Abingdon Prep School. Anti-cyber bullying policy. This policy applies to all members of Abingdon Prep School including those in the EYFS.
|
|
- Austen Morris
- 7 years ago
- Views:
Transcription
1 Abingdon Prep School Anti-cyber bullying policy This policy applies to all members of Abingdon Prep School including those in the EYFS. Cyber-bullying is a specific form of bullying and reference should be made to the anti-bullying policy. What is cyber bullying? Cyber bullying can take many different forms and the table below sets out how technology can be used properly and how it can be used improperly in such a way that it becomes cyber bullying: Mobile Phones Instant Messaging Chat rooms Examples of proper use Keeping in touch by voice or text, taking and sending pictures and film, listening to music, playing games, going online and sending s. Useful in emergency situations and for allowing children a greater sense of independence. Text or voice chatting with friends online. A quick and effective way of keeping in touch even while working on other things. Groups of people around the world can text or voice chat live about common interests. For young people, this can be as easy way to meet new people and explore issues which they are too shy to talk about in person. Examples of Improper use which is bullying Sending nasty calls or text messages, including threats, intimidation and harassment. Taking and sharing humiliating images. Videoing other people being harassed and sending these to other phones or internet sites. Sending nasty messages or content. Using someone else s account to forward rude or mean messages via their contact list. Sending nasty or threatening anonymous messages. Groups of people deciding to pick on or ignore individuals. Making friends under false pretences people pretending to be someone they re not in order to get personal information that they can misuse in a range of ways e.g. by spreading secrets or blackmailing.
2 Web Cams Social Networking Sites Video Hosting Sites Virtual Learning Environments Gaming sites, Consoles and Virtual Worlds Sending electronic letters, pictures and other files quickly and cheaply anywhere in the world. Taking pictures or recording messages. Being able to see and talk to someone live on your computer screen. Bringing far-off places to life or video conferencing. Socialising with your friends and making new ones within online communities. Allowing young people to be creative online, even publishing online music. Personalising homepages and profiles, creating and uploading content. Accessing useful educational, entertaining and original creative video content and uploading your own. School sites, usually available from home and school, set up for tracking and recording student assignments, tests and activities, with message boards, chat and IM. Live text or voice chat during online gaming between players across the world, or on handheld consoles with people in the same local area. Virtual worlds let users design their own avatars a figure that represent them in the virtual world. Sending nasty or threatening messages. Forwarding unsuitable content including images and video clips, or sending computer viruses. Accessing someone else s accounting, e.g. to forward personal s or delete s. Making and sending inappropriate content. Persuading or threatening young people to act in inappropriate ways. Using inappropriate recordings to manipulate young people. Posting nasty comments, humiliating images/video. Accessing another person s account details and sending unpleasant messages, deleting information or making private information public. Groups of people picking on individuals by excluding them. Creating fake profiles to pretend to be someone else, e.g. to bully, harass or get the person into trouble. Posting embarrassing, humiliating film of someone. Posting inappropriate messages or images. Hacking into someone else s account to post inappropriate comments or delete schoolwork. Name-calling, making abusive / derogatory remarks. Players may pick on weaker or less experienced users, repeatedly killing their characters. Forwarding unwanted messages to other devices in the immediate vicinity.
