Student Laptop Computer Program Policy, Procedures and Guidelines
|
|
- Rebecca Phillips
- 8 years ago
- Views:
Transcription
1 St James College
2 TableofContents 1.0 Vision 2.0 Curriculum 2.1 Introductionfunding 2.2 Rationale 2.3 Stakeholders 2.4 CurriculumPlan 2.5 Areasofgeneralusage 2.6 Schoolareaswherelaptopsaretobeused 2.7 Howtheprogramistobeimplemented 2.8 Usefulgeneralskills 3.0 Homeuseofdevices 3.1 InternetFiltering 4.0 StorageandTransport 4.1 Onschoolgrounds 4.2 AfterSchool 4.3 Transporttoandfromschool 5.0 Software 5.1 Availablesoftware 5.2 Installingsoftwareonthenetbook 5.3 Upgradingsoftware 6.0 FilemanagementandBackupprocedures 6.1 Managementoffiles 6.2 Backupprocedure 6.3 Virusprotection 7.0 NetworkAccess, andInternetUsage 7.1 AcceptableUseAgreement 7.2 Monitoring 7.3 Usage 8.0 Faults,BreakdownsandRepair 8.1 TheRepairprocess 8.2 Reimaging 9.0 WarrantyandInsurance 10.0 OnlineSafety AppendixA:LaptopTechnicalSpecifications AppendixB:StudentandParentlaptopComputerGuidelines AppendixC:AcceptableTechnologyusepolicy
3 1.0 Vision SchoolVision The vision of St James College is to be an authentic witness to the touchstones of the Charter for Catholic Schools in the Edmund Rice Tradition and to embody their expression in all aspects of our school. Mission Challenged bythegospelandinspiredbyedmundrice,stjamescollege,asacatholicschoolinthe EdmundRiceTradition,engagesandnurturestheheartsandmindsofyoungmenandwomen.Through our inclusive teaching, learning and pastoral practices, we seek to create authentic pathways for all students in our diverse community to grow towards becoming hopefilled members of society.we committojustandsupportiverelationshipsinourwayoflivingandwepromotejusticeinourworld. ICTVision InformationCommunicationLearningTechnologies(ICLT)havebecomeubiquitousinthe contemporaryworld.stjamescollegeiscommittedtoensuringthatallmembersofthelearning communityhaveaccesstoicltsthatencourageexcellenceinteachingandlearningandprepare studentsfortheirroleinthefutureworkforceandlife.thecollegerecognisesthepowerofsuch technologiestofosterhigherlevelthinkinginitsstudents.interfacingwithicltsonameaningful levelrequiresspecifichardwareandcurriculumdesign.studentsandstaffmustbeprovidedthe opportunitytoaccessthesetechnologiesaswellasbeconfidentintheiruseasteachingand learningtools. Strategy3.6oftheCollegeStrategicPlanstates:DevelopandimplementanInformation TechnologyStrategicPlan. 2.0 Curriculum TheDigitalEducationRevolution(DER)isanexcitingopportunityforbothschoolsandfamiliesto accessanenhancedlearningexperience.allstudentsofvariousabilitylevelswillhavetheability todeveloptheirlearningunderthisprogram.studentswillhavetheabilitytoaccessnew learningtoolsandexperiencestodeveloparangeofthinkingskillsandcollaboration opportunities.thecollegeiscommittedtostudentsbecomingfamiliarwithatoolwhichis becomingaubiquitoustoolforworknowandinthefuture. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx2
4 Stakeholdersinvolved AtStJamesCollege,Year8studentsandlater,Year10students,willreceivealaptopcomputerin 2013.Year8and10studentsin2014willreceivethesameandexistingCollegeownedlaptops willbeissuedtothe2014year12cohort.by2014allstudentswillhavealaptop.in2015,year7 and8studentswillreceivelaptopsandyear10studentswillhavetheirdevicesreplaced.in subsequentyears,newdeviceswillbeissuedtoyear7and10studentssoeachstudentwillhave intheirpossessionadevicethatisthreeyearsorlessold. Thelaptopwillbeprovidedtostudentsaftervariouspolicydocumentshavebeensharedand discussedwithfamiliesandstudents.studentsareexpectedtokeepthelaptopuntilitis replaced,whiletheyremainatthecollege. Staffwillreceiveprofessionaldevelopmentcommensuratewiththeirneedstoexecuteunitplans andworkprogramsatthecollege Year Year Year9 _ Year Year11 _ Year12 _ School laptops CurriculumPlan TheCollegecurriculumplanmakescertaincommitmentsaboutthenewtechnology.The1:1 computingdeclarationbythecurrentfederalgovernmentinyears9 12willcompeltheCollege todeveloparangeofnewstrategiestousenewitinproductiveways.opportunitiesinthe classroomwhichwillpresentthemselvesduetothefundingandmustbeexploredincludethe following: 1. Pervasiveuseoflaptopcomputing 2. Wideruseofvideoandcommunicationtechnology 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx3
