ICT acceptable use policy for pupils
|
|
- Julie Byrd
- 7 years ago
- Views:
Transcription
1 ICT acceptable use policy for pupils Policy area Safeguarding Relevant statutory regulations ISSRs, Part 3; NMS 12 Author SPA ST Lead Director of Finance and Administration Version Last updated 08/12/2015 Next review February 2017
2 ICT acceptable use policy for pupils 1 Aims 1.1 The Document provides guidance for the use of ICT by pupils. 2 Introduction 2.1 All Pupils should carefully read the slip below and return the bottom part to their tutor. 3 Scope of this policy 3.1 This policy applies to all members of our school community, including boarders. This policy and the acceptable use documents for ICT for pupils applies to all computers fully or partially owned or operated by Roedean School and to any computer used on its premises whether or not connected to the school network. This includes: the voice and data networks that connect them all devices connected to these computers and networks the hardware and software associated with these systems the information managed by these systems 3.2 Roedean School is fully committed to ensuring that the application of this policy is nondiscriminatory in line with the UK Equality Act Further details are available in the school s Equal opportunities policy. 4 General 4.1 Pupils are responsible for good behaviour on the Internet, just as they are in a classroom or a school corridor. General school rules apply. 4.2 The following are not permitted within the school environment: (e) (f) (g) (h) (i) (j) (k) (l) (m) Sending or displaying offensive messages or pictures. Using obscene language. Harassing, insulting bullying or attacking others. Publishing of defamatory comments of any person or organisation. Damaging computers, computer systems or computer networks. Violating any Intellectual Property Laws, for example copyright. Using others passwords or accounts. Hacking into others folders, work or files for any reason. Intentionally wasting limited resources, including printer ink and paper. Hacking or attempt to hack; it is illegal in the UK. Hacking includes unauthorised access to files as well as changing/deleting files. This means you are not allowed to trespass in folders, files or work that do not belong to you and you are not allowed to log on as anyone else - even with their permission. Spamming. (Spam is the junk often sent to many people as a group.) Downloading or installing any software that may violate copyright/intellectual Property laws. 1.1 Accessing inappropriate material for your age or emotional maturity. 1/7 ICT acceptable use policy for pupils (2015.2)
3 (n) (o) (p) If writing a blog or website entry: do not use photos of any individual or group without their prior permission, do not use any names or reveal any personal details and make no remarks about anyone other than yourself. Girls are reminded that ownership of these sites may rest with an external company and not with the author, e.g. someone else can use again anything you have written. These sites are randomly checked by staff members. It is school policy that no images of the school or its staff may be used without prior permission from the Head. Making use of the wireless networking facilities in the school in order to use your laptop at a time and/or place which may either disturb others or disrupt your own ability to work properly during the school day. You must not bring the school into ill repute. 4.3 If any of these actions occur outside of the school environment in a manner which affects members of the school community, Roedean may deem it appropriate to respond in the interests of safeguarding all the pupils in its care. 5 Sanctions 5.1 Violations of the above rules will result in a temporary or permanent ban on internet/computer use. 5.2 Your parents/careers will be informed. 5.3 Additional disciplinary action may be added in line with existing practice on inappropriate language or behaviour. 5.4 When applicable, police or local authorities may be involved. 5.5 If necessary, external agencies such as Social Networking or Member sites may be contacted and informed. 6 Guidance for acceptable internet use 6.1 The Internet, primarily, is provided for pupils to conduct research and back-up their work. Access is a privilege, not a right and that access requires responsibility. Individual users of the Internet are responsible for their behaviour and communications over the network. Users must comply with school standards and honour the agreements they have signed. 6.2 Pupils must not give personal information to anyone on the internet or by and they must not view, upload or download, or send by , any material which may infringe copyright, any other Intellectual Property or is likely to be unsuitable for children or the school. This applies to any material of a violent, dangerous or racist nature or containing inappropriate sexual content. If they are unsure, they must ask a teacher. 6.3 Staff may review files and communications to ensure that users are using the system responsibly. Users should not expect that files stored on servers or storage media are always private. During school, teachers will guide pupils towards appropriate materials. Outside of school, families bear responsibility for such guidance as they must also exercise with information sources such as television, telephones, movies, radio and other potentially offensive media. 6.4 Pupils must be polite and appreciate that other users might have different views than their own. The use of strong language, abusive language or aggressive behaviour is not allowed. Pupils must not write anything on a website or send by anything which could be offensive and/or defamatory of any person or organisation. They must not use the internet in or out of school to bully, threaten or abuse other pupils and they must not use the internet in or out of school for any ICT acceptable use policy for pupils (2015.2) 2/7
4 purpose that may bring the school into disrepute. In addition, when using , pupils should also be aware: should be written carefully and politely, particularly as messages may be forwarded or printed and be seen by unexpected readers Users are responsible for they send and for contacts made Anonymous messages and chain letters are not permitted Do (e) (f) (g) (h) (i) (j) (k) (l) If anything you come across on the Internet offends you in any way please tell a member of staff. If anything someone else is doing or looking at using a computer offends you in any way, tell a member of staff. Change your password regularly - every 3 months. Check your school account daily. Teachers use to communicate with you. Let ICT staff know if you are receiving lots of unwanted s or if an you are expecting does not arrive. Inform the ICT support desk of any viruses. Always log off when leaving the machine - your account is your responsibility. If the ICT department feel you are spending too long on the Internet, your access will be withdrawn for a period of time. (You will be warned by your tutor, if this is likely to happen.) Limit your Internet time per day you may be making good use of the Internet but should not spend hours at one sitting in front of a computer screen; you are being monitored by the school, but you must monitor yourself too. It is easy to become addicted to time online, ing or gaming. Be careful that you think about your own behaviour and about time management; talk to your tutor, your house staff or your Senior Tutor if you are worried about yourself or about someone else. We advise you to install anti-virus software on your machine(s) and keep it regularly updated. There is a recommended specification for laptops, see the Laptop Advice for Parents document. Keep regular back-ups of all work that you do on your laptop or other device, this is especially important if the work is assessed coursework. Don t (e) Don t store unnecessary files such as personal photos, animations, music files, or out of date coursework on the network. These files should be held on personal storage, such as flash memory or CD. Do not give your password to anyone (including friends or teachers). Do not allow anyone else to use your account. Remember that the account belongs to Roedean School and is for your use only. Your account remains active for the duration of your time at Roedean. Do not disclose any personal information using ICT such as your age, your nationality, your mobile phone number, the school s name, or any payment card details, such as a credit/debit card (if you have one). ICT includes , chat rooms and texting unknown mobile phone numbers. Do not eat or drink near a computer for obvious health and safety reasons. 3/7 ICT acceptable use policy for pupils (2015.2)
5 Facts (e) (f) (g) Filtering software is used to filter out inappropriate sites and images but be aware that there is no perfect system for doing this. ICT support staff can and may delete inappropriate files from your account, such as games, personal photographic or sound files if a problem arises. Any information or file held or created on the Roenet system is the copyright of Roedean. Your school account belongs to Roedean. Information, documents, parts of documents, images on the web belong to someone else. You may be breaking copyright laws if you use or include them in your work. Plagiarism is a serious offence. You should acknowledge by reference anything that you use in your work that you have taken from another source including web sites, s, and text books (see the Roedean Behaviour Policy). Internet access is switched off during the summer term 21:00 Upper Three, 21:30 Lower Four, 21:30 Upper Four, 22:00 Lower Five, 22:30 Upper Five and Sixth Form access stops overnight at midnight. During the other terms internet access for L4 & U5 finishes 30 minutes earlier. 7 Social networking and online bullying 7.1 The term social networking refers to any website or digital resource designed to facilitate social interaction between people in either private or public online spaces. 7.2 Online bullying, e-bullying or cyber bullying, is defined as the use of information and communication technologies such as , [mobile] phone and text messages, instant messaging, defamatory personal websites and defamatory personal polling websites, to support deliberate, repeated, and hostile behaviour by an individual or a group, that is intended to harm others. 7.3 If a pupil is being bullied online, she should immediately seek help from a teacher, parent or carer. They should not respond to the messages, but should keep a detailed diary recording information such as the content of the message, the date, the time, the caller ID, username, or address, and whether the number was withheld or not available. If space permits, the messages should also be stored on the phone, or in the account, in case they are needed later as evidence. 7.4 Online bullying is considered as serious as any other form of bullying, and similar sanctions will be applied, as outlined in the School s Preventing and tackling bullying policy. 8 Text messaging/mobile phones 8.1 Pupils are advised to be careful about giving out their mobile phone number, and to tell those who have their number to never pass it on. More information is available in the Mobile phone acceptable use policy for pupils. 9 Copyright 9.1 Copyright and intellectual property rights must be respected. 10 Use of personal devices on the school network 10.1 Personal devices used within the school site, or connected to the school network, are subject to the same policies and procedures as the school s own computers. ICT acceptable use policy for pupils (2015.2) 4/7
6 11 Use of portable storage items 11.1 Portable storage items are only used for items which are relevant to school work 11.2 Pupils must not knowingly introduce unauthorised executable files and other applications from their portable storage items 11.3 Pupils must not deliberately introduce damaging, self-propagating, or otherwise harmful software into a machine or a network 12 Data security 12.1 Information held on the school s computer systems may only be accessed with proper authorisation and if the information is pertinent to school work Under no circumstances should personal or other confidential information held on computer be disclosed to unauthorised persons The unauthorised access to and/or unauthorised modification of data is a criminal offence under the Computer Misuse Act Data protection 13.1 Roedean School maintain a notification to the Information Commissioner s Office in compliance with the Data Protection Act This notification is held on a public register and contains details of the organisations holding and processing of personal data. The Data Controller for the Trust will be informed of all collections of personal data through the annual audit. Personal data shall be obtained and processed fairly and lawfully, held for specified lawful purpose(s), not used or disclosed in a way incompatible with the purpose(s), adequate, relevant and not excessive for the purpose(s), accurate and up to date, not kept longer than necessary, available to the data subject and be kept secure. Pupils are told that all data and correspondence, including messages, held by the school or academy may be provided to a data subject, internal or external, in the event of a subject access request. 14 Passwords 14.1 Passwords protect school and academy systems from access by unauthorised people. Therefore network passwords should never be given to anyone else without departmental manager s permission. Procedures are in place on systems to ensure users change passwords on a regular basis Your password must meet these requirements: The password should be least six characters long. The password should contain characters from at least three of the following four categories: English uppercase characters (A Z) English lowercase characters (a z) Base 10 digits (0 9) Non alphanumeric (For example:!, $, #, or %) 5/7 ICT acceptable use policy for pupils (2015.2)
7 15 How to report misuse or accidental access of inappropriate materials 15.1 Misuse or accidental access of inappropriate materials should be reported directly to the IT Manager or a member of the school leadership team. ICT acceptable use policy for pupils (2015.2) 6/7
8 PUPIL I have read, understood and agree to abide by the rules and guidelines for acceptable ICT use stated in the Roedean ICT Acceptable Use Policy. I understand the consequences if I do not. Name: Signed: Date: Tutor Group: PARENT I have read alongside my child, understood, and agree that my child will abide by the rules and guidelines for acceptable ICT use stated in the Roedean ICT Acceptable Use Policy. I understand the consequences if they do not. Name: Signed: Date: 7/7 ICT acceptable use policy for pupils (2015.2)
ICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
More informationSibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
More informationST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS
ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS Contents:- 1. College policy. 2. Roles and Responsibilities 3. College procedures. 4. College rules for internet use by students. 5.
More informationSaint Martin s Catholic Academy
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
More information4. The Importance of Internet Use in the Primary Curriculum
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationHow To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
More informationInformation Systems Acceptable Use Policy for Learners
Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs
More informationStudents are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
More informationFREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
More informationStudents KS2-3 Acceptable Use Policy
Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions
More informationAcceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
More informationAcceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
More informationSimon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
More informationAcceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
More informationJohn of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
More informationArchbishop Beck Catholic Sports College
Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety
More informationTECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationAcceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
More informationHow will pupils gain access to the Internet and VLEs at Saintfield High School?
SAINTFIELD HIGH SCHOOL POLICY FOR THE ACCEPTABLE USE OF THE INTERNET AND VIRTUAL LEARNING ENVIRONMENTS What is the Internet? The Internet is an electronic information highway connecting many thousands
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationRoles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
More informationDulwich College ICT Acceptable Use Policy
Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These
More informationAcceptable Use of Internet and Digital Technology
Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB on: Reviewed policy shared with staff on: Policy to be reviewed again on: Committee responsible for review: Acceptable Use
More informatione-safety Policy Broadclyst Community Primary School
e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy
More informationICT Acceptable use Policy. Coláiste Mhuirlinne/ Merlin College Doughiska, Galway City.
ICT Acceptable use Policy. Coláiste Mhuirlinne/ Doughiska, Galway City. Ratified by the Board of Management on 27 th May, 2015 Table of Contents Introduction... 2 General... 2 Internet Use... 3 Email...
More informationBerwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
More informationThe Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
More informationResponsible Computer Use Policy for Students
Responsible Computer Use Policy for Students Introduction By using the Sheldon College Network and ICT Services students agree to accept the terms and conditions outlined in this document. This policy
More informationST MARY S COLLEGE, AUCKLAND POLICY ON USE OF INFORMATION & COMMUNICATION TECHNOLOGY (ICT)
ST MARY S COLLEGE, AUCKLAND POLICY ON USE OF INFORMATION & COMMUNICATION TECHNOLOGY (ICT) Rationale: 1. As information that can be accessed on the ICTs is uncensored, this policy will ensure that material
More informationVail School District Acceptable Use Policy 2015 2016
Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will
More informationDevelopment / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
More informationAcceptable Use Policy - Staff
Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education
More informationSUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY DATE: MARCH 2015 REVISION DATE: MARCH 2017
SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY 1 DATE: MARCH 2015 REVISION DATE: MARCH 2017 Background / rationale New technologies have become integral to the lives of children
More informationINFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY
INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY Your access to, and use of, the Heathfield High School IT System must be - Only for school use with regard to your subject work. In accordance
More informationAuthorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together
Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:
More informationICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
More informationWORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationDene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
More informationE- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
More informationCardinal Heenan Catholic High School
Cardinal Heenan Catholic High School E-Safety policy Approved by Full Governing Body: July 2015 Reviewed: Jul 2015 Signature (Chair of Governors): Next Review Date: Summer 2017 Key people in school Deputy
More informationBox Hill Senior Secondary College/MYSC
Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication
More informationWakefield Public Schools Technology Acceptable Use Policy
Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of
More informationFaculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy
Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized
More informationStudents Acceptable Use Policy for Electronic Resources Rules Summary
Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must
More informationSAN BERNARDINO CITY UNIFIED SCHOOL DISTRICT Employee Technology Acceptable Use Agreement
SAN BERNARDINO CITY UNIFIED SCHOOL DISTRICT is providing employees access to the district s electronic network. This network includes Internet access, computer services, videoconferencing, computer equipment
More informationAuthorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
More informationSchool Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
More informationBROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
More informationLINCOLN COLLEGE INTERNET, E-MAIL, AND COMPUTER ACCEPTABLE USE POLICY
LINCOLN COLLEGE INTERNET, E-MAIL, AND COMPUTER ACCEPTABLE USE POLICY POLICY IT/PO/1 SPONSOR IT Manager Last formal review date: March 2012 Next formal review date: March 2013 Impact Assessed 17 April 2012
More informationDigital Device LOAN CHARTER
Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to
More informationSt Edward s Church of England Academy. E-Safety Policy
St Edward s Church of England Academy E-Safety Policy Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and
More informationRoskear Primary & Nursery School. E-Safety Policy
E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed
More informationTrinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the
More informationEMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
More informationHow To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
More informationComputer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
More informationFIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
More informationMarion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
More informationInternet, E-Safety & Acceptable Use Policy
Date March 2016 Review Date 2018-2019 Internet, E-Safety & Acceptable Use Policy The Internet is becoming as commonplace as the telephone or TV and its effective use is an essential life-skill. Unmediated
More informationBeaumont Public Library Computer Usage Policies
