Policies & Procedures. Moat Community College E-Safety Policy
|
|
- Gwenda Lyons
- 5 years ago
- Views:
Transcription
1 Moat Community College E-Safety Policy Vision Statement Moat Community College embraces the positive impact and educational benefits that can be achieved through appropriate use of the Internet and associated communications technologies. We are also aware that inappropriate or misguided use can expose both adults and young people to unacceptable risks and dangers. To that end, Moat Community College aims to provide a safe and secure environment which not only protects all people on the premises but also educates them on how to stay safe in the wider world. Scope This policy and related documents apply at all times to fixed and mobile technologies owned and supplied by the college and to personal devices owned by staff and students while on the college premises. Related Documents: Acceptable Use Policy for Staff Acceptable Use Policy for Students Publicising e-safety Effective communication across the college community is key to achieving the college vision for safe and responsible citizens. To achieve this we will: Make this policy, and related documents, available on the college s SharePoint at: Introduce this policy, and related documents, to all stakeholders at appropriate times. This will be at least once a year or whenever it is updated Page 1 13/01/2014 esafeguarding
2 Roles and Responsibilities The Principal and Governors have ultimate responsibility for establishing safe practice and managing e-safety issues at our college. The designated senior person for child protection is David Buckle. All members of the college community have certain core responsibilities within and outside the college environment. They should: Use technology responsibly. Accept responsibility for their use of technology. Model best practice when using technology. Report any incidents to senior leadership. Understand that network activity and online communications are monitored, including any personal and private communications made via the college network. Be aware that in certain circumstances where unacceptable use is suspected, enhanced monitoring and procedures may come into action. Physical Environment / Security The college endeavours to provide a safe environment for the whole community. We review both physical and network security regularly as well as monitor who has access to the system. Anti-virus software is installed on all computers and is updated regularly. A two tier Filtering system utilizing Impero monitoring and control software and Lightspeed web filtering, is in place and is managed by the ICT technical support team. The college uses Impero on all Windows and OS X computers to ensure compliance with the Acceptable Use Policies. All staff are issued with their own username and password for network access. Visitors / Supply staff are issued with temporary ID's and the details recorded in technicians office, in accordance with both the Network Security Policy and Acceptable Use Policy. Page 2 13/01/2014 esafeguarding
3 All students are issued with their own username and password for network access and understand that this must not be shared. Guidelines and rules are laid out in both the Network Security Policy and Acceptable Use Policy. All students must agree and sign before accessing ICT resources. Mobile / emerging technologies Teaching staff at the college are provided with a laptop for educational use and their own professional development. All staff understands that the Acceptable Use Policies apply to this equipment at all times. To ensure the security of the college systems, all visitors and staff bringing in personal mobile devices to access the colleges network resources should seek permission from the colleges network manager. Staff understand that they should use their own mobile phones sensibly and in line with colleges e-safety policy digital media section. The Education and Inspections Act 2006 grants the Principal the legal power to confiscate mobile devices where there is reasonable suspicion of misuse and the Principal will exercise this right at their discretion Pictures / videos of staff and students should not be taken on personal devices. New technologies are evaluated and risk/benefit assessed before they are introduced to the college community Mobile Phone Misuse All UK mobile operators have nuisance call centres set up and/or procedures in place to deal with such instances. The responses may vary but possibilities for the operator include changing the mobile number of the person being bullied so that the bully will not be able to continue to contact them without finding out their new number. It is not always possible for operators to bar particular numbers from contacting the phone of the person being bullied, although some phone handsets themselves do have this capability. Action can be taken against the bully s phone account (e.g. blocking their account), only with police involvement. For Page 3 13/01/2014 esafeguarding
4 further information please contact your mobile phone provider. Moat uses Microsoft Office 365 Outlook Web Access as its system. This provides two levels of security. Anti-virus/anti-malware protection is built in to Office 365. Staff can use the encrypted features to send messages secure from interception. Published content The Principal takes responsibility for content published on the college web site but delegate s general editorial responsibility to the ICT manager. Subject teachers and area co-ordinators are responsible for the editorial control of work published by their students. The college will hold the copyright for any material published on the college web site or will obtain permission from the copyright holder prior to publishing with appropriate attribution. Digital Media We respect the privacy of the college community. If we have direct instructions not to publish or share a specific student s image or video, then we will refrain from doing so in the public space. By default we will ask for the permission of staff, parents, carers and students to share any images or video for promotional aspects of college life in accordance with the Acceptable Use Policy and other related documents listed within this policy. Parental consent will be sought and recorded on SIMS. Photographs and/or videos of students in college must only be taken using the college s equipment. Personal cameras and or phones should not be used. Page 4 13/01/2014 esafeguarding
5 Social Networking and online communication The use of social networking sites and online communication is currently restricted, with the exception of the college s SharePoint system, which is monitored internally. Guidance is provided to the college community on how to use these sites safely and appropriately. This includes Not publishing personal information. Not publishing information relating to the college community. Ensure appropriate privacy settings are applied. How to report issues or inappropriate content on the sites listed below. Guidelines / Good Practice It is normally possible to block/ignore particular users on social networking sites, which should mean the user can stop receiving unwanted comments. Users can do this from within the site. Many social network providers also enable users to pre-moderate any comments left on their profile before they are visible by others. This can help a user prevent unwanted or hurtful comments appearing on their profile for all to see. The user can also set their profile to Private, so that only those authorised by the user are able to access and see their profile. If social networking sites do receive reports about cyber bulling, they should be able to investigate and may remove content that is illegal or breaks their terms and conditions in other ways. By reading the terms and conditions you will be able to see information on what is inappropriate and unacceptable behaviour, as well as providing prominent safety information so that you know how to use the service safely and responsibly. It is advised to report any incidents of unpleasant comments posted on these sites and also take steps to have them removed. The procedure for different sites is provided below. Page 5 13/01/2014 esafeguarding
6 Facebook You have to be at least 13 years old to sign up to Facebook and students below this age should not attempt to bypass the age verification controls used. There are different ways to stop bullying on Facebook, depending on the type of bullying. You can remove tags or block people who are sending you nasty messages. You can also report abusive posts or groups so Facebook can take them down. Reports are anonymous so the person doing the bullying won t know who reported it. The way to report abuse changes depending on what you are reporting. It s a really good idea to set your profile to friends only so that you can t be on the end of bullying from people you don t know. You can find the Terms of Service by following this link: YouTube YouTube is currently blocked in college for students. We are looking at allowing access to YouTube for Schools but realise that this does not include many of the educational resources that staff and students want to view. YouTube can be a great online video community but it s important to follow their safety guidelines. Bullying on YouTube could happen through videos themselves or through the comments that people post on videos. YouTube has a very strict policy on what s allowed in videos, comments and general behaviour. If the bullying is in a video you can report it by clicking the flag button underneath the video. If you want to report cyber bullying or abuse through comments or private messages then you can use YouTube s reporting tool link: Instagram Instagram is a service for sharing photos with your friends, but some people try to use it for cyber bullying instead. Sometimes people might write nasty comments on an image or upload embarrassing photos of someone. Instagram is automatically set to public so that anyone can see your images - even if you don t know them. It s much easier to stop bullying if your profile is private. When your profile is private, anyone who wants to follow you and see your photos has to send you a request - which you can Page 6 13/01/2014 esafeguarding
7 approve or deny. This way you can control who sees your photos and can make sure only your friends can talk to you on Instagram. You should also report anyone who is being abusive to you by using the link below: Snapchat Snapchat is different from other photo sharing apps because when you send an image, it will only last between 1 and 10 seconds before being deleted. Remember that a number of different tools are available that allow users to permanently save Snapchat photos so they are not deleted. If someone is bullying you on Snapchat, blocking them will stop them from sending abusive messages. You can also report bullying to Snapchat - they may be able to help stop it. Tumblr Tumblr is a great blogging and social network site which lets you post and share your interests with others. People on Tumblr can ask you questions anonymously, which means you don t know the identity of the person asking the question. Sometimes people decide to send abusive or hurtful messages to other people on Tumblr. If someone sends you an abusive question or comment on Tumblr, you can block the user on the Tumblr ignore page. Twitter Appropriate Usage Policy 1. All tweet requests will be submitted by or through SharePoint to: and may be accompanied by one photo or web address (link). 2. Staff assume responsibility for communicating with a public audience and representing the college when submitting tweet requests to whole college admins. 3. Ultimate responsibility for the content of any tweet lies with the admin publishing the tweet. Page 7 13/01/2014 esafeguarding
8 4. Admins may deny a tweet request, and will provide prompt written or verbal reasoning to the member of staff requesting the tweet. 5. Content of tweets must always relate to Moat or events that Moat is participating in. 6. Photos and/or links submitted to accompany tweets must be in accordance with the esafety policy. 7. Tweets naming students may only be published with the express written or verbal permission of the student concerned, or that of a parent/guardian. 8. Administrators will block any users bringing the college into perceived disrepute by comments made tweets. Justification for such action will only be provided outside of exceptional circumstances. 9. College teams wishing to tweet for themselves must: a. Register an appropriately-named account on Twitter.com b. Provide college administrators with this account name and its password. c. Nominate a team member to be responsible for publishing tweets. d. Adhere to all aspects of the Moat Twitter AUP in lieu of the whole-college administrators, with the following exception: i. College teams may address individual teaching or extracurricular groups, but may not use twitter to communicate with individual students or staff. ii. Staff will not use Twitter s private messaging facility to communicate with current college students under any circumstances. Data Security / Data Protection Personal data will be recorded, processed, transferred and made available in line with the Data Protection Policy. Page 8 13/01/2014 esafeguarding
9 Data stored on the college systems is password protected and encrypted in line with the Network Infrastructure Security Policy. All staff laptops will have encryption functionality enabled. Encrypt any personal or sensitive data that is removed or accessed from outside an approved secure space. Encryption is the process of scrambling data to make it unreadable to anyone except those authorized to do so. FileVault 2 is the encryption method used. This encrypts the entire hard drive and allows remote or automated data wipe should a device be lost or stolen. Responding to incidents Internet usage/filtering A two tier Filtering system using Impero and Lightspeed is in place and is managed by the ICT technical. All staff and students understand that if an inappropriate site is discovered it must be reported to the ICT technical team who will fill out an e-safety incident report and block it internally while alerting the colleges child protection representative to relevant issues. The college uses Impero on all network computers to ensure compliance with the Acceptable Use Policy. If students access inappropriate content a screenshot is generated and a report is sent via to the ICT Network Manager. If screenshots are generated by staff then a member of the senior management and or the Principal will be notified. Requests for changes to the filtering will be directed to the ICT technical team in the first instance who will then forward these on to the ICT Network Manager. Change requests will be recorded in the e-safety log for audit purposes. Breaches of this policy by staff will be investigated by the Principal teacher. Action will be taken under Leicester City Council's Disciplinary Policy where a breach of professional Page 9 13/01/2014 esafeguarding
10 conduct is identified. Incidents will be fully investigated and appropriate records made on personal files with the ultimate sanction of summary dismissal reserved for the most serious of cases involving gross misconduct. All monitoring of staff use will be carried out by at least 2 senior members of staff. Student policy breaches relating to bullying, drugs misuse and abuse must be reported to the nominated child protection representative (David Buckle) and action taken inline with college anti-bullying and child protection policies. Minor student offenses, such as being off-task visiting games or websites will be handled by the teacher in situ by invoking the college behaviour policy. The Educations and Inspections Act 2006 grants the Principal the legal power to take action against incidents affecting the college that occur outside the normal college day and this right will be exercised where it is considered appropriate. Page 10 13/01/2014 esafeguarding
Witton Middle School
Witton Middle School e-safety Policy This e-safety Policy has been put together using guidance from the Worcestershire Local Authority (LA) and is based on the guidance provided by Becta. Our Vision Witton
St Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
John of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
E- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
Simon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
e-safety Policy Broadclyst Community Primary School
e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
ICT Acceptable use Policy. Coláiste Mhuirlinne/ Merlin College Doughiska, Galway City.
ICT Acceptable use Policy. Coláiste Mhuirlinne/ Doughiska, Galway City. Ratified by the Board of Management on 27 th May, 2015 Table of Contents Introduction... 2 General... 2 Internet Use... 3 Email...
Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
Roskear Primary & Nursery School. E-Safety Policy
E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed
E-Safety Policy (Parent/Pupil) March 2013
E-Safety Policy (Parent/Pupil) March 2013 1 ICT, Internet, Intranet and E-Mail Policy (Parent/Pupil) 1. Policy statement The purpose of this document is to set out detailed guidance for parents of pupils
Networking and Social Media Policy
Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools
Related Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities
Category Security Document Name e-safety Procedures Accountable Body Brantridge School Governing Body Reference SY.P2.02 Date Ratified Version 2.1 Last Update March 2015 Related Policies & Documents Document
September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
Protocol for Acceptable Use of Internet and Email by Staff E-Safety Procedures Safeguarding & Child Protection Policy
Category Document Name Accountable Body Security E-Safety Policy RADIUS Trust Reference SY.P2 Date Ratified 11 th December 2014 Version 3.1 Last Update 31 st March 2015 Related Documents Document Protocol
ACCEPTABLE USE POLICY BE SAFE USING THE COMPUTER
ACCEPTABLE USE POLICY BE SAFE USING THE COMPUTER We want you to feel safe all the time. Make sure you: o always keep your passwords a secret o only open pages which your teacher has said are OK o only
E Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
1. Introduction. 2. Roles & Responsibilities. Governing Body. Headteacher
Category Security Document Name E-safety Procedures Accountable Body Grafham Grange School Governing Body Reference SY.P2.01 Date Ratified 27 th August 2015 Version 1.0 Last Update August 2015 Related
E-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school.
E-Safety Policy Development / Monitoring / Review of the policy This policy applies to all members of the school (including staff, students / pupils, volunteers, parents / carers, visitors, community users)
E-SAFETY POLICY. Signed. for school. Signed for Governors. Date..
E-SAFETY POLICY Signed. for school Signed for Governors Date.. RATIONALE E-safety encompasses Internet technologies and electronic communications such as mobile phones as well as collaboration tools and
Internet, E-Safety & Acceptable Use Policy
Date March 2016 Review Date 2018-2019 Internet, E-Safety & Acceptable Use Policy The Internet is becoming as commonplace as the telephone or TV and its effective use is an essential life-skill. Unmediated
E Safety Policy. 1.0 Background
E Safety Policy 1.0 Background New technologies have become integral to the lives of children and young people in today s society, both within the UTC and in their lives outside the UTC. The internet and
Guidance on Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors
Guidance on Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors Policy Nr 109 Published 30-Jun-15 Page 1 of 5 Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors School Guidelines
4. The Importance of Internet Use in the Primary Curriculum
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
Acceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
E-Safety Policy & Procedures
E-Safety Policy & Procedures Version Policy Originator: Equality Impact Assessed: Approved by: SMT Date Approved: April 2015 Review Interval: Annually Last Review Date: - Next Review Date: April 2016 Audience:
St Edward s Church of England Academy. E-Safety Policy
St Edward s Church of England Academy E-Safety Policy Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and
Social Networking Policy
Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies
Wilsthorpe Community School
Wilsthorpe Community School Online Safety Policy REVIEWED March 2016 Introduction This Online Safety Policy has been written by the school, building on LA policy and government guidance. It has been agreed
E-Safety Policy. Please read this policy in conjunction with the policies listed below:
E-Safety Policy Policy Code: ICT2 Policy Start Date: July 2015 Policy Review Date: September 2015 Please read this policy in conjunction with the policies listed below: SW5 Safeguarding and Child Protection
St Vincent s Catholic Primary School e-safety Policy
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
ICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
Common Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
Bring Your Own Device (BYOD) for Staff and Visitors
Bring Your Own Device (BYOD) for Staff and Visitors Version 1.01 01.16 Created April 2015 Reviewed by Education and staffing Committee 21.01.16 Review Cycle Triennial Next review September 2019 Source
SALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL
SALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL E SAFETY Policy October 2012 Page 1 Saltford C of E Primary School E-Safety Policy Oct 2012 Table of Contents BACKGROUND / RATIONALE... 3 DEVELOPMENT / MONITORING
Policy for Staff and Post 16 Student BYOD (Bring Your Own Device)
Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...
E-SAFETY POLICY. The Kingswinford School - a science college. December 2014. Every Child a Scientist. Page 1
The Kingswinford School - a science college E-SAFETY POLICY December 2014 Page 1 E-Safety Policy - Advice and Guidance Setting This guidance applies to all members of the school community (including staff,
Acceptable Use Policy - Staff
Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
How To Understand The Bring Your Own Device To School Policy At A School
The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS
e-safety Policy for Hertsmere Jewish Primary School
e-safety Policy for Hertsmere Jewish Primary School Reviewed by: Mrs R Wolman, Miss C Stephens and Miss G Geffin Reviewed on: February 2015 Date of Next Review: February 2016 Policy Review This policy
Acceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
Deputy Head Acting Head of Care ICT Manager Director of Social Care Estates Manager. Richard Green Lyn Henwood Tyrone da Silva Denise Banks Rob Taylor
Chailey Heritage Foundation encompasses; Chailey Heritage School Chailey Heritage Residential Futures@Chailey Heritage Simon Yates Richard Green Lyn Henwood Tyrone da Silva Denise Banks Rob Taylor Headteacher
SOCIAL NETWORKING POLICY
SOCIAL NETWORKING POLICY Ratified 9 th March 2016 Reviewed Policy Authorisation Authorised Date By Version March 2016 Governors 1.0 Review Date Changes Made Next Review 1 SOCIAL NETWORKING POLICY This
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Reviewed: 21 March 2016
Reviewed: 21 March 2016 Next Review Autumn 2017 School Photography Policy 1. Background At Good Shepherd Primary School we recognise that photography is a useful tool, and it is used routinely in many
COLCHESTER HIGH SCHOOL SOCIAL MEDIA POLICY
Date of this version: January 2015, to be reviewed January 2016. Page 1 At a glance: This policy sets out expectations for professional and personal social media use. It sets out what all staff should
Electronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
Box Hill Senior Secondary College/MYSC
Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication
Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn
Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn 1. Purpose: Throughout the years, the Catholic Schools within the Diocese of Brooklyn have maintained a steadfast dedication
Havelock Academy Broadening Horizons
Havelock Academy Broadening Horizons Acceptable use of IT, e-safety and BYOD September 2014 M Trussell Director of IT September 2014 Purpose The purpose of this Acceptable Use of IT Policy (referred to
Social Media in the Workplace
Social Media in the Workplace A Guide for CWU Members CWU Youth Committee 2013 CONTENTS Introduction... 3 Social Networking in Ireland... 4 Guidelines for using Social Media Responsibly... 5 2 INTRODUCTION
How To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
Social Network Protocol & Policy
Social Network Protocol & Policy Prepared by: Stoke HR Implementation Date: July 2015 Review date: July 2016 RAISING ASPIRATIONS. TRANSFORMING LIVES. Social Networking Protocol for Schools & Academies
Internet and Online Security Policy
Internet and Online Security Policy Policy Updated: Spring 2015 Adopted by Staff and Governors: Spring 2015 Date for Review: Spring 2016 1 Internet and Online Security Policy Contents 1 Aims and Objectives...
E-Safety and Acceptable Use Policy
E-Safety and Acceptable Use Policy This policy has been written in consultation with pupils and staff so that they understand that there are dangers associated with Internet use, and they know what behaviour
E-Safety Policy Last reviewed 2012 Updated October 2014
E-Safety Policy Last reviewed 2012 Updated October 2014 Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and
360 Degree Safe Cymru SELF REVIEW TOOL
360 Degree Safe Cymru SELF REVIEW TOOL UPDATED OCTOBER 2014 The South West Grid for Learning Trust, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0845 601 3203 Email: enquiries@swgfl.org.uk
North Ealing Primary School. Internet Safety Policy 2015-16. 1 P a g e
North Ealing Primary School Internet Safety Policy 2015-16 1 P a g e Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher
Internet Use and E-safety Policy
Internet Use and E-safety Policy Date Policy due to be reviewed: July 2016 Committee Responsible for Policy: Full Governing Body Committee Internet use and E-safety Policy 2015-16 Page 1 of 11 Internet
EMERSON PARK ACADEMY
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
E-Safety and Computer Security Rules
E-Safety and Computer Security Rules Process / Signatures Portfolio Team Portfolio Team Lead Principal Chair of Governors Behaviour Safety & Ethos Mrs K Mitford Dr J V Edwards Mrs K Mitford Presented 2
WHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES
WHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES Approved: December 2014, Full Governing Body Next review due: December 2016 The key aim of the whole school ICT team is to support
SCHOOL E-SAFETY SELF REVIEW TOOL
SCHOOL E-SAFETY SELF REVIEW TOOL The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, Devon, UK, EX2 5WS. Tel: 0845 601 3203 Fax: 01392 366 494 Email: esafety@swgfl.org.uk
Social Networking Policy
Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful
Bring Your Own Device Policy
Bring Your Own Device Policy 1. Introduction The Foundation is committed to providing a technology based learning environment that creates opportunities to support and extend learning and teaching in all
Dulwich College ICT Acceptable Use Policy
Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These
Berwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
Great Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy
Great Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy November 2013 This policy was adopted on:... Date of last review:... Signed:... Great Horwood C.E. Combined School Page 1 Acceptable
TECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
Staying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
Social Media Policy. 1 Southbank International School: Social Media Policy. Abstract
1 Southbank International School: Abstract The Policy seeks to provide support and guidance to social media users who are associated with the School (employees, students), and who establish and maintain
Computer Facilities and External Networks Acceptable Use by Students
Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic
The Internet Acceptable Use Policy (for parents and children)
Contact: Susan Seale The Internet Acceptable Use Policy (for parents and children) This policy is made available via the school website, is provided to all parents (current and prospective) in the office,
SOCIAL MEDIA POLICY. Introduction
Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the
How To Use The School Network Safely
Policy Document Information and Communication Technology and E-Safety Acceptable Use Policy Mission Statement The school is committed to the use of ICT across the curriculum and to providing all students
P319 Internet (including social networking) and email usage in schools and academies Model policy
Contents (If you are viewing this document online, click on the headings below to jump to the relevant section) 1. Introduction... 1 2. Internet use... 2 3. Email use... 2 4. Data protection, freedom of
SCHOOL ONLINE SAFETY SELF REVIEW TOOL
SCHOOL ONLINE SAFETY SELF REVIEW TOOL UPDATED February 2016 The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0844 381 4772 Email: esafety@swgfl.org.uk
SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY DATE: MARCH 2015 REVISION DATE: MARCH 2017
SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY 1 DATE: MARCH 2015 REVISION DATE: MARCH 2017 Background / rationale New technologies have become integral to the lives of children
E-SAFETY SOCIAL MEDIA GUIDANCE
E-SAFETY SOCIAL MEDIA GUIDANCE for those who work with Children, Young People and Adults who may be at risk 1 Contents What do we mean by Social Media... 3 Introduction... 3 Background... 3 Legal Consequences...
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
HUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
baseline for outstanding practice
Primrose Hill.. Primary School Computing Policy: A baseline for outstanding practice September 2015 Review date: September 2016 Appendix KEY PRINCIPLES Teaching at Primrose Hill is Learning Centred, meaning
Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low
Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy
Saint Martin s Catholic Academy
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
Social Media Policy. Policies and Procedures. Social Media Policy
Policies and Procedures Social Media Policy 1 1. Introduction...3 2. Privacy settings and personal information.....3 3. Use of Social Media at Work.....4 4. Account Administrators and Login Details......4
[Name of School] E-safety policy
[Name of School] E-safety policy Adopted: Review date: Note: Blue boxes contain advisory notes which should be read and deleted. These indicate where schools need to make decisions or choices. This policy
1 The benefits of Internet access for education... 2. 2 Whole-Academy network security strategies... 2. 2.1 Hardware and software infrastructures...
CITY ROAD PRIMARY ACADEMY ACCEPTABLE AND RESPONSIBLE USE OF IT RESOURCES (INTERNET ACCESS AND EMAIL POLICY STAFF AND STUDENTS) Contents 1 The benefits of Internet access for education... 2 2 Whole-Academy
King David Primary School Staff Social Networking Policy
King David Primary School Staff Social Networking Policy This policy should be read in conjunction with other relevant policies e.g. school ICT Policy including acceptable or unacceptable usage, Disciplinary
Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.
Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring
esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2
Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...
Social Media Acceptable Use Policy
SAMPLE SOCIAL MEDIA POLICY RESPONSES To obtain a sense of how schools can address the use of social media in their policies, this fact sheet will examine sample policy responses. Below, we provide an outline