Student Laptop Computer Program Policy, Procedures and Guidelines

Size: px
Start display at page:

Download "Student Laptop Computer Program Policy, Procedures and Guidelines"

Transcription

1 St James College

2 TableofContents 1.0 Vision 2.0 Curriculum 2.1 Introductionfunding 2.2 Rationale 2.3 Stakeholders 2.4 CurriculumPlan 2.5 Areasofgeneralusage 2.6 Schoolareaswherelaptopsaretobeused 2.7 Howtheprogramistobeimplemented 2.8 Usefulgeneralskills 3.0 Homeuseofdevices 3.1 InternetFiltering 4.0 StorageandTransport 4.1 Onschoolgrounds 4.2 AfterSchool 4.3 Transporttoandfromschool 5.0 Software 5.1 Availablesoftware 5.2 Installingsoftwareonthenetbook 5.3 Upgradingsoftware 6.0 FilemanagementandBackupprocedures 6.1 Managementoffiles 6.2 Backupprocedure 6.3 Virusprotection 7.0 NetworkAccess, andInternetUsage 7.1 AcceptableUseAgreement 7.2 Monitoring 7.3 Usage 8.0 Faults,BreakdownsandRepair 8.1 TheRepairprocess 8.2 Reimaging 9.0 WarrantyandInsurance 10.0 OnlineSafety AppendixA:LaptopTechnicalSpecifications AppendixB:StudentandParentlaptopComputerGuidelines AppendixC:AcceptableTechnologyusepolicy

3 1.0 Vision SchoolVision The vision of St James College is to be an authentic witness to the touchstones of the Charter for Catholic Schools in the Edmund Rice Tradition and to embody their expression in all aspects of our school. Mission Challenged bythegospelandinspiredbyedmundrice,stjamescollege,asacatholicschoolinthe EdmundRiceTradition,engagesandnurturestheheartsandmindsofyoungmenandwomen.Through our inclusive teaching, learning and pastoral practices, we seek to create authentic pathways for all students in our diverse community to grow towards becoming hopefilled members of society.we committojustandsupportiverelationshipsinourwayoflivingandwepromotejusticeinourworld. ICTVision InformationCommunicationLearningTechnologies(ICLT)havebecomeubiquitousinthe contemporaryworld.stjamescollegeiscommittedtoensuringthatallmembersofthelearning communityhaveaccesstoicltsthatencourageexcellenceinteachingandlearningandprepare studentsfortheirroleinthefutureworkforceandlife.thecollegerecognisesthepowerofsuch technologiestofosterhigherlevelthinkinginitsstudents.interfacingwithicltsonameaningful levelrequiresspecifichardwareandcurriculumdesign.studentsandstaffmustbeprovidedthe opportunitytoaccessthesetechnologiesaswellasbeconfidentintheiruseasteachingand learningtools. Strategy3.6oftheCollegeStrategicPlanstates:DevelopandimplementanInformation TechnologyStrategicPlan. 2.0 Curriculum TheDigitalEducationRevolution(DER)isanexcitingopportunityforbothschoolsandfamiliesto accessanenhancedlearningexperience.allstudentsofvariousabilitylevelswillhavetheability todeveloptheirlearningunderthisprogram.studentswillhavetheabilitytoaccessnew learningtoolsandexperiencestodeveloparangeofthinkingskillsandcollaboration opportunities.thecollegeiscommittedtostudentsbecomingfamiliarwithatoolwhichis becomingaubiquitoustoolforworknowandinthefuture. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx2

4 Stakeholdersinvolved AtStJamesCollege,Year8studentsandlater,Year10students,willreceivealaptopcomputerin 2013.Year8and10studentsin2014willreceivethesameandexistingCollegeownedlaptops willbeissuedtothe2014year12cohort.by2014allstudentswillhavealaptop.in2015,year7 and8studentswillreceivelaptopsandyear10studentswillhavetheirdevicesreplaced.in subsequentyears,newdeviceswillbeissuedtoyear7and10studentssoeachstudentwillhave intheirpossessionadevicethatisthreeyearsorlessold. Thelaptopwillbeprovidedtostudentsaftervariouspolicydocumentshavebeensharedand discussedwithfamiliesandstudents.studentsareexpectedtokeepthelaptopuntilitis replaced,whiletheyremainatthecollege. Staffwillreceiveprofessionaldevelopmentcommensuratewiththeirneedstoexecuteunitplans andworkprogramsatthecollege Year Year Year9 _ Year Year11 _ Year12 _ School laptops CurriculumPlan TheCollegecurriculumplanmakescertaincommitmentsaboutthenewtechnology.The1:1 computingdeclarationbythecurrentfederalgovernmentinyears9 12willcompeltheCollege todeveloparangeofnewstrategiestousenewitinproductiveways.opportunitiesinthe classroomwhichwillpresentthemselvesduetothefundingandmustbeexploredincludethe following: 1. Pervasiveuseoflaptopcomputing 2. Wideruseofvideoandcommunicationtechnology 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx3

5 3. Abroaderrangeofsoftwaretoolstodeveloplessonsandactivities 4. Innovativeprojectandteamworkactivities 5. Collaborationwithothercommunitymembersandgroupsacrosstheglobe 6. Professionaldevelopmentofferedtoteachingstaff 7. Increaseduseofelectronictextsincludingebooksandaudiobooks. 2.2 Areasofgeneralusage Studentswillbeusingthelaptopsregularlyinvariousclassesthroughouttheschooltimetable. Itisenvisagedhoweverthatsomeclassesandactivitieswillremain penandpaper subjects, atleastintheshortterm.stjamescollegeiscommittedtoprovidingarangeofunitsand opportunitiesmoreappropriateforusewithnetbooks,especiallyinthecoresubjectsof Religion,English,Mathematics,ScienceandHistory. ActionstomeetStrategy3.6oftheStJamesStrategicPlan(201317):Developandimplement aninformationtechnologystrategicplan,include: Integrateandenhancetheuseoftechnologyasalearningandteachingtoolsothatstaff andstudentsareusingicltskillfullyandpurposefully; Regularlymonitoremergingservices,toolsanddirectionsinICLTandcontinueto upgradeinfrastructure; Equipstudentsandstafftobeconfident,creativeandproductiveusersofnew technologies; Improvestrategiestosupportteachersastheylearntousenewtechnologies,and Implementa1:1ICLTplanandprogramforindividualdevices. Somehomeworkactivitieswillrequiretheuseofthelaptop,andthereforethestudentis expectedtotakethelaptophomeanduseitforthispurpose.whilstathome,studentsare expectedtochargeandcompleteroutinemaintenanceonthemachine. 2.3 Schoolareaswherelaptopsaretobeused StudentswillbeabletousethenetbooksinmostclassroomsintheCollege.Insomepractical subjectareassuchasindustrialarts,hospitalityandphysicaleducationitmaynotbepossible toprovidesuchaworkingspace. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx4