Beaumont Public Library Computer Usage Policies Information contained in this document is on internet safety, use guidelines, internet filtering, and wireless internet. The Beaumont Public Library, in
More informationEanes Independent School District Responsible Use Guidelines for Technology
Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the
More informationUNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More informationPlymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014
Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014 Why Bring Your Own Device? Technology is now an essential part of education. To be able to live,
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More informationOXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
More informationE-Safety Policy (Parent/Pupil) March 2013
E-Safety Policy (Parent/Pupil) March 2013 1 ICT, Internet, Intranet and E-Mail Policy (Parent/Pupil) 1. Policy statement The purpose of this document is to set out detailed guidance for parents of pupils
More informationBYOD Policy 2016 Bring Your Own Device Acceptable Use Policy
BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy Approved by Leadership Team 27 th April 2016 Approved by the Governing Body: 18 th May 2016 Review Due: May 2017 Rationale The Beaconsfield
More informationAcceptable Use of Internet and Digital Technology
Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB: Autumn 2015 Reviewed policy shared with staff: Autumn 2015 Policy to be reviewed again: Autumn 2016 Committee responsible
More informationREGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
More informationCARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
More informationR 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationSt Vincent s Catholic Primary School e-safety Policy
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
More informationJOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT
JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.
More informationINTERNET AND EMAIL POLICY
Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy
More informationE Safety Policy. 1.0 Background
E Safety Policy 1.0 Background New technologies have become integral to the lives of children and young people in today s society, both within the UTC and in their lives outside the UTC. The internet and
More informationICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
More informationAcceptable Network Usage Policy
Acceptable Network Usage Policy Purpose: The Lumen Christi Catholic College computer network is provided for staff and students to facilitate resource sharing, innovation and communication. All students
More informationWELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY
WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within
More informationMobile Phones Acceptable Use Policy
Mobile Phones Acceptable Use Policy Date Approved by Governors: 22 5 14 Due for future review: Signed: Date: 22 5 14 Mobile Phones: Acceptable Use Policy 1. Purpose 1.1. The widespread ownership of mobile
More informationPROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationCYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL
CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important
More informationCalwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement
111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use
More informationICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationHow To Use Social Media At St James Anglican School
P o l i c i e s n P r o c e d u r e s n I n f o r m a t i o n T o t a l n u m b e r o f p a g e s 2 P o l i c y C r e a t i o n D a t e : 2 4 S e p t e m b e r 2 0 1 4 P o l i c y R e v i e w D a t e :
More informationPolicy No: 2-B8. Originally Released: 2001. Date for Review: 2016
Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for
More informationE-Safety Policy & Procedures
E-Safety Policy & Procedures Version Policy Originator: Equality Impact Assessed: Approved by: SMT Date Approved: April 2015 Review Interval: Annually Last Review Date: - Next Review Date: April 2016 Audience:
More informationInformation & Communications Technology Usage Policy Olive AP Academy - Thurrock
Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures
More informationRules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
More informationesmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2
Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...
More informationThe Fulham Boys School ipad Acceptable Use Policy, Procedures and Information
The Fulham Boys School ipad Acceptable Use Policy, Procedures and Information Except where specifically stated otherwise, the policies, procedures and information within this document apply to all ipads
More informationEMERSON PARK ACADEMY
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
More informationHusborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy)
Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy) What is E-Safety? E-Safety encompasses Internet technologies and electronic communications such as mobile
More informationTechnology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
More informationE-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy
E-Safety Policy Reviewed and Adopted: July 2014 Reviewed by: HT/ LTS Next Review: July 2015 Annual Policy 1 1. Introduction Internet is an essential element of life in 21st Century; it is also a part of
More informationI N F O R M A T I O N C O M M U N I C A T I O N A N D T E C H N O L O G Y P O L I C Y
I N F O R M A T I O N C O M M U N I C A T I O N A N D T E C H N O L O G Y P O L I C Y PURPOSE To ensure that the safety and integrity of MRAEL s and ATCNB s data, physical information technology infrastructure
More informationSchool Information Security Policy
School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...
More information