3 How does cyber bullying differ from other forms of bullying? Cyber bullying can take place at any time in any location. Incidents can take place in the victim's own home, intruding into spaces that have previously been regarded as private and safe from other forms of bullying. The audience can be very large and reached rapidly. The difficulty in controlling electronically circulated messages means the scale and scope of cyber bullying can be greater than for other forms of bullying. Electronically-forwarded content is hard to control, and the worry of content resurfacing can make it difficult for the person being bullied to move on. The profile of the person being bullied and bully may not rely on traditional power imbalances a cyber bully may not be older, or physically stronger, or hold a position of greater authority than their victim. Unlike other forms of bullying, the target of the bullying will have evidence of its occurrence. The bully will leave a 'digital footprint' that can potentially be used as evidence against them. In some cases, incidents of cyber bullying may be unintentional. The person responsible may not realise that remarks are publicly accessible and persistent, or understand the amplified effect that technologies produce. They may not be fully aware of the potential seriousness or impact of their actions. Therefore prevention activities are key to ensuring the whole-school community clearly understands the serious consequences of cyber bullying, including sanctions. Prevention In order to minimise the chances of cyber bullying happening within the school day and to raise general awareness of cyber bullying we will: Ensure that all pupils are familiar with our E Learning Code of Conduct which will be explained to the pupils in an age-appropriate manner and shared with parents. Regularly teach and remind children how to remain vigilant when using technology. Raise awareness of staff and parents on how to keep children safe on the internet through training e.g. Childnet Not allow the use of personal electronic devices during school hours (eg mobile phones, tablets, laptops) unless given express permission by staff and in an appropriately supervised context and setting. Pupils have no access at all to social media websites on the school network and via the wireless network infrastructure A network wide internet filter is in place to prevent access to questionable sites or sites that promote peer to peer contact.
4 How might a member of staff become aware that cyber bullying is taking place? Cyber bullying or suspected cyber bullying may be communicated to staff directly by pupils, parents or members of the wider school community.staff may observe changes in behaviour that may indicate that a pupil is being cyber bullied. These include: Unwillingness to come in to school Displays of excessive anxiety - becoming withdrawn or quiet Failure to produce work / produce late work / produce poor quality work /produce work ruined by others Damage to or loss of personal property Reduced level of self-esteem / confidence Poor eye contact Dark conversation - suicide / running away from home or school. Procedures to follow if cyber bullying is reported, suspected or witnessed The procedures set out in the Anti-bullying policy are to be followed but in addition to those, the following procedures should also be put in place: - If a cyber bullying incident directed at a child occurs using or mobile phone technology either inside or outside of school time. Make sure the person knows not to retaliate or to return the message Secure and preserve any evidence Check the person knows simple ways to prevent it from happening again. e.g. by changing contact details, blocking contacts or leaving a chat room. Inform the sender s service provider Consider informing the police depending on the severity or repetitious nature of offence. - If malicious or threatening comments are posted on an Internet site about a pupil or member of staff or associates of the school: Inform and request the comments be removed if the site is administered externally Secure and preserve any evidence Endeavour to trace the origin and inform police as appropriate Any attempt to use ICT on which to put messages or images which are damaging to individual pupils, teachers, members of staff and associates of the school or which damage the reputation of the school in any way will be treated very seriously and exclusion, whether temporary or permanent is the likely consequence. Consequences of cyber bullying In addition to the consequences set out in Steps 1, 2 and 3 of the Prep Behaviour
5 Policy and Steps 1-5 in the Pre-prep Behaviour Policy, the following consequences may also be applied: A temporary or permanent ban on internet/computer use. When applicable, police or local authorities may be involved. If necessary, external agencies such as Social Networking or Member sites may be contacted and informed. Any attempt to use ICT to damage the reputation of other pupils, teachers, employees and associates of the school and of the school itself, will be treated very seriously. A Step Three Meeting (in accordance with the Prep Behaviour Policy) and a Headmaster s meeting (in accordance with Step 5 of the Pre Prep Behaviour Policy) will be called and exclusion, whether temporary or permanent will be the likely consequence, in accordance with the Exclusion Policy. Help Organisations: Advisory Centre for Education (ACE) Children's Legal Centre KIDSCAPE Parents Helpline (Mon-Fri, 10-4) Parentline Plus Youth Access Bullying Online Reviewed: September 2015 Date of next review: September 2016