6 2.4 Howtheprogramistobeimplemented Wearedeterminedtoenhancestudents educationalexperiencethroughtheuseofthisnew technology.webelievethatlessons onthelaptops fortheirownsakeareineffecttime wastingactivities.weaimtoprovidelessonsthatwillincreasetheinterestofstudentsin variouspursuitsthroughouttheirtimeatthecollege.wethereforewillinvestconsiderable amountsofstaffandcollegetimeintopreparingunitsofworkappropriateforthisnew paradigmoflearning. 2.5 Usefulgeneralskills Typingability:Studentswithgreatertypingabilitywillfinditeasiertocopewiththedemands ofastandardschoollessoninthisenvironment.somelimitedtrainingfortouchtypingwillbe providedatthecollege,howeveranythingparentscandotoincreasetheamountoftime studentshavetotypeonacomputerwouldbehelpful.typingtutorswillbeinstalledonthe netbookforstudentstouseregularly(eg.typingmasterpro). Researchskills:Researchingtheinternetisaspecialisedskillthatdemandspracticeandtime. ResearchskillswillbetaughttostudentsduringYears8and9.SignificantassessmentinallYear levelsrequirestheappropriateuseofresearchskills.theauthenticationofthisresearchis anotherskilltaughttostudentsandisaqueenslandstudiesauthority(qsa)requirement. 3.0 Homeuseofdevices Studentswillbeabletousetheirlaptopathometocompletehomework,assignmentsand otherschoolwork. ThereisnoexpectationthatInternetaccessisavailableathome.IfInternetaccessisavailable studentsmayconfiguretheirdevicetousetheirhomeinternetaccess. 3.1InternetFiltering Whenaccessingtheinternetthroughtheschoolnetworkallinternetaccesswillbefilteredfor inappropriatecontentusingbluereef,sonar.thisdoesnotapplyoutsideoftheschool network. Internetfilteringandmanagementistheresponsibilityofparentsandguardianswhenthe studentisnotonschoolgrounds. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx5

7 4.0 StorageandTransport 4.1Onschoolgrounds Whileonschoolpropertythelaptopmustalwaysbeinthestudent spossession.whennot inaclassroomthenetbookmustbeinthetargusorbusbag.theonlytimesthatstudents wouldnothavetheirlaptopwiththemiswhenitisinforrepairoritislockedaway. 4.2Afterschool Studentswillbeexpectedtotaketheirlaptophomeeachdaytocompleteschoolwork. 4.3Transporttoandfromschool LaptopsmustalwaysbetransportedintheTargusOrbuscasesprovided. 5.0 Software 5.1Availablesoftware Thelaptopcomespreconfiguredwithsoftwarethathasbeenchosentoassiststudents meettherequirementsofthecurriculum.additionalsoftwarehasbeenincludedwhich providesvirusprotectionandtheabilitytoeasilybackupfiles. Softwarepreinstalledincludes(butisnotlimitedto) Windows7 MicrosoftOffice2010Suite AdobeWebPremiumCS6 Maths300 TypingMasterPro Geogebra GoogleChrome VisualThesaurus StudentCafé/Educate AdobeFlash MYOBAccountRightPlus LegoMindstorms Clickview CorelDraw Quicktime 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx6

8 Picasa SymantecAntivirus Winrar 5.2InstallingSoftwareontheNetbook StudentsmayonlyinstallsoftwarethathasbeenapprovedbytheCollege.Installation and/oruseofunauthorizedsoftwarewillresultindisciplinaryaction. 5.3Updatingsoftware Therewillbetimeswhensoftwarewillneedtobeupdatedorupgraded.Inthemajorityof casesstudentswillbeabletoupdatetheirsoftwarethroughtheschoolwireless.therewill betimeshoweverwhenstudentswillberequiredtoupdatetheirsoftwarethroughawired connection.studentswillbenotifiedoftheseoccasionsthroughnotices. 6.0 FilemanagementandBackupprocedures Allstudentswillbeprovidedwithspaceonthe D Drivewhichmustbeusedtostoreallschool relatedwork.studentswillalsosaveallworktotheirfileinthestudentdrive. 6.1Managementoffiles Studentsareresponsibleforthemanagementoftheirownfiles.Allfilesrequiredforschool workmustbestoredontheddrive. 6.2BackupProcedure Thelaptopcontainssoftwarethatallowsthestudenttosynchronisetheirfilesbetweenthe CDrive,DDriveandexternalstorageonadailybasis. 6.3Virusprotection AlllaptopsareprovidedwithSemanticEndPointProtection.Thisisconfiguredtoupdate automaticallywhenthestudentisloggedontotheschoolnetwork. Studentsarenottoinstallanyothervirusprotectionsoftwareasthismayconflictwiththe existingconfiguration.studentsmustneverdisablethefirewallevenwhenpromptedtodo so. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx7

9 Studentsmusttakereasonablestepstoensurethattheydonotintroduceorpropagate computervirusinfectionswithinthestjamescollegecommunity.suchreasonablesteps include: regularlyscanninganyportabledrivesorcds/dvdsusedfortransportingordistributing files, notopening orfilesthatareofaquestionableordubiousorigin,and onlyopening attachmentsorfilesthatareexpectedorfromtrustedsources. 7.0 NetworkAccess, andInternetUsage 7.1AcceptableUseAgreement AllstudentshavesignedanAcceptableUseAgreementwhichoutlinesacceptableuseofthe schoolnetwork,intranetandinternetusage.thisagreementalsoapplieswhenstudentsare usingthelaptop. 7.2Monitoring Atanytimetheschoolhastherighttomonitorthestudent suseoftheschoolnetworkand theirlaptop.thisincludesinternetactivity,usbdrives,onlinestorage, accountsand laptopharddrives.inappropriateusagewillresultindisciplinaryactionbeingtaken. 7.3 AllStudentswillreceivean accountwhichtheywillbeabletousetosendworkto teachersfordraftingandmarking.studentswillalsobeabletoreceivetasks,assignments andassistancefromteachers.the accountswillalsoallowstudentstoaccess educationalwebsiteswhichrequireregistrationtouse,inparticular,web2.0sites. 8.0 Faults,BreakdownsandRepairs 8.1TheRepairProcess Whenthereisafaultwiththelaptop(hardwareand/orsoftware)studentsarerequiredto taketheirlaptoptotheitservices. Hardwarerelatedproblems IfthereisahardwareproblemthelaptopwillberetainedbyITservicesuntilthecausecan bedetermined.studentsmayreceivealoanlaptopduringthistimeifoneisavailable. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx8

10 Softwarerelatedproblems Inthecaseofaproblemduetosoftwareerrors,iftheproblemcannotbefixedwithin10 minutesthelaptopwillbereimagedandreturnedtothestudent.thiswilltakethelaptop backtoitsinitialconfiguration.latestupdates,however,willbeincluded. 8.2Reimaging Therewillbetimeswhenlaptopsmustbereimagedtosolvesoftwarerelatedissuesand conflicts. ITserviceswillnotbackupanyfileslocatedonthelaptop sharddrive. Warranty,Insurance,LossorDamage Thelaptopshavea3yearwarrantycoveringmanufacturingfaultsandaccidentaldamage, (NB.Nocoverageforlossortheft). Ifthereisanydamagetothelaptopand/orcase,orifthelaptopand/orcaseislostor stolen,andthisdamageorlossisduetowillful,deliberateornegligentactions,(apartfrom fairwearandtear),thestudentagreestomakegoodthedamageorlossorcompensatethe Collegeforthecostofrepairand/orrestitution. Shouldthestudent senrolmentatthecollegecease,thelaptopandcasemustbereturned tothecollegeingoodorderandcondition,(allowingforfairwearandtear). Duetotherelativelylowcostoftheindividuallaptops,thereisnoinsurancecoverageby thecollegeoverthelaptopsandcases.thereforeparentsandguardiansareurgedto reviewtheirowninsurancepoliciestodetermineiflossoftheequipmentiscoveredbytheir ownpolicies. TheCollegehaspurchasedhighqualitycasesforthelaptopsandtheseshouldbeusedatall timestopreventdamagetotheequipment.(pleasenote:thelaptopcasesmustbe returnedtothecollegeingoodorderattheendofthestudent senrolment.thesecases willremainthepropertyofthecollege.) 9.0 OnlineSafety Computerlaptops,althoughexcellenttoolsforeducation,canhaveanumberofnegative implicationsonthelivesofourstudents.wewouldliketoremindourparents/guardiansof thefollowingissuesthatmayarisewithcomputers. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx9

11 1. Computersarethemaintoolofthecyberbully.Pleasemonitoryourdaughterorson s useofthecomputerlaptopandcontacttherelevantpastoralcoordinatorifany concernsarise.pleasecontactthecollegedirectlyifissuesarise:usethecontactus fromthecollegewebsite,or school@stjamescollege.qld.edu.au,orphonethe Collegedirect: Addictiontocomputergames/socialnetworkingroomsisveryreal(Myspace,Bebo, etc.)ifyouareconcernedabouttheamountoftimeyourdaughterorsonisspending onthecomputerandyourequiresupportinrelationtothisissue,pleasecontactyour daughterorson spastoralcoordinatorand/orthestudentcounsellor. 3. Inappropriateinternetsites.Itisimportantthatwemakeallparents/guardiansaware thatonlywhenusingthestjamescollegenetworkdomainwillthestudent sinternet accessbeautomaticallyfiltered.itistheresponsibilityoftheparent/guardianto providingadequatefilteringoutsidethecollege snetworkdomain.agoodsourceof informationregardinginternetfilteringistheaustraliangovernment ssite, 4. Ethical,LegalandResponsibleUseofICLTResources StJamesCollegerequiresallusersofitsICLTresourcesdosoinanethical,legalandresponsible manner.usersofstjamescollegeicltresourcesmustbeawarethatuseoftheseresourcesare subject to the full range of laws that apply to the internet, communications and to the use of computers, and St James College policies.such law and principles include users' obligations in relation to copyright, intellectual property, breach of confidence, defamation, privacy, bullying/harassment, vilification and antidiscrimination legislation, the creation of contractual obligations,andothercivilandcriminallaws. St James College s ICLT resources must not be used for unauthorised commercial activities or unauthorisedpersonalgain.actionsperformedusingstjamescollegeicltresourcesmustcomply with the terms of any licence agreed to for the use of software programs and other online resources. 5. CopyrightandIntellectualPropertyRights Users must not, through the use of St James College ICLT resources, copy, download, store or transmit material which infringescopyrightortheintellectual propertyrights of others without appropriate approval.such material includes music files, movies, videos or any other form of media. Usersshouldbeawarethatactionsperformedusingcomputerandnetworkresources,regardless of any disclaimers that might be made, ultimately reflect on our educational institution and communityasawhole.thisisparticularlyrelevantwhereuserspostorsubmitmaterialinaway thatmakesitpubliclyavailableovertheinternet. 6. SecurityandPrivacy 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx10

