Connaught School for Girls
|
|
- Jason Garrett
- 7 years ago
- Views:
Transcription
1 Connaught School for Girls Internet Access and School Computer Network Policy Date: September 2010 Date of Ratification by the Governing Body: September 2010 Date of Review: September 2012
2 Why is Internet access important? The purpose of Internet access in our school is to raise educational standards, to support the professional work of staff and to enhance the school s management information and administration systems. Access to the Internet is a necessary tool for staff and students. It is an entitlement for students who show a responsible and mature approach to its use. How will Internet use provide effective learning? Internet must only be used in school for educational purposes; Internet access will be provided by a supplier that provides a service designed for students. This will include filtering appropriate to the age of Students. This service is currently provided by the London Grid for Learning (LGfL), through the London Borough of Waltham Forest; Internet access will be planned to enrich and extend learning activities. Students will be given clear objectives for Internet use; Staff will select sites which will support the learning outcomes planned for students age and maturity; Students will be educated in taking responsibility for Internet access and the issues of e-safety. How will Students be taught to assess Internet content? Students will be taught ways to validate information before accepting that it is necessarily accurate; Students will be taught to acknowledge the source of information, when using Internet material for their own use; Students will be made aware that the writer of an or the author of a Web page might not be the person claimed; Students will be encouraged to tell a teacher immediately if they encounter any material that makes them feel uncomfortable. Access may be removed if students or staff are detected using any inappropriate websites including, pornographic, sexist, racist, or homophobic websites. How will be managed? StaffMail be used in school for educational purposes; Messages sent using should be regarded in the same way as messages written on school headed paper; The forwarding of chain letters will be banned, as will the use of inappropriate social networking sites.
3 How will publishing on the Web be managed? The Headteacher will delegate editorial responsibility to a member of staff to ensure that content is accurate and quality of presentation is maintained; The Website will comply with the school's guidelines for publications; All material must be the author's own work, or where permission to reproduce has been obtained, clearly marked with the copyright owner s name; The point of contact on the Website should be the school address and telephone number. Home information or individual identities will not be published; Photographs must not identify individual students. Group shots or pictures taken over the shoulder will be used in preference to individual passport style images; Full names will not be used anywhere on the Website, particularly alongside photographs; Written refusal to not allow the school to use photographs of students to promote the aims of the school on the Website, Prospectus or Newsletters is sought as students enter the school; The school website should reflect the ethnic diversity within the school How will Internet access be authorised? Internet access is a necessary part of the statutory curriculum. It is an entitlement for students based on responsible use; Connaught School for Girls students must apply for Internet access individually by signing the Acceptable Use Policy, with an explanatory letter countersigned by a parent or guardian; A record will be maintained of all staff and Students with Internet access. Persons will be removed from the record when access is no longer required, or is withdrawn. How will the risks be assessed? In common with other media such as magazines, books and video, some material available via the internet is unsuitable for students. The school will supervise students and take all reasonable precautions to ensure that users access only appropriate material. However, it is not possible to guarantee that unsuitable material will never appear on a PC screen. WSFG cannot accept liability for the material accessed, or any consequences thereof; The use of computer systems without permission or for purposes not agreed by the school could constitute a criminal offence under Computer Misuse Act 1990; Methods to identify, assess and minimise risks will be reviewed; The Headteacher, supported by the line manager for ICT, will ensure that the policy is implemented effectively.
4 How will the school ensure Internet access is safe? Students will be informed that Internet use will be supervised and monitored; The school will work in partnership with parents, the Local Authority, DFE and the Internet Service Provider (LGfL) to ensure systems to protect Students are reviewed and improved; Senior staff will ensure that occasional checks are made to ensure that the filtering methods selected are effective in practice; If staff or students discover unsuitable sites, the URL (address) and content will be reported to the Internet Service Provider via the ICT Technician or ICT Network Manager; Where minority languages are involved, appropriate measures will be used to ensure the process to select appropriate material is adequate. How will the security of school ICT systems be maintained? Security strategies will be discussed with the Local Authority. The ICT Network Manager will ensure that the system has the capacity to take increased traffic caused by Internet use; The security of the whole system will be reviewed with regard to threats to security from Internet access; Anti-virus protection will be installed and updated regularly; How will complaints regarding Internet use be handled? Responsibility for handling incidents will be given to senior members of staff; Students and parents will be informed of the complaints procedures; As with drugs issues, there may be occasions when the police must be contacted. Early contact will be made to establish the legal position and discuss strategies; A student may have , Internet or computer access denied for a period of time depending on the nature of the incident; How will staff and students be consulted? Rules for Internet access will be posted near computer systems. All staff including teachers, supply staff, classroom assistants and support staff, will be provided with the Internet Access Policy, and its importance explained; Parents' attention will be drawn to the Policy in the letter sent to parents, school newsletter and on the school Website; Assemblies and module on responsible Internet use will be included in the ICT programme.
5 Connaught School for Girls Rules for Responsible Use of the Internet and the School Curriculum Network Statement for Students The school has installed computers and Internet access to help our learning. These rules will keep everyone safe and help us be fair to others. In School: I will only use the Internet if I am supervised by an authorised person; I will use only my own login and password; I will ensure that my password is secure (a combination of letters and numbers being most secure) and secret; I will not access other people's files; I will use the computers to assist my learning; I will not attempt to visit inappropriate websites such as those that exhibit pornography, sexism, racism or homophobia; I will not attempt to use social networking sites; I will not listen to music unless it is required as part of my lesson; I will only people I know, or my teacher has approved; The messages I send will be polite and sensible; I will not give my home address or phone number, or arrange to meet someone, unless my parent, carer or teacher has given permission; To help protect other students and myself, I will tell a teacher if I see anything I am unhappy with or I receive messages I do not like; I understand that the school may view my school computer files and may monitor the Internet sites I visit; I agree that if I fail to follow the guidelines outlined above, my access to the Internet and/or the school computer network may be removed. Student Declaration I agree to follow the rules for responsible use of the school curriculum network, including the Internet. First Name. Surname. Signed. Tutor Group
6 Connaught School for Girls Use of the Internet and the School Curriculum Network Statement for Staff The computer system is owned by the school and is made available to students to further their education and to staff to enhance their professional activities including teaching, research, administration and management. The school's Internet Access Policy has been drawn up to protect all parties - the students, the staff and the school. The school reserves the right to examine or delete any files that may be held on its computer system and to monitor any Internet sites visited. Access must only be made via the authorised account and password, which must not be made available to any other person. Passwords must follow the school password policy (appendix to the internet / network policy). It is the responsibility of the user to ensure that they have logged off when they have completed their work; All Internet use should be appropriate to staff professional activities and/or the education of students; Any staff or student data to which access is given (through SIMS or school e-portal), must be kept private and confidential, except when it is deemed necessary by law or by school policy to disclose such information to an appropriate authority; The use of the Internet, , or any other media to access inappropriate materials such as pornography, racist or any other offensive material is forbidden; Activity that threatens the integrity of the school ICT systems, or that attacks or corrupts other systems, is forbidden; Use for financial gain, gambling, party political purposes, advertising or social networking is forbidden (note: social networking with current students included as friends/contacts is not allowed at any time); When using for professional purposes, StaffMail should be used; Users are responsible for they send and for contacts made that may result in being received; The same professional levels of language and content should be applied as for letters on headed paper, particularly as is often forwarded; Posting anonymous messages and forwarding chain letters is forbidden; Copyright of materials and intellectual property rights must be respected; Legitimate private interests may be followed out-of-school-timetable-hours, providing school use is not compromised (as above) and there are available computers for staff to conduct their professional work; The guidelines set out in this statement also apply to use of school ICT systems (StaffMail, London MLE-Fronter and SIMS access through the e-portal) out of school. Users that fail to follow the guidelines outlined above should expect to have their access removed and could be subject to disciplinary action. Such action could include a warning, a suspension, referral to Governors and / or the Local Authority and in the event of illegal activities the involvement of the police. Staff requesting Internet access should sign a copy of this Acceptable Internet Use Statement and return it to the ICT Network Manager. Thank you for your cooperation. Staff Declaration I have read and understand the school internet and network policy and the guidelines above. I agree to use the school ICT systems (in & out of school) within these guidelines. Full Name: Signed:. Role:. Date:.
7 Connaught Road Leytonstone London E11 4AB Tel: Fax: website: Headteacher Mrs. A. E. Betts June 2010 Dear Parent/carer Responsible Use of the Internet and the School Curriculum Network As part of your daughter s curriculum and the development of her ICT skills, Connaught School for Girls provides supervised access to the Internet. We believe that the effective use of the Internet is an essential skill for children as they grow up in the modern world. Although there are concerns about students having access to undesirable materials, we have taken positive steps to reduce this risk in school. Our school Internet provider operates a filtering system that restricts access to inappropriate materials. This may not be the case at home and we can provide references to information on safe Internet access if you wish (see the school website at for further information and support). Whilst every endeavour is made to ensure that suitable restrictions are placed on the ability of students to access inappropriate materials, the School cannot be held responsible for the nature or content of materials accessed through the Internet. The School will not be liable for any damages arising from your child s use of the Internet facilities. I would be grateful if you and your daughter would complete the slip below. The slip should be returned to your daughter s Form Tutor by Friday 11 th June Our rules for responsible use of the school curriculum network, including the use of the Internet, can be found on the reverse of this letter. Should you wish to discuss any aspect of Internet use then please do not hesitate to contact me. Yours sincerely Gareth Cross Deputy Headteacher Responsible Use of the Internet and the School Curriculum Network REPLY SLIP TO FORM TUTORS Parent/carer's declaration I give permission for my daughter to access the Internet in school on the terms set out in the above letter. Print Name. Signed... Date Student s declaration I agree to follow the rules for responsible use of the school curriculum network, including the Internet. Print Name. Signed... Form.
8 Rules for Responsible Use of the Internet and the School Curriculum Network The school has installed computers and Internet access to help our learning. These rules will keep everyone safe and help us be fair to others. All students at Connaught School for Girls have signed the following declaration. In School: I will only use the Internet if I am supervised by an authorised person; I will use only my own login and password; I will ensure that my password is secure (a combination of letters and numbers being most secure) and secret; I will not access other people's files; I will use the computers to assist my learning; I will not attempt to visit inappropriate websites such as those that exhibit pornography, sexism, racism or homophobia; I will not attempt to use social networking sites; I will not listen to music unless it is required as part of my lesson; I will only people I know, or my teacher has approved; The messages I send will be polite and sensible; I will not give my home address or phone number, or arrange to meet someone, unless my parent, carer or teacher has given permission; To help protect other students and myself, I will tell a teacher if I see anything I am unhappy with or I receive messages I do not like; I understand that the school may view my school computer files and may monitor the Internet sites I visit; I agree that if I fail to follow the guidelines outlined above, my access to the Internet and/or the school computer network may be removed.
9 Connaught School for Girls Use of the Internet and the School Curriculum Network Connaught School for Girls Password Policy APPENDIX Overview All users that have access to the school computer systems must adhere to the password policy defined below in order to protect the security of the network, protect data Integrity, and protect computer systems. Scope This policy applies to all staff and students of Connaught School for Girls who have any form of computer or application account that requires password access. Examples of accounts include: Workstation (desktop/laptop) School Network SIMS & SIMS Learning Gateway e-portal StaffMail system Internet-based services & hosted sites (e.g. EVOLVE, VT CPD online, Rosetta Stone) Please note: This list is not intended to be all-inclusive; it is simply provided for reference Purposes General Principles 1. Password construction, lifecycle and re-use parameters are aspects included within this password policy. 2. Passwords should not be based on well-known or easily accessible information, including personal information, nor should they be words commonly found within a standard dictionary. 3. Password expiration is monitored and maintained by the ICT Network Manager and specific automated policies that have been put into place at the domain servers. Three days prior to password expiration, users will receive a notice a login requesting if they wish to change their password. 4. Connaught School for Girls will use technical measures to ensure that users conform to the policy. 5. All passwords must conform to the guidelines outlined below. Password Construction Guidelines Minimum Requirement Passwords to access the school network must be 8 characters or more in length Guidance on constructing a Strong Password Strong passwords are more complex. Many internet services (e.g. EVOLVE demands the use of at least one number). Users should try to make their password complex: 1. Include at least one number (0-9) and a special character (!@# $%^&*). 2. Include a capitalized character 3. It is generally accepted that a longer password is significantly stronger than a shorter one. When creating long passwords, it is best to think of a pass phrase rather than a password. As an example: Myd0gh@sabrowncoat is considered to be a strong password. Note the substitution of a zero for the o in dog and the use of sign for a in has.
10 Password Lifecycle Guidelines Passwords will have a maximum age of three (3) months and a minimum age of one (1) day. As such, passwords must be changed every three (3) months and cannot be changed more frequently than once a day. The computer system will advise the user fifteen (15) days before the current password is due to expire. If the password expires because it has not been changed the computer system will not allow the user access until the password has been updated. Password Reuse Guidelines Passwords may be reused every 12th password renewal. As such, a new password is required for the first 11 expiries; thereafter the first password can be reused. A new password is deemed to have been created when at least one or more characters in a password have changed. It is recommended that a completely new password be used Each time a new password is required. Password Protection Guidelines 1. Passwords are to be treated as confidential information. Under no circumstances should a user to give, tell, or hint at their password to another person, including ICT staff, administrators, superiors, other co-workers, friends, and family members. 2. Passwords are not to be transmitted electronically over the unprotected Internet, such as via . However, passwords may be used to gain remote access through the school e-portal (SIMS Learning Gateway SSL-protected Web site), StaffMail or any other internet based services provided by the school (EVOLVE, VT CPD online, Rosetta Stone). 3. Users should not keep an unsecured written record of his or her passwords, either on paper or in an electronic file. If it proves necessary to keep a record of a password, then it must be kept in a controlled access safe if in hardcopy form or in an encrypted file if in electronic form. 4. Users should not use the Remember Password feature of applications. 5. Passwords used to gain access to school systems should not to be used as passwords to access non-school accounts or information. Similarly, passwords used to access personal, non-work related accounts should not to be used to access school ICT services. 6. Each application, system and data point should be protected by a different password where possible. The use of the same password to protect all access is strongly discouraged. 7. If a user either knows or suspects that his/her password has been compromised, this must be reported to the ICT Department and the password changed immediately. If the minimum aging requirement has not been met for the password, the IT department will reset the minimum aging for the account allowing the user to create a new password. 8. The ICT Department may attempt to crack or guess users passwords as part of its ongoing security vulnerability auditing process. If a password is cracked or guessed during one of these audits, the user will be required to change his or her password immediately.
St Vincent s Catholic Primary School e-safety Policy
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
More informationWilsthorpe Community School
Wilsthorpe Community School Online Safety Policy REVIEWED March 2016 Introduction This Online Safety Policy has been written by the school, building on LA policy and government guidance. It has been agreed
More informationSimon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
More informatione-safety Policy for Hertsmere Jewish Primary School
e-safety Policy for Hertsmere Jewish Primary School Reviewed by: Mrs R Wolman, Miss C Stephens and Miss G Geffin Reviewed on: February 2015 Date of Next Review: February 2016 Policy Review This policy
More informationSt Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
More information4. The Importance of Internet Use in the Primary Curriculum
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
More informationTrinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the
More informationPrimrose Hill School Internet Access Policy
Date: September 2014 Date of next review: September 2015 Primrose Hill School Internet Access Policy INTERNET ACCESS POLICY Euxton Primrose Hill s Internet Policy has been written by the Computing coordinator
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationWELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY
WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within
More informationEMERSON PARK ACADEMY
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
More informationInternet and Online Security Policy
Internet and Online Security Policy Policy Updated: Spring 2015 Adopted by Staff and Governors: Spring 2015 Date for Review: Spring 2016 1 Internet and Online Security Policy Contents 1 Aims and Objectives...
More informationE- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
More informationFREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
More informationACCEPTABLE USE POLICY BE SAFE USING THE COMPUTER
ACCEPTABLE USE POLICY BE SAFE USING THE COMPUTER We want you to feel safe all the time. Make sure you: o always keep your passwords a secret o only open pages which your teacher has said are OK o only
More informatione-safety Policy Broadclyst Community Primary School
e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy
More informationSaint Martin s Catholic Academy
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
More informationInternet Policy. Signed Designation Date Headteacher Chair of Governors
Internet Policy Signed Designation Date Headteacher Chair of Governors 1 Hythe Bay Internet Policy Our Internet Policy has been written by the school, building on the Kent NGfL policy and government guidance.
More informationJohn of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
More informationBerwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
More informationArchbishop Beck Catholic Sports College
Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety
More informationHow To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
More informationRoles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
More informationE-SAFETY POLICY. The Kingswinford School - a science college. December 2014. Every Child a Scientist. Page 1
The Kingswinford School - a science college E-SAFETY POLICY December 2014 Page 1 E-Safety Policy - Advice and Guidance Setting This guidance applies to all members of the school community (including staff,
More informationHusborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy)
Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy) What is E-Safety? E-Safety encompasses Internet technologies and electronic communications such as mobile
More informationE-SAFETY POLICY. Signed. for school. Signed for Governors. Date..
E-SAFETY POLICY Signed. for school Signed for Governors Date.. RATIONALE E-safety encompasses Internet technologies and electronic communications such as mobile phones as well as collaboration tools and
More informationInspire, Create, Achieve
Inspire, Create, Achieve Online Safety Policy Review November 2017 Page 1 Online Safety Policy Online Safety includes all internet use from electronic communications such as mobile phones, computers and
More informationThe Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
More informationInternet, E-Safety & Acceptable Use Policy
Date March 2016 Review Date 2018-2019 Internet, E-Safety & Acceptable Use Policy The Internet is becoming as commonplace as the telephone or TV and its effective use is an essential life-skill. Unmediated
More informationHavelock Academy Broadening Horizons
Havelock Academy Broadening Horizons Acceptable use of IT, e-safety and BYOD September 2014 M Trussell Director of IT September 2014 Purpose The purpose of this Acceptable Use of IT Policy (referred to
More informationDevelopment / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
More informationThe Crest Academy. E-Learning and ICT Policy. 1.0 Policy links to Mission, Aims and Values
The Crest Academy E-Learning and ICT Policy 1.0 Policy links to Mission, Aims and Values The Crest Academy is a multi-cultural, diverse learning environment at the heart of the community. We promote care
More informationST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS
ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS Contents:- 1. College policy. 2. Roles and Responsibilities 3. College procedures. 4. College rules for internet use by students. 5.
More informationRecording and Using Images of Children
Children s Services Recording and Using Images of Children Information and Guidance Photographs Video Websites Webcams Produced by Sefton Council Children s Services for use in Sefton schools September
More information1 The benefits of Internet access for education... 2. 2 Whole-Academy network security strategies... 2. 2.1 Hardware and software infrastructures...
CITY ROAD PRIMARY ACADEMY ACCEPTABLE AND RESPONSIBLE USE OF IT RESOURCES (INTERNET ACCESS AND EMAIL POLICY STAFF AND STUDENTS) Contents 1 The benefits of Internet access for education... 2 2 Whole-Academy
More informationManaging e-mail at Winton Primary School
Managing e-mail at Winton Primary School This school: Does not publish personal e-mail addresses of pupils or staff on the school website. We use anonymous or group e-mail addresses, for example info@schoolname.la.sch.uk
More informationTHE FULBRIDGE ACADEMY POLICY ON THE USE OF CAMERAS (FILMING AND PHOTOGRAPHY)
THE FULBRIDGE ACADEMY POLICY ON THE USE OF CAMERAS (FILMING AND PHOTOGRAPHY) There will be occasions during the year where parents/carers and the Academy will wish to take photographs or make a video recording
More informationThe Internet Acceptable Use Policy (for parents and children)
Contact: Susan Seale The Internet Acceptable Use Policy (for parents and children) This policy is made available via the school website, is provided to all parents (current and prospective) in the office,
More informationRelated Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities
Category Security Document Name e-safety Procedures Accountable Body Brantridge School Governing Body Reference SY.P2.02 Date Ratified Version 2.1 Last Update March 2015 Related Policies & Documents Document
More informationAcceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
More informationE-Safety Policy & Procedures
E-Safety Policy & Procedures Version Policy Originator: Equality Impact Assessed: Approved by: SMT Date Approved: April 2015 Review Interval: Annually Last Review Date: - Next Review Date: April 2016 Audience:
More informationE-Safety and Acceptable Use Policy
E-Safety and Acceptable Use Policy This policy has been written in consultation with pupils and staff so that they understand that there are dangers associated with Internet use, and they know what behaviour
More informationCardinal Heenan Catholic High School
Cardinal Heenan Catholic High School E-Safety policy Approved by Full Governing Body: July 2015 Reviewed: Jul 2015 Signature (Chair of Governors): Next Review Date: Summer 2017 Key people in school Deputy
More informationBANK VIEW HIGH SCHOOL
BANK VIEW HIGH SCHOOL POLICY & PROCEDURES FOR E-SAFETY Chair of Governors Date./ / 20. Review Date./ / 20. Bank View High School E-Safety Policy INTRODUCTION Our policy applies to all students, staff,
More informationProtocol for Acceptable Use of Internet and Email by Staff E-Safety Procedures Safeguarding & Child Protection Policy
Category Document Name Accountable Body Security E-Safety Policy RADIUS Trust Reference SY.P2 Date Ratified 11 th December 2014 Version 3.1 Last Update 31 st March 2015 Related Documents Document Protocol
More information1. Introduction. 2. Roles & Responsibilities. Governing Body. Headteacher
Category Security Document Name E-safety Procedures Accountable Body Grafham Grange School Governing Body Reference SY.P2.01 Date Ratified 27 th August 2015 Version 1.0 Last Update August 2015 Related
More informationE-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school.
E-Safety Policy Development / Monitoring / Review of the policy This policy applies to all members of the school (including staff, students / pupils, volunteers, parents / carers, visitors, community users)
More informationE Safety Policy. 1.0 Background
E Safety Policy 1.0 Background New technologies have become integral to the lives of children and young people in today s society, both within the UTC and in their lives outside the UTC. The internet and
More informationReviewed: 21 March 2016
Reviewed: 21 March 2016 Next Review Autumn 2017 School Photography Policy 1. Background At Good Shepherd Primary School we recognise that photography is a useful tool, and it is used routinely in many
More informationSibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationInternet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
More informationSTEP Academy Trust E-Safety and Data Security Policy
STEP Academy Trust E-Safety and Data Security Policy Date of Policy: July 2015 Review: July 2018 Contents Introduction Computer viruses Data security E-safety in the curriculum Managing the internet Mobile
More informationBYOD Policy 2016 Bring Your Own Device Acceptable Use Policy
BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy Approved by Leadership Team 27 th April 2016 Approved by the Governing Body: 18 th May 2016 Review Due: May 2017 Rationale The Beaconsfield
More informationE-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy
E-Safety Policy Reviewed and Adopted: July 2014 Reviewed by: HT/ LTS Next Review: July 2015 Annual Policy 1 1. Introduction Internet is an essential element of life in 21st Century; it is also a part of
More informationStudent Laptop User Charter
Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both
More informationWitton Middle School
Witton Middle School e-safety Policy This e-safety Policy has been put together using guidance from the Worcestershire Local Authority (LA) and is based on the guidance provided by Becta. Our Vision Witton
More informationRoskear Primary & Nursery School. E-Safety Policy
E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed
More informationwww.esafety.lgfl.net
Name of School Hallsville Primary Policy review Date Dec 09 Date of next Review Dec 2010 Who reviewed this policy? Keri Edge Vince Walker Sonny Young Ann Jordan Policy: managing e-mail How will e-mail
More informationMEDWAY PUBLIC SCHOOLS Medway, MA. Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12
MEDWAY PUBLIC SCHOOLS Medway, MA Policy #21-A Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12 The District s goal in providing computer network technology and Internet access
More informationSchool Technical Security Policy
Approved by Governing Body School Technical Security Policy January 2015 Signed (Chair) E-Safety Governor Dave Black Mark Staker Next Review January 2016 1 School Technical Security Policy Template (including
More informationJOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT
JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.
More informationAcceptable Use Policy - Staff
Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education
More informationMODEL CHILD PROTECTION POLICY
Fact Series Child Protection Policy (Model) version 2.2 July 2009 MODEL CHILD PROTECTION POLICY NODA Headquarters regularly receives requests from affiliated societies for advice about implementing a Child
More informationSWGfL E-Safety School Template Policies
Ravensmead School Technical Security Policy Introduction Effective technical security depends not only on technical measures, but also on appropriate policies and procedures and on good user education
More informationE-Safety Policy for Childcare Settings 1
E-Safety Policy for Childcare Settings 1 Reviewed October 2012 Introduction ICT, digital and mobile technology resources are now regarded as essential to support learning, teaching and personal and social
More informationSydney Technical High School
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
More informationBring Your Own Device Program: User Charter
Bring Your Own Device Program: User Charter Turramurra High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. The wireless network and
More informationPasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
More informationSt Edward s Church of England Academy. E-Safety Policy
St Edward s Church of England Academy E-Safety Policy Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and
More informationCYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL
CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important
More informationHow To Use The School Network Safely
Policy Document Information and Communication Technology and E-Safety Acceptable Use Policy Mission Statement The school is committed to the use of ICT across the curriculum and to providing all students
More informationAcceptable Use of Internet and Digital Technology
Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB on: Reviewed policy shared with staff on: Policy to be reviewed again on: Committee responsible for review: Acceptable Use
More informationAuthorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together
Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:
More informationStrathfield Girls High School Bring your Own Device User Charter
Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.
More information[Name of School] E-safety policy
[Name of School] E-safety policy Adopted: Review date: Note: Blue boxes contain advisory notes which should be read and deleted. These indicate where schools need to make decisions or choices. This policy
More informationInternet Use and E-safety Policy
Internet Use and E-safety Policy Date Policy due to be reviewed: July 2016 Committee Responsible for Policy: Full Governing Body Committee Internet use and E-safety Policy 2015-16 Page 1 of 11 Internet
More informationDigital Device LOAN CHARTER
Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to
More informationAcceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
More informationSPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
More informationStudent use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
More informationE-Safety Policy (Parent/Pupil) March 2013
E-Safety Policy (Parent/Pupil) March 2013 1 ICT, Internet, Intranet and E-Mail Policy (Parent/Pupil) 1. Policy statement The purpose of this document is to set out detailed guidance for parents of pupils
More informationACCEPTABLE USE OF COMPUTERS IN WILTSHIRE LIBRARIES
ACCEPTABLE USE OF COMPUTERS IN WILTSHIRE LIBRARIES Policy Statement Introduction 1. Wiltshire Libraries provide access to the Internet and other computer facilities to support the educational, recreational
More informationCARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
More informationBLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY
Acceptable Use Policy Educational Purpose The computer system in Blackrock College has been established for a limited educational purpose. The term "educational purpose" includes classroom activities,
More informationE-Safety Policy Last reviewed 2012 Updated October 2014
E-Safety Policy Last reviewed 2012 Updated October 2014 Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and
More informationAcceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
More informationData Protection and Information Security Policy and Procedure
Data Protection and Information Security Policy and Procedure Document Detail Category: Data Protection Authorised By: Full Governing Body Author: School Business Manager Version: 1 Status: Approved May
More informationPolicy for Staff and Post 16 Student BYOD (Bring Your Own Device)
Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...
More informationDeputy Head Acting Head of Care ICT Manager Director of Social Care Estates Manager. Richard Green Lyn Henwood Tyrone da Silva Denise Banks Rob Taylor
Chailey Heritage Foundation encompasses; Chailey Heritage School Chailey Heritage Residential Futures@Chailey Heritage Simon Yates Richard Green Lyn Henwood Tyrone da Silva Denise Banks Rob Taylor Headteacher
More informationACCEPTABLE USE OF TECHNOLOGY
IIBE Page 1 ACCEPTABLE USE OF TECHNOLOGY Internet and computer network and non-network access is available to authorized students, teachers, and other staff in the. Albemarle County Public Schools primary
More informationKensington Primary School. Use of Photographic Images of Children
Kensington Primary School Use of Photographic Images of Children Use of Photographic Images of Children Introduction Kensington Primary School welcomes positive publicity. Images* of children adds colour,
More informationDene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
More informationICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
More informationSt Michael s CE (Aided) Primary School School Policy for the Safe Use of Children s Photographs
St Michael s CE (Aided) Primary School School Policy for the Safe Use of Children s Photographs Introduction Schools need and welcome publicity. Children s photographs add colour, life and interest to
More informationLa Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy
LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology
More informationSUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY DATE: MARCH 2015 REVISION DATE: MARCH 2017
SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY 1 DATE: MARCH 2015 REVISION DATE: MARCH 2017 Background / rationale New technologies have become integral to the lives of children
More informationSchool Information Security Policy
School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...
More informationInformation Technology Security Awareness Training. MIS Department
Information Technology Security Awareness Training Introduction Who am I? Why are we here? Ensure confidentiality of data Protect stability of IT infrastructure Shield District from legal liability Satisfy
More informationInformation governance guidance for schools
Information governance guidance for schools Guidance Guidance document no: 186/2015 Date of issue: September 2015 Information governance guidance for schools Audience All staff, governors and learners
More information