Cyberbullying A whole-school community issue
Cyberbullying A whole-school community issue Introduction Today s children and young people have grown up in a world that is very different from that of most adults. Many young people experience the internet
More informationSeptember 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
More informationTAVISTOCK COLLEGE POLICIES & PROCEDURES
TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by
More informationAnti Bullying Policy
WEST HATCH HIGH SCHOOL THE BEST THAT I CAN BE Anti Bullying Policy Policy reviewed December 2015 Signed ANTI-BULLYING POLICY This policy takes full account of the school s legal obligations under the Education
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationGRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY
GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Approved: 4 September 2014 Review Date: Page 1 of 7 GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Introduction Schools have a duty of care for pupils and
More informationGuidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
More informationFinchley Catholic High School. Anti Bullying Policy
Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can
More informationCyber-bullying is covered by this policy: all members of the community need to be aware that
DUKE OF KENT SCHOOL A8 ANTI-BULLYING POLICY Aims and Objectives: Duke of Kent School values every individual in the community and believes each deserves to be treated with respect. Sensitivity to the feelings
More informationSocial Networking Policy
Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful
More informationSimon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationSibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationNetworking and Social Media Policy
Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools
More informationMobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 1. VISIT THE NUT HEALTH AND SAFETY POST www.teachers.org.uk. Camera Mobile Phones Health and Safety Issues
Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 1 VISIT THE NUT HEALTH AND SAFETY POST www.teachers.org.uk Camera Mobile Phones Health and Safety Issues Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 2 To view
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationCyber Safety and Anti Bullying Policy
Tarlee Primary School Cyber Safety and Anti Bullying Policy Policy Review: Due to the rapid speed of technological innovation, Internet technology and the schools use of technological resources that will
More informationWhat we can all do to prevent cyberbullying
Let s Fight It Together What we can all do to prevent cyberbullying A GUIDE TO USING LET S FIGHT IT TOGETHER Welcome to Let s Fight It Together. This resource packs aims to help children, young people,
More informationE-safety: Protecting your child online. Information for parents
E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools
More informationACTION AGAINST BULLYING POLICY
Page 1 of 13 ACTION AGAINST BULLYING POLICY We want our pupils to be: Eager, excited, curious and engaged in learning. Have a sense of self and are happy, confident and emotionally healthy. Able to co-operate
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More information4. The Importance of Internet Use in the Primary Curriculum
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
More informationJohn of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
More informationMobile Phones Acceptable Use Policy
Mobile Phones Acceptable Use Policy Date Approved by Governors: 22 5 14 Due for future review: Signed: Date: 22 5 14 Mobile Phones: Acceptable Use Policy 1. Purpose 1.1. The widespread ownership of mobile
More informationICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
More informationeffects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationAcceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
More informationGreat Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy
Great Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy November 2013 This policy was adopted on:... Date of last review:... Signed:... Great Horwood C.E. Combined School Page 1 Acceptable
More informationDulwich College ICT Acceptable Use Policy
Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These
More informationFIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
More informationICT Acceptable use Policy. Coláiste Mhuirlinne/ Merlin College Doughiska, Galway City.
ICT Acceptable use Policy. Coláiste Mhuirlinne/ Doughiska, Galway City. Ratified by the Board of Management on 27 th May, 2015 Table of Contents Introduction... 2 General... 2 Internet Use... 3 Email...
More informationANTI-BULLYING POLICY. Every ThreeYears. Ratified by Governors: January 2014 Review date: January 2017. One part of the Safeguarding Policy portfolio
ANTI-BULLYING POLICY Responsible Committee: Every ThreeYears Student & Community Ratified by Governors: January 2014 Review date: January 2017 Safeguarding Health & Safety Financial Equalities Legal One
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS
ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS Contents:- 1. College policy. 2. Roles and Responsibilities 3. College procedures. 4. College rules for internet use by students. 5.
More informationWELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY
WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within
More informationRoles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
More informationAnti Bullying Policy
BRABYNS PREPARATORY SCHOOL Anti Bullying Policy This policy applies all pupils in the school, including in the EYFS Created July 2014 Revised August 2015 Date for revision august 2016 Lee Sanders. Headteacher
More informationAnti Harassment and Bullying Policy
Anti Harassment and Bullying Policy Document Control Title : Anti Harassment and Bullying Policy Applicable to : All Staff and Executive Officers Date last reviewed : February 2014 Procedure Owner : People
More informationHow To Prevent Bullying At The Beaconsfield School
ANTI-BULLYING POLICY 2015 Approved by the Governing Body: 25 th November 2015 Approved by the Learning & Development Committee: 21 st October 2015 Approved by Leadership Team: 8 th October 2015 Review
More informationCyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationBlaenavon Heritage Voluntary Controlled Primary School
Blaenavon Heritage Voluntary Controlled Primary School ICT Policy 2014/15 BHVCPS Author: Mrs C Crew Date written: January 2014 Review: January 2014 Ratified: COG: Page 1 Introduction Purpose: Information
More informationCommon Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
More informationUTC READING Anti-Bullying Policy
UTC READING Anti-Bullying Policy Introduction Bullying may be defined as deliberately hurtful behaviour usually repeated over a period of time, where it is difficult for those bullied to defend themselves.
More informationFREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
More informationSaint Martin s Catholic Academy
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
More informationHelping to keep your children safe online
Helping to keep your children safe online Chat speak how many of these do you know? gr8 BRB DEGT LMIRL POS KPC P911 PAL PAW PIR Adults often have anxieties about new media Everything that s already in
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationSocial Network Protocol & Policy
Social Network Protocol & Policy Prepared by: Stoke HR Implementation Date: July 2015 Review date: July 2016 RAISING ASPIRATIONS. TRANSFORMING LIVES. Social Networking Protocol for Schools & Academies
More informationCyberbullying. How common is cyberbullying?
Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:
More informationInstant Messaging and Chat Rooms Play It Safe!
CMSGu2011-09 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Instant Messaging and Chat Rooms Play It Safe! National Computer Board Mauritius
More informationEASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationCybersafety and protocols for conducting online life?
Cybersafety and protocols for conducting online life? Sunderland is an exciting place to live. We lead the way in making use of services online. We are one of the most connected cities in the UK. Whatever
More informationFireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
More informationEMERSON PARK ACADEMY
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
More informationAcceptable Use of Internet and Digital Technology
Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB on: Reviewed policy shared with staff on: Policy to be reviewed again on: Committee responsible for review: Acceptable Use
More informationThe Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
More informationAnti-Bullying Policy September 2012
Anti-Bullying Policy September 2012 This policy is found in our School ethos, which provides a caring, friendly and safe environment for all members of our school community. CONTENTS Page 3 Section 1 Statement
More informationPolicies & Procedures. Moat Community College E-Safety Policy
Moat Community College E-Safety Policy Vision Statement Moat Community College embraces the positive impact and educational benefits that can be achieved through appropriate use of the Internet and associated
More informationANTI-BULLYING POLICY
Mount Pleasant Primary School ANTI-BULLYING POLICY Autumn Term 2014 (To be read in conjunction with the Behaviour Policy) Approved by: Anti-Bullying Co-ordinator Mrs S Ward (PSHE, E-Safety Co-ordinator)
More informationInternet, E-Safety & Acceptable Use Policy
Date March 2016 Review Date 2018-2019 Internet, E-Safety & Acceptable Use Policy The Internet is becoming as commonplace as the telephone or TV and its effective use is an essential life-skill. Unmediated
More informationKing David Primary School Staff Social Networking Policy
King David Primary School Staff Social Networking Policy This policy should be read in conjunction with other relevant policies e.g. school ICT Policy including acceptable or unacceptable usage, Disciplinary
More informationSocial Networking Policy
Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies
More informationINFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY
INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY Your access to, and use of, the Heathfield High School IT System must be - Only for school use with regard to your subject work. In accordance