5 3. Abroaderrangeofsoftwaretoolstodeveloplessonsandactivities 4. Innovativeprojectandteamworkactivities 5. Collaborationwithothercommunitymembersandgroupsacrosstheglobe 6. Professionaldevelopmentofferedtoteachingstaff 7. Increaseduseofelectronictextsincludingebooksandaudiobooks. 2.2 Areasofgeneralusage Studentswillbeusingthelaptopsregularlyinvariousclassesthroughouttheschooltimetable. Itisenvisagedhoweverthatsomeclassesandactivitieswillremain penandpaper subjects, atleastintheshortterm.stjamescollegeiscommittedtoprovidingarangeofunitsand opportunitiesmoreappropriateforusewithnetbooks,especiallyinthecoresubjectsof Religion,English,Mathematics,ScienceandHistory. ActionstomeetStrategy3.6oftheStJamesStrategicPlan(201317):Developandimplement aninformationtechnologystrategicplan,include: Integrateandenhancetheuseoftechnologyasalearningandteachingtoolsothatstaff andstudentsareusingicltskillfullyandpurposefully; Regularlymonitoremergingservices,toolsanddirectionsinICLTandcontinueto upgradeinfrastructure; Equipstudentsandstafftobeconfident,creativeandproductiveusersofnew technologies; Improvestrategiestosupportteachersastheylearntousenewtechnologies,and Implementa1:1ICLTplanandprogramforindividualdevices. Somehomeworkactivitieswillrequiretheuseofthelaptop,andthereforethestudentis expectedtotakethelaptophomeanduseitforthispurpose.whilstathome,studentsare expectedtochargeandcompleteroutinemaintenanceonthemachine. 2.3 Schoolareaswherelaptopsaretobeused StudentswillbeabletousethenetbooksinmostclassroomsintheCollege.Insomepractical subjectareassuchasindustrialarts,hospitalityandphysicaleducationitmaynotbepossible toprovidesuchaworkingspace. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx4
6 2.4 Howtheprogramistobeimplemented Wearedeterminedtoenhancestudents educationalexperiencethroughtheuseofthisnew technology.webelievethatlessons onthelaptops fortheirownsakeareineffecttime wastingactivities.weaimtoprovidelessonsthatwillincreasetheinterestofstudentsin variouspursuitsthroughouttheirtimeatthecollege.wethereforewillinvestconsiderable amountsofstaffandcollegetimeintopreparingunitsofworkappropriateforthisnew paradigmoflearning. 2.5 Usefulgeneralskills Typingability:Studentswithgreatertypingabilitywillfinditeasiertocopewiththedemands ofastandardschoollessoninthisenvironment.somelimitedtrainingfortouchtypingwillbe providedatthecollege,howeveranythingparentscandotoincreasetheamountoftime studentshavetotypeonacomputerwouldbehelpful.typingtutorswillbeinstalledonthe netbookforstudentstouseregularly(eg.typingmasterpro). Researchskills:Researchingtheinternetisaspecialisedskillthatdemandspracticeandtime. ResearchskillswillbetaughttostudentsduringYears8and9.SignificantassessmentinallYear levelsrequirestheappropriateuseofresearchskills.theauthenticationofthisresearchis anotherskilltaughttostudentsandisaqueenslandstudiesauthority(qsa)requirement. 3.0 Homeuseofdevices Studentswillbeabletousetheirlaptopathometocompletehomework,assignmentsand otherschoolwork. ThereisnoexpectationthatInternetaccessisavailableathome.IfInternetaccessisavailable studentsmayconfiguretheirdevicetousetheirhomeinternetaccess. 3.1InternetFiltering Whenaccessingtheinternetthroughtheschoolnetworkallinternetaccesswillbefilteredfor inappropriatecontentusingbluereef,sonar.thisdoesnotapplyoutsideoftheschool network. Internetfilteringandmanagementistheresponsibilityofparentsandguardianswhenthe studentisnotonschoolgrounds. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx5
7 4.0 StorageandTransport 4.1Onschoolgrounds Whileonschoolpropertythelaptopmustalwaysbeinthestudent spossession.whennot inaclassroomthenetbookmustbeinthetargusorbusbag.theonlytimesthatstudents wouldnothavetheirlaptopwiththemiswhenitisinforrepairoritislockedaway. 4.2Afterschool Studentswillbeexpectedtotaketheirlaptophomeeachdaytocompleteschoolwork. 4.3Transporttoandfromschool LaptopsmustalwaysbetransportedintheTargusOrbuscasesprovided. 5.0 Software 5.1Availablesoftware Thelaptopcomespreconfiguredwithsoftwarethathasbeenchosentoassiststudents meettherequirementsofthecurriculum.additionalsoftwarehasbeenincludedwhich providesvirusprotectionandtheabilitytoeasilybackupfiles. Softwarepreinstalledincludes(butisnotlimitedto) Windows7 MicrosoftOffice2010Suite AdobeWebPremiumCS6 Maths300 TypingMasterPro Geogebra GoogleChrome VisualThesaurus StudentCafé/Educate AdobeFlash MYOBAccountRightPlus LegoMindstorms Clickview CorelDraw Quicktime 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx6
8 Picasa SymantecAntivirus Winrar 5.2InstallingSoftwareontheNetbook StudentsmayonlyinstallsoftwarethathasbeenapprovedbytheCollege.Installation and/oruseofunauthorizedsoftwarewillresultindisciplinaryaction. 5.3Updatingsoftware Therewillbetimeswhensoftwarewillneedtobeupdatedorupgraded.Inthemajorityof casesstudentswillbeabletoupdatetheirsoftwarethroughtheschoolwireless.therewill betimeshoweverwhenstudentswillberequiredtoupdatetheirsoftwarethroughawired connection.studentswillbenotifiedoftheseoccasionsthroughnotices. 6.0 FilemanagementandBackupprocedures Allstudentswillbeprovidedwithspaceonthe D Drivewhichmustbeusedtostoreallschool relatedwork.studentswillalsosaveallworktotheirfileinthestudentdrive. 6.1Managementoffiles Studentsareresponsibleforthemanagementoftheirownfiles.Allfilesrequiredforschool workmustbestoredontheddrive. 6.2BackupProcedure Thelaptopcontainssoftwarethatallowsthestudenