Technology Acceptable Use Policy Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of

More information

Internet Safety. A guide to staying smart & safe online

Internet Safety. A guide to staying smart & safe online Internet Safety A guide to staying smart & safe online What you will learn Privacy how to keep your information safe & secure Safety how to protect yourself & your family online It s not just about computers

More information

Instant Messaging and Chat Rooms Play It Safe!

Instant Messaging and Chat Rooms Play It Safe! CMSGu2011-09 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Instant Messaging and Chat Rooms Play It Safe! National Computer Board Mauritius

More information

Charles Williams Church in Wales Primary School. Bullying Prevention Policy. June 2014 Review date June 2016. A Definition Of Bullying

Charles Williams Church in Wales Primary School. Bullying Prevention Policy. June 2014 Review date June 2016. A Definition Of Bullying Charles Williams Church in Wales Primary School Bullying Prevention Policy June 2014 Review date June 2016 This Bullying Prevention Policy acknowledges the Welsh Government s Respecting Others: Anti- Bullying

More information

John of Rolleston Primary School

John of Rolleston Primary School John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership

More information

ICT Safe and Acceptable Use Policy for Students

ICT Safe and Acceptable Use Policy for Students ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...

More information

e-safety Policy Broadclyst Community Primary School

e-safety Policy Broadclyst Community Primary School e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy

More information

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter

More information

Anti Bullying Policy

Anti Bullying Policy WEST HATCH HIGH SCHOOL THE BEST THAT I CAN BE Anti Bullying Policy Policy reviewed December 2015 Signed ANTI-BULLYING POLICY This policy takes full account of the school s legal obligations under the Education

More information

ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS

ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS Contents:- 1. College policy. 2. Roles and Responsibilities 3. College procedures. 4. College rules for internet use by students. 5.

More information

Acceptable Use Policy Internet and Email - Students

Acceptable Use Policy Internet and Email - Students Acceptable Use Policy Internet and Email - Students Ref HR01 Acceptable Use Policy Internet and Email - Students Review Date: August 2016 North East Scotland College All rights reserved INTRODUCTION Information

More information

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within

More information

DEALING WITH WORKPLACE BULLYING - A WORKER S GUIDE NOVEMBER 2013

DEALING WITH WORKPLACE BULLYING - A WORKER S GUIDE NOVEMBER 2013 DEALING WITH WORKPLACE BULLYING - A WORKER S GUIDE NOVEMBER 2013 Safe Work Australia is an Australian Government statutory agency established in 2009. Safe Work Australia consists of representatives of

More information

GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY

GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Approved: 4 September 2014 Review Date: Page 1 of 7 GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Introduction Schools have a duty of care for pupils and

More information

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy

More information

E-Safety and Acceptable Use Policy

E-Safety and Acceptable Use Policy E-Safety and Acceptable Use Policy This policy has been written in consultation with pupils and staff so that they understand that there are dangers associated with Internet use, and they know what behaviour

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Middlesbrough College : We re better without bullying THE FUTURE IS OURS SAFE, FUN AND CONNECTED

Middlesbrough College : We re better without bullying THE FUTURE IS OURS SAFE, FUN AND CONNECTED Middlesbrough College : We re better without bullying THE FUTURE IS OURS SAFE, FUN AND CONNECTED ANTI-BULLYING WEEK 18-22 NOVEMBER 2013 What is Bullying? Middlesbrough College students define bullying

More information

INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY

INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY Your access to, and use of, the Heathfield High School IT System must be - Only for school use with regard to your subject work. In accordance

More information

A guide for managers and employers. Bullying and harassment at work

A guide for managers and employers. Bullying and harassment at work A guide for managers and employers Bullying and harassment at work Acas can help with your employment relations needs Every year Acas helps employers and employees from thousands of workplaces. That means

More information

Respect at Work SN 2/03

Respect at Work SN 2/03 Respect at Work SN 2/03 NERC Policy Covering Bullying and Harassment This Staff Notice replaces the following Notices: SN 17/89 - Sexual Harassment SN 7/99 - Harassment - an informal procedure SMPN 82

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Social Media Guidance for Staff

Social Media Guidance for Staff Social Media Guidance for Staff May 2013 Social media guidance aims Establish practical and reasonable guidelines to help staff in their professional use of social media. Promote a safe environment to

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Internet, E-Safety & Acceptable Use Policy

Internet, E-Safety & Acceptable Use Policy Date March 2016 Review Date 2018-2019 Internet, E-Safety & Acceptable Use Policy The Internet is becoming as commonplace as the telephone or TV and its effective use is an essential life-skill. Unmediated

More information

Internet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014

Internet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014 Internet Acceptable Use Policy A council-wide information management policy Version 1.5 June 2014 Copyright Notification Copyright London Borough of Islington 20134This document is distributed under the

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

E-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school.

E-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school. E-Safety Policy Development / Monitoring / Review of the policy This policy applies to all members of the school (including staff, students / pupils, volunteers, parents / carers, visitors, community users)

More information

Cardinal Heenan Catholic High School

Cardinal Heenan Catholic High School Cardinal Heenan Catholic High School E-Safety policy Approved by Full Governing Body: July 2015 Reviewed: Jul 2015 Signature (Chair of Governors): Next Review Date: Summer 2017 Key people in school Deputy

More information

Wilsthorpe Community School

Wilsthorpe Community School Wilsthorpe Community School Online Safety Policy REVIEWED March 2016 Introduction This Online Safety Policy has been written by the school, building on LA policy and government guidance. It has been agreed

More information

Mobile Phones By Students - A Model For School & College Safety

Mobile Phones By Students - A Model For School & College Safety AEU POLICY ON ACCEPTABLE USE OF MOBILE PHONES BY STUDENTS IN SCHOOL/COLLEGES 2008 Background The mobile phone is a tool which has in recent years come to pervade nearly all of areas of society. In schools

More information

Social Media Policy For Staff

Social Media Policy For Staff Social Media Policy For Staff 1 Owlswick School and Home Social Media Policy Introduction The Internet provides a range of social media tools that allow users to interact with one another, for example

More information

Bullying and harassment at work:

Bullying and harassment at work: Bullying and harassment at work: a guide for RCN members Healthy workplace, healthy you Dignity at work Healthy workplace, healthy you 3 Introduction The nursing workforce should be treated fairly and

More information

Acceptable Use of Internet and Digital Technology

Acceptable Use of Internet and Digital Technology Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB on: Reviewed policy shared with staff on: Policy to be reviewed again on: Committee responsible for review: Acceptable Use

More information

Parker School s ipad Reference Manual

Parker School s ipad Reference Manual Parker School s ipad Reference Manual Introduction Contents Acceptable Use Policy Overview Parker School s Network Guidelines Introduction User Requirements ipad and ipad Accessory Requirements How to

More information

CYBERSAFETY USE AGREEMENT for Cambridge High School Students

CYBERSAFETY USE AGREEMENT for Cambridge High School Students CYBERSAFETY USE AGREEMENT for Cambridge High School Students Cambridge High School This document is comprised of this cover page and three sections: Section A: Introduction Section B: Cybersafety Rules

More information

Cybersmart Guide for Families

Cybersmart Guide for Families Australia s regulator for broadcasting, the internet, radiocommunications and telecommunications www.acma.gov.au Cybersmart Guide for Families Safe internet use in the library and at home Introduction

More information

[Name of School] E-safety policy

[Name of School] E-safety policy [Name of School] E-safety policy Adopted: Review date: Note: Blue boxes contain advisory notes which should be read and deleted. These indicate where schools need to make decisions or choices. This policy

More information