More informationWoodfield School 2015 Anti Bullying & Cyber Bullying Policy
2015 Anti Bullying & Cyber Bullying Policy Woodfield School is a company limited by guarantee (company number 8905350, registered in England and Wales) that has its registered office at Woodfield School,
More informationInternet Safety. A guide to staying smart & safe online
Internet Safety A guide to staying smart & safe online What you will learn Privacy how to keep your information safe & secure Safety how to protect yourself & your family online It s not just about computers
More informationSocial Networking Protocol for Schools Managed Staff
Social Networking Protocol for Schools Managed Staff Created by HR Consultancy June 2010 1 Social Networking Protocol 2010 Contents 1. Purpose 2. Scope 3. School s Expectations 4. Safeguarding 5. Monitoring
More informationFAIRFIELD AREA SCHOOL DISTRICT
No. 249 FAIRFIELD AREA SCHOOL DISTRICT SECTION: PUPILS TITLE: BULLYING / CYBERBULLYING ADOPTED: REVISED: August 11, 2015 249. BULLYING / CYBERBULLYING 1. Purpose 2. Definitions The Board is committed to
More informationEanes Independent School District Responsible Use Guidelines for Technology
Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the
More informationPOLICY 5111 ANTI-BULLYING/HARASSMENT/HATE
POLICY 5111 Purpose/Introduction: The Kenosha Unified School District strives to provide a safe, secure and respectful learning environment for all students in school buildings, on school grounds, in school
More informationE-Safety Policy (Parent/Pupil) March 2013
E-Safety Policy (Parent/Pupil) March 2013 1 ICT, Internet, Intranet and E-Mail Policy (Parent/Pupil) 1. Policy statement The purpose of this document is to set out detailed guidance for parents of pupils
More informationesmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2
Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...
More informationTECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
More informationDevelopment / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
More informationAcceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationHAZING AND BULLYING (Harassment, Intimidation and Dating Violence)
HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications
More informationHome-School Agreement
Home-School Agreement Why do we have a Home-School Agreement? As a School we aim to provide an outstanding education, both within and beyond the classroom, which enables all our students to realise and
More informationNortheast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY
Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have
More informationAcceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
More informationCyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence
Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence Cyber Bullying: A Prevention Curriculum for Grades 6-12 What is Cyber Bullying: A Prevention Curriculum for Grades 6-12? Cyber
More informationWORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
More informationGodley Community Primary School. Anti-Bullying Policy
Godley Community Primary School. Anti-Bullying Policy Delivering Excellence in a Happy and Nurturing Learning Environment Bullying is action taken by one or more children with the deliberate intention
More informationMiddlesbrough College : We re better without bullying THE FUTURE IS OURS SAFE, FUN AND CONNECTED
Middlesbrough College : We re better without bullying THE FUTURE IS OURS SAFE, FUN AND CONNECTED ANTI-BULLYING WEEK 18-22 NOVEMBER 2013 What is Bullying? Middlesbrough College students define bullying
More informationICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
More informationElectronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)
Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to
More informationArchbishop Beck Catholic Sports College
Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety
More informationOXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
More informationE-Safety Awareness. Parents and Carers
E-Safety Awareness Parents and Carers Bullying online by people in my school year has left me with significant mental health issues for which I am now on medication and in therapy for. So it s really damaged
More informationAcceptable Use of Internet and Digital Technology
Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB: Autumn 2015 Reviewed policy shared with staff: Autumn 2015 Policy to be reviewed again: Autumn 2016 Committee responsible
More informationHow To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationBy Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
More informationSt Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
More informationChild & Vulnerable Adults Protection Policy 2009 2012
Child & Vulnerable Adults Protection Policy 2009 2012 Contents Introduction 3 Recruitment procedures 4 Responsible adults 5 Unaccompanied children 5 School pupils on work placements 5 Lost children 5 Family
More informationLesson Plan for Senior Secondary
Lesson Plan for Senior Secondary Introduction Purpose Introduce the National Day of Action against Bullying and Violence (NDA) campaign Explore the role of bystanders to bullying Investigate the theme
More information