12 Usershavearoletoplayinensuringthesecurityandprivacyofinformationtransmittedbyuseof theicltresources.usersareissuedwithuniqueusernamesandpasswords,whichshouldbekept strictlyconfidentialatalltimes. Usersmustprotectsystems,informationandaccountsby: Choosing a secure password which is changed regularly (a secure password is one that is difficulttoguess,forexample,containingacombinationofletterandnumbersandnotsimply anameordateofbirth) Notsharingapasswordwithanyone Respectingtheprivacyandconfidentialityofinformationthattheymaycomeacrossthrough accesstotheresources Reportinganybreachorprospectivebreachofnetworksecuritytotheappropriatetechnical personnelortheicltservices. Unacceptableconductbyuserswhichcouldresultinabreachofsecurityorprivacyincludes: Disclosingyourusernameandpassworddetailstoanotherperson Disclosingotherprivateorconfidentialinformationtounauthorisedpersons Gainingunauthorisedaccesstoanysystemsbyanymeans UsingStJamesCollegeICLTresourcestoattackorcompromiseanothersystemornetwork Downloading,installingorusingunauthorisedsoftwareprograms Deliberatelyinstallingcomputervirusesorothermaliciousprograms Accessingorinterceptingothers electroniccommunicationswithoutpermission. Usersshouldnot,asageneralrule,displaypersonalinformationaboutthemselvesinawaythatis publicly available. Where such disclosure is made through authorised avenues (for example, by the use of or an official website), users should be aware that invasions of privacy may sometimes occur and it is outside St James College's control to prevent such instances from occurring. Usersareremindedthat shouldnotbeusedtosendsensitiveandconfidentialinformation. Users must, however, be aware that the operation and maintenance of ICLT systems often requires the backup and caching of data, the logging of activity and the monitoring of general usagepatternsandassuch,completeconfidentialityandprivacycannotbeguaranteed.stjames College may also be required to inspect or provide copies of electronic communications where requiredtobylaw,orwheretheinvestigationofpossiblemisusesoficltresourcesisrequired. 7. BreachesoftheseConditionsofUse ThebreachoftheseConditionsofUsewillbetakenseriouslyandmayresultindisciplinaryaction beingtaken. ExamplesofpossibleconsequencesrangefromlossorrestrictionofaccesstoICLTresources,to formaldisciplinaryactionforbreachoftheacceptabletechnologyusepolicy.casesofserious, deliberate,and/orcriminalbreachwillbereferredtoexternalauthoritiesandmayresultincivilor criminalproceedings. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx11

13 IfyouhaveanyconcernspleasefeelfreetocontacttheCollege. Forfurtherinformationonprovidingasafeonlineenvironmentforstudentsvisitthesiteson thefollowingpage. Websites StaySmartOnline StaySmartOnlineprovidesallAustralianonlineuserswithinformationonthesimplestepsthey cantaketosecurethemselvesonline.thisincludesinformationandadviceonhowtosecure yourcomputerandyourtransactionsonline. Thiswebsitecontainsafreealertservicethatprovideseasytounderstandinformationonthe latestcybersecuritythreatsandvulnerabilities,afreeinteractiveeducationresourcefor primaryandsecondaryschoolstudents,videoswithusefultipsonprotectingyourcomputer,a selfassessmenttoolforsmallbusinesses,andinformationforparents. NetAlert NetAlertispartoftheAustralianGovernment'songoingcommitmenttoprovidingasafeonline environmentforallfamilies,especiallychildren. TheNetAlertwebsiteprovidesinformationaboutinternetcontentfiltersforPCsandis managedbythedepartmentofbroadband,communicationsandthedigitaleconomy(the Department). CyberSmart Cybersmartprovidesactivities,resourcesandpracticaladvicetohelpyoungkids,kids,teens andparentssafelyenjoytheonlineworld. Cybersmartalsoofferstrainingandresourcesforschoolsandmaterialsforlibrarystaff. DevelopedbytheAustralianCommunicationsandMediaAuthority,Cybersmartispartofthe AustralianGovernment scybersafetyprogram. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx12

14 AppendixA:LaptopTechnicalSpecifications FeComponents Technical Specification 1NoSmartCardReader,Intel(R)Core(TM)i53320M ProcessorBase 112.5"HD(1366x768)AntiglareLEDwithHDFixed FocusWebcam&DigitalArrayMicrophones 14GB(1x4GB)1333MHzDDR3SDRAM 1HardDriveBracket,LatitudeE GB7200rpmHardDrive 13YearWarranty,6cell(58Wh)PrimaryBattery 1IntegrationInformation 1OrderReadyProSupportTag 1ProSupportServiceLabel 1Intel(R)Core(TM)i5ProcessorLabel 1Intel(R)HDGraphics WACAdapter,3pin 1Intel(R)Centrino(R)AdvancedN6205( /05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx13

15 a/b/g/n)halfminicard 1DellWireless380BluetoothModule 1InternalBluetoothModuleCable,LatitudeE6230 1NoWWANCard 1InternalSinglePointingKeyboardwithAnti microbialprotection(english) 1BatteryCarries1YearWarrantyfromInvoiceDate (unlessselect3yrwarrantedbatteryis purchased) Software 1DellWebcamCentralSoftwareMediaKit 1DellWebcamCentralSoftware 1WindowsLiveEssentials 1Windows(R)7QFE 1Windows(R)7Professional32bit(English) 1Office2013Trial 1Office2013Software 1DellBackupandRecoveryManager(DBRMV1.3for Windows7) 1NoAntiVirusSoftware Service 1TechnicalSupport 13YrProSupport:NBDOnsiteService 1ProSupport:7x24TechnicalSupport&Assistance: 13YrAccidentalDamageProtection ture 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx14

16 APPENDIXB:StudentandParentLaptopComputer Guidelines 1.EducationPurposes a. Studentsaretousetheirlaptopcomputeronlyforeducationalpurposes. b. Thelaptopcomputercomespreinstalledwithallthenecessarysoftwareforstudentuse.Only authorisedsoftwareistobestoredonthelaptopcomputer. c. TheCollegereservestherighttocarryoutsoftware,hardwareanddatainspectionsoflaptop computersatanytime. 2.StudentResponsibilities a. Laptopsaretobekeptcleanandfreefromgraffitiandstickers. b. It is the student s responsibility to charge their laptop computer at home each evening. A limitednumberofsparebatteriesandchargingfacilitieswillbeavailable c. Studentsarenottoremoveanyidentificationlabelsfromtheirlaptopcomputer. d. Whiletravellingtoandfromschoollaptopcomputersaretobecarriedintheprotectivecase providedandplacedinschoolbags. e. laptopcomputersarenottobetakenoutofschoolbagsandusedduringrecessandlunchand shouldbeintheirprotectivecaseinsidethestudent sbagorlocker. f. The software loaded on the laptop computers is licensed to the College. Students are not permittedtocopy,transferordeletesoftware. 3.ParentResponsibilities a. Ensurestudentsfulfiltheirresponsibilitiesasoutlinedabove. b. SupervisestudentuseofthecomputerwhenathomeincludingtheirInternetuse. c. Ensurethestudenthastheircomputeratschooleachdayinaconditionthatwillenableittobe usableforanyeducationalpurpose. d. Complywiththepolicyoftheschoolinrelationtothereturn/transferofthedeviceintheevent ofthestudentleavingtheschoolpriortotheendofyear12. 4.DataBackupandSoftwareUpgrading a. StudentsareresponsibleforthebackupofalldataasrecommendedbytheCollege. b. Studentsareresponsibletoensurethatallsoftwareiskeptuptodate.(eg.OperatingSystem andinstalledantivirussoftware). 5.TechnicalSupport a. Studentswillbegivenfulllocaladministratorrightsoftheirlaptopcomputer. b. Studentswillbetrainedonhowtosupportandmaintaintheirlaptopcomputer. c. In the event of a software malfunction students may contact the College ICT Department for assistance. d. StudentsarerequiredtokeeptheirlaptopwithlatestMicrosoftandAntiVirusupdates 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx15

17 6.UseoftheCollegeWirelessNetworkandInternetAccess a. The use of the College Wireless Network and all associated infrastructure are available for educationalusewithstudentlaptopcomputers. b. Thedownloadingoflargefilesisnotpermittedduetobandwidthrestrictions. c. Studentsarenottoremovethevirussoftwareprovidedandreplaceitwithanothertypeofvirus software. d. Specific network settings are not to be removed or altered as this could affect the laptop computersabilitytoconnecttothecollegewirelessnetwork. 7.Warranty,Insurance,Loss,TheftorDamage a. Allinstancesofloss,damageortheftmustbereportedtotheCollegeICTSupportpersonnelas soonaspossible. b. Student laptop computers are covered by a three year warrantywith Accidental Damage Protection.Thiswarrantydoesnotcovertheftand/orfiredamage. c. Ifthereisanydamagetothelaptopand/orcase,orifthelaptopand/orcaseislostorstolen, andthisdamageorlossisduetowilful,deliberateornegligentactions,(apartfromfairwear andtear),youagreetomakegoodthedamageorlossorcompensatethecollegeforthecostof repairand/orrestitution. d. Shouldthestudent senrolmentatthecollegecease,thelaptopandcasemustbereturnedto thecollegeingoodorderandcondition,(allowingforfairwearandtear). e. In the event of a hardware malfunction a report must be made to ICLT Services as soon as possibleforwarrantyrepairtobeorganised. 8.AssessmentandHomework a. Students are encouraged to use their laptop computer for homework and assessment tasks. However, the loss of data or hardware malfunction cannot be grounds for the appeal of any assessmenttaskorhomework. 9.ClassroomUsage a. Studentlaptopcomputersaretobebroughttoschooleachday,howevertheclassroomteacher willmanagetheuseofthelaptopcomputersintheclassroom. b. No student is to take out or use a laptop computer without the permission of the classroom teacher. c. Wheninuse,thelaptopshouldbeplacedonatableordesk,notonlaps.Thelaptopshouldnot becarriedaroundwhilstthescreenisopen. 10.Ownership a. StudentshaveuseofthelaptopcomputerwhilsttheyareenrolledattheCollege.Ifstudents leave the College before the completion of Year 12 the laptop (including the case) must be returned to the College. Students who complete Year 12 at the college will have the laptop signedovertothemifthelaptopandsdcardareover3.5yearsinage. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx16

18 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx17 APPENDIXC:AcceptableTechnologyUsePolicy Purpose Inlinewithtechnologicaldevelopment,StJamesCollegerecognizestheneedtoprovideaccessto onlineservicesthatenablestaffandstudentstoengageintheteaching,learningandadministrative processesoftheschool. Thepurposeofthispolicyistoestablishandmaintainanattitudeofvigilanceinrelationtosafety, misuseandlegalliability. Staff,studentsandvolunteers(afterwardsinthisdocumentknownas Users )areprovidedwith accesstoselectedictincludinginternet,intranetfacilitiesandservicestosupporttheirrolesin teaching,learning,researchandadministration. Useforothernoneducationalreasons,includingbutnotlimitedto,conductingbusinessor commercialactivity,otherprofitmakingventures,productadvertising,disclosureofpersonalor privateinformation,politicalactivityandmischievousorfraudulentpurposesisnotacceptableand maybedealtwithundercollegebehaviormanagementprocedures,ereapolicies,orstateor Commonwealthlegislation. Scope Thispolicyappliestoallstudents,staffandvolunteersassociatedwithStJamesCollege.Itisexpected thatallusersatstjamescollegewillrefrainfromanyinappropriateuse,upholdthepoliciesandvalues oftheschool,therequirementsofthestateandcommonwealthlawandguidetheiractivities accordingly. Procedure Allusersmaybegrantedaccesstotheinternetinordertoachievethemaximumeducational opportunitiessubjecttothefollowingprocedures. BeforebeinggrantedaccesstoICT,internetand services,allusersmustsigntheAcceptable TechnologyUseAgreement. Usersmayusetheservicesforworkrelatedbusinessandaredirectedtorefrainfrompersonaluse ofservicesprovidedbeyondwhatisdescribedasbeinglimitedpersonaluse. Usersshallnotaccessanyobjectionableoroffensivematerial,materialcontrarytothelawor materialinappropriatetoaneducationalorworkenvironment. Usersshallnotpostorforwarddefamatory,inaccurate,personal,sensitive,abusive,obscene, profane,sexuallyoriented,threatening,offensiveorillegalmaterial. messagesorattachmentsthatcontainorarereasonablysuspectedtocontainoffensive materialmustnotbeopenedorsent. Usersareaccountableforadutyofcareintermsoftheinformationtheyprovideandaccessover internet/intranetconnections. UserswhosuspectorknowofinappropriateusemustreportthemattertothePrincipal. Everyeffortistobemadetouseanyinformationservicesprovidedinacostefficientway.

19 Anyuseridentifiedasasecurityriskorwhohasbeenaccessinginappropriatematerialorusingthe networkforanyinappropriateactivitymaybedeniedaccesstotheservicesatthediscretionofthe Principal. AnyuserwhobreachesthispolicyoranyotherrelevantStateorCommonwealthlegislationwillface disciplinaryactioninaccordancewiththesepolicies. Usersshouldbeawarethatbreachofthispolicymayalsoleadtoexternalactionbeingtakenagainst thembyathirdparty(egbreachoftheantidiscriminationlawsordefamationofcharacter). Usersmustnotshareaccountsordivulgepasswordstoothers. Usersmustnotattempttogainaccesstosystemsorserviceswithoutauthorization,orengagein activitieswhichdisruptorcorruptservicesorinformation. Usersmustnotdisclosepersonalinformationofschoolpersonnelorgroup addressesto agenciesorindividualsoutsidetheschool. Usersmustnotaccess,intercept,modifyordestroy ,data,filesorprogramsbelongingtoother usersorengageinactivitieswhichharassorthreatenotherusers. Usersmustnotaccess,downloadordistributecopyrightedorillegalmaterialsormaterialofa morallydubiousnaturefromtheinternet. StaffandstudentsmaynotuseCollegeICTresourcestoaccesssocialnetworksites. StaffmaynotuseICTsocialnetworkssitestocontact,accessorengagewithstudentspresently enrolledattheschool. StaffandstudentsaretoensurethattheCollegeisportrayedinapositivewayonallsocial networkingsitesincluding . AstheCollegehasownershipandlegalrighttoICTproperty,itreservestherighttoaccessany informationthatresidesorissentfromortoanycollegeowneddevice. Relatedlegislation CommonwealthCriminalCode AntiDiscriminationActQLD1991 PrivacyAmendment(PrivateSector)Act2001(Commonwealth) WorkingwithChildrenAct2000 Education(AccreditationofNonStateSchools)Act2001 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx18

HP Laptop & Apple ipads

HP Laptop & Apple ipads Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview

More information

St Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet

St Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet St Peter Claver College Student 1:1 Laptop Program Years 7-12 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Acceptable use of ICT resources

More information

ST MARY S COLLEGE STUDENT 1:1 LAPTOP PROGRAM YEARS 7-12. Policy and Guidelines Booklet

ST MARY S COLLEGE STUDENT 1:1 LAPTOP PROGRAM YEARS 7-12. Policy and Guidelines Booklet ST MARY S COLLEGE STUDENT 1:1 LAPTOP PROGRAM YEARS 7-12 Policy and Guidelines Booklet Contents 1. St. Mary s College Vision for Learning and teaching... 2 2. Overview of Student and Parent Responsibilities...

More information

Student Laptop Program

Student Laptop Program Student Laptop Program Student Name: Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 3 2. Overview of Student and Parent Responsibilities... 4

More information

St John Fisher College

St John Fisher College 2015 Information Technologies (IT) Policy and Guidelines Booklet For Students and Parents TABLE OF CONTENTS INTRODUCTION... 2 IT ACCEPTABLE USE POLICY... 3 STUDENT AND PARENT LOAN LAPTOP COMPUTER GUIDELINES...

More information

St Columban s College 1:1 Laptop Guidelines & Policy Booklet

St Columban s College 1:1 Laptop Guidelines & Policy Booklet St Columban s College 1:1 Laptop Guidelines & Policy Booklet St Columban's College 1:1 Laptop Program Page 1 TABLE OF CONTENTS OVERVIEW 2 SECTION 1 THE 1:1 MACBOOK PROGRAM 3 SECTION 2 STUDENT RESPONSIBILITIES

More information

ICT Safe and Acceptable Use Policy for Students

ICT Safe and Acceptable Use Policy for Students ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...

More information

Student Laptop Computer Program

Student Laptop Computer Program Student Laptop Computer Program v0.1 29 October 2009 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Overview of Student and Parent Responsibilities...

More information

ONE TO ONE LAPTOP PROGRAMME POLICY

ONE TO ONE LAPTOP PROGRAMME POLICY ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...

More information

Unity College Student 1:1 Laptop Computer Program Policy and Guidelines Booklet

Unity College Student 1:1 Laptop Computer Program Policy and Guidelines Booklet Unity College Student 1:1 Laptop Computer Program Policy and Guidelines Booklet Year 2015 TABLE OF CONTENTS TABLE OF CONTENTS... 1 EDUCATIONAL OPPORTUNITIES OF A 1 TO 1 LAPTOP PROGRAM... 2 OVERVIEW OF

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

Kenmore State High School Student Laptop Charter

Kenmore State High School Student Laptop Charter Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6

More information

HAZELDENE LOWER SCHOOL

HAZELDENE LOWER SCHOOL HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

St Charbel s College. Bring Your Own Device (BYOD) Policy Agreement

St Charbel s College. Bring Your Own Device (BYOD) Policy Agreement St Charbel s College Bring Your Own Device (BYOD) Policy Agreement St Charbel s College s Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. St

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

K-20 Network Acceptable Use Guidelines/Internet Safety Requirements

K-20 Network Acceptable Use Guidelines/Internet Safety Requirements Page 1 of 5 K-20 Network Acceptable Use Guidelines/Internet Safety Requirements These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive

More information

Student Laptop User Charter

Student Laptop User Charter Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both

More information

Blacklisting Procedure

Blacklisting Procedure Blacklisting Procedure Related Policy ICT Services and Facilities Use Policy Responsible Approved by Approved and commenced August, 2014 Review by August, 2017 Responsible Organisational Unit Information

More information

Nazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures

Nazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures Nazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures 1. Introduction Nazareth Catholic College acknowledges the increasing use of Information and Communication

More information

POSITION INFORMATION DOCUMENT EDUCATION SUPPORT OFFICER CHRISTIAN BROTHERS COLLEGE - Adelaide (AN ACCREDITED EDMUND RICE EDUCATION AUSTRALIA SCHOOL)

POSITION INFORMATION DOCUMENT EDUCATION SUPPORT OFFICER CHRISTIAN BROTHERS COLLEGE - Adelaide (AN ACCREDITED EDMUND RICE EDUCATION AUSTRALIA SCHOOL) POSITION INFORMATION DOCUMENT EDUCATION SUPPORT OFFICER CHRISTIAN BROTHERS COLLEGE - Adelaide (AN ACCREDITED EDMUND RICE EDUCATION AUSTRALIA SCHOOL) Name Position Title Employment Stream IT Technician

More information

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0 NOS for IT User and Application Specialist IT Security (ESKITU04) November 2014 V1.0 NOS Reference ESKITU040 ESKITU041 ESKITU042 Level 3 not defined Use digital systems NOS Title Set up and use security

More information

Box Hill Senior Secondary College/MYSC

Box Hill Senior Secondary College/MYSC Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication

More information

Digital Device LOAN CHARTER

Digital Device LOAN CHARTER Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to

More information

Sydney Technical High School

Sydney Technical High School Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage. Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or

More information

1 to 1 Laptop Programs Brisbane Catholic Education

1 to 1 Laptop Programs Brisbane Catholic Education 1 to 1 Laptop Programs Brisbane Catholic Education Introduction What is a one to one program? A 1 to 1 laptop program provides every student and teacher access to his or her own laptop computer in a wireless

More information

Acceptable Use of ICT Policy. Learner School Policy

Acceptable Use of ICT Policy. Learner School Policy Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL

More information

Responsible Use Agreement

Responsible Use Agreement BYOD is an acronym for Bring your Own Device. For BYOD, a "device" is a privately owned laptop, tablet computing device, netbook, notebook, e-reader, ipod touch (or similar), or cell/smart phone. For the

More information

BOARD OF EDUCATION Cherry Hill, New Jersey

BOARD OF EDUCATION Cherry Hill, New Jersey BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to

More information

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems. VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0 BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4

More information

Strathfield Girls High School Bring your Own Device User Charter

Strathfield Girls High School Bring your Own Device User Charter Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program. Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring

More information

Electronic business conditions of use

Electronic business conditions of use Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users

More information

Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.

Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community. Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Computer Facilities and External Networks Acceptable Use by Students

Computer Facilities and External Networks Acceptable Use by Students Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Bring Your Own Device Program: User Charter

Bring Your Own Device Program: User Charter Bring Your Own Device Program: User Charter Turramurra High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. The wireless network and

More information

Meánscoil na mbráithre Críostaí, Cill Chainnigh

Meánscoil na mbráithre Críostaí, Cill Chainnigh Meánscoil na mbráithre Críostaí, Cill Chainnigh Christian Brothers Secondary School, Kilkenny. Phone: : 056 056 7721402 7721402 Fax: Fax: 056 056 7763652 7763652 email: E-mail: office@cbskilkenny.ie cbskk@indigo.ie

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online

More information

ICT-based communication and collaboration for learning policy

ICT-based communication and collaboration for learning policy ICT-based communication and collaboration for learning policy Approved by School Association October 2007 Table of Contents Policy statement... 3 Background and rationale... 3 Introduction... 3 The national

More information

Information Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy

Information Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy Working Together Information Security Policy Information Security Policy May 2012 Borders College 19/10/12 1 Working Together Information Security Policy 1. Introduction Borders College recognises that

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

Bring Your Own x. INFORMATION AND PROCEDURES HANDBOOK Version 2014-12-10

Bring Your Own x. INFORMATION AND PROCEDURES HANDBOOK Version 2014-12-10 Bring Your Own x INFORMATION AND PROCEDURES HANDBOOK Version 2014-12-10 Contents BYOx Transition Plan... 3 Forward... 3 Introduction... 3 BYOx Vision... 4 Software and Applications... 4 Microsoft Office...

More information

Information Management and Security Policy

Information Management and Security Policy Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail

More information

Quincy Public Schools Information Technology. Acceptable Use Policy for Staff, Students, and Guests

Quincy Public Schools Information Technology. Acceptable Use Policy for Staff, Students, and Guests Quincy Public Schools Information Technology Acceptable Use Policy for Staff, Students, and Guests Revised May 6, 2013 Introduction This Acceptable Use Policy is enacted as of May 2013 by the Quincy School

More information

NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures. (March 2012)

NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures. (March 2012) NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures (March 2012) Contents Ownership... 3 Privately-owned devices... 4 Optional peripherals... 4 Warranty & Insurance... 4 Stolen or Lost Laptops...

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP)

INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP) 4510.2 INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP) The Board of Education is committed to the optimization of student learning and teaching. The Board considers computers to be a valuable tool for

More information

Bring Your Own Device (BYOD) Acceptable Use Agreement 2015

Bring Your Own Device (BYOD) Acceptable Use Agreement 2015 Monivae College Bring Your Own Device (BYOD) Acceptable Use Agreement 2015 This agreement is applicable to all: 1. students in Years 7, 8, 9, 10 and 11 using their own device to access the College network

More information

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut Policy E-040 Effective Learning Environment GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut Procedure E-040.4 - Acceptable Use and Internet Safety Agreement Acceptable Technology Use Regulations/Internet

More information

ipad Acceptable Use Regulation

ipad Acceptable Use Regulation ipad Acceptable Use Regulation The Mamaroneck School District has purchased Apple ipads for selected students of the Mamaroneck School District. These students will be issued ipads with predetermined applications

More information

INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures

INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures Purpose The purpose of the ACH Network Acceptable Use Procedures is to provide the procedures, rules, guidelines,

More information

Acceptable Media Use and Bring Your Own Device (BYOD) Policy

Acceptable Media Use and Bring Your Own Device (BYOD) Policy Acceptable Media Use and Bring Your Own Device (BYOD) Policy Author: Mr Joe Cowell Headteacher Date Ratified by Governors: September 2015 Date of Review: September 2018 Wollaston School Acceptable Media

More information

Dublin City University

Dublin City University Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

Improving Classroom Management

Improving Classroom Management Improving Classroom Management Research suggests ways administrators and staff developers can help teachers with the important task of organizing and managing classrooms. Julie P. Sanford, Edmund T. Emmer,

More information

Parent Owned Device Program

Parent Owned Device Program Parent Owned Device Program Faith Excellence Community Compassion Purpose Introduction of the Parent Owned Device Program supports our vision to provide excellence in student centered learning in a global

More information

Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016

Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 PURPOSE Christian Academy of Knoxville provides technology resources for the school community with a belief that the educational

More information

IAAS Product Terms PRODUCT TERMS

IAAS Product Terms PRODUCT TERMS IAAS Product Terms PRODUCT TERMS 1. Our contract with you 1.1. These Product Terms apply to the services ( IAAS Services ) provided by the Company ( us, we or our ) to the Client ( you or your ) under

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

This page outlines the General Conditions of access to and use of the Site. Acknowledgment and acceptance of General Conditions

This page outlines the General Conditions of access to and use of the Site. Acknowledgment and acceptance of General Conditions TERMS OF USE This page outlines the General Conditions of access to and use of the Site. Acknowledgment and acceptance of General Conditions (Site) is owned and operated by 3P Learning Pty Ltd, the company

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY

USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

IP AUSTRALIA B2B ONLINE TRANSACTION SYSTEM AGREEMENT

IP AUSTRALIA B2B ONLINE TRANSACTION SYSTEM AGREEMENT IP AUSTRALIA B2B ONLINE TRANSACTION SYSTEM AGREEMENT Name of Customer: (The Customer) A.C.N. A.B.N. IPA Customer Number Telephone Fax Email Physical Address Postcode Mail Address Postcode Name of the Customer

More information

Lowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy

Lowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy BYOD Program 2015 BYOD Student Agreement/Acceptable Use Policy/Online Services Policy The student and parent/guardian must carefully read the above contract before signing it. Any questions should be addressed

More information

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement 111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use

More information

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data

More information

How To Behave At A School

How To Behave At A School THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

Eastwood Local Schools Laptop Policies and Handbook

Eastwood Local Schools Laptop Policies and Handbook Eastwood Local Schools Laptop Policies and Handbook Table of Contents Program Overview - 3 Acceptable Use Policy - 4 Information Technology Resources Responsibilities & Agreement - 7 District Laptop Service

More information

HIPAA/HITECH Compliance Using VMware vcloud Air

HIPAA/HITECH Compliance Using VMware vcloud Air Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

Information Technology Services

Information Technology Services Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

CARRAMAR PUBLIC SCHOOL

CARRAMAR PUBLIC SCHOOL CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school

More information

QUALIFICATION HANDBOOK

QUALIFICATION HANDBOOK QUALIFICATION HANDBOOK Level 2 Extended Certificate in Health Informatics (7450-12) February 2012 Version 1.0 Qualification at a glance Subject area City & Guilds number 7450 Health Informatics Age group

More information

Parent FAQ s. 1:1 Laptop Program. Introduction. 1-to-1 devices and student learning. Will students use computers too much for schoolwork?

Parent FAQ s. 1:1 Laptop Program. Introduction. 1-to-1 devices and student learning. Will students use computers too much for schoolwork? Introduction What is a one-to-one program? One-to-one learning provides every student and teacher access to his or her own laptop computer in a wireless environment allowing students to learn at their

More information

Viva Energy may from time to time amend, delete or supplement these Terms and Conditions. Any change takes effect from the earlier of:

Viva Energy may from time to time amend, delete or supplement these Terms and Conditions. Any change takes effect from the earlier of: SHELL CARD ONLINE TERMS AND CONDITIONS VERSION: AUGUST 2014 1. SCOPE 1.1 These Terms and Conditions apply to use of the Shell Card Online (SCOL) web programme accessible via www.vivaenergy.com.au, by a

More information

National Secondary School Computer Fund Meridan State College Q3 Take Home Laptop Charter. Student NSSCF Charter

National Secondary School Computer Fund Meridan State College Q3 Take Home Laptop Charter. Student NSSCF Charter National Secondary School Computer Fund Meridan State College Q3 Take Home Laptop Charter Student NSSCF Charter Contents STUDENT NSSCF CHARTER... 3 NSSCF OVERVIEW... 3 DEVICE CARE... 4 DATA SECURITY AND

More information

Acceptable Network Usage Policy

Acceptable Network Usage Policy Acceptable Network Usage Policy Purpose: The Lumen Christi Catholic College computer network is provided for staff and students to facilitate resource sharing, innovation and communication. All students

More information

LEEMING SENIOR HIGH SCHOOL. Bring Your Own Device Information and Policy 2015

LEEMING SENIOR HIGH SCHOOL. Bring Your Own Device Information and Policy 2015 LEEMING SENIOR HIGH SCHOOL Bring Your Own Device Information and Policy 2015 1 1 Dear Parent/Guardian Since the ending of the Federal Government s Digital Education Revolution funding, Leeming SHS can

More information

GARDENVALE PRIMARY SCHOOL BYOD

GARDENVALE PRIMARY SCHOOL BYOD GARDENVALE PRIMARY SCHOOL BYOD (Bring Your Own Device) POLICY This policy operates in conjunction with the Victorian Department of Education and Early Childhood development and Gardenvale Primary School

More information

Acceptable Use Guidelines

Acceptable Use Guidelines Attachment to the Computer and Information Security and Information Management Policies Acceptable Use Guidelines NZQA Quality Management System Supporting Document Purpose These Acceptable Use Guidelines

More information

Student & Staff Access and Use of Networked Information Resources and Communications

Student & Staff Access and Use of Networked Information Resources and Communications Page 1 of 6 These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive and effective digital citizenship among students and staff. Digital

More information

St Vincent s Catholic Primary School e-safety Policy

St Vincent s Catholic Primary School e-safety Policy St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety

More information

ICT Acceptable Use Policy. August 2015

ICT Acceptable Use Policy. August 2015 ICT Acceptable Use Policy August 2015 Document title ICT Acceptable Use Policy August 2015 Document author and department Responsible person and department Robbie Walker, Information Security Architect,

More information

Custodian-Node data provision terms and conditions

Custodian-Node data provision terms and conditions Custodian-Node data provision terms and conditions Parties Node Operator Data Custodian Background A B C D E [Insert legal name of node][insert ACN/ABN/ARBN] of [Insert address]\ [Insert legal name of

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy

More information

Bring Your Own Device Program: 2015 User Agreement

Bring Your Own Device Program: 2015 User Agreement Bring Your Own Device Program: 2015 User Agreement Asquith Girls High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. Asquith Girls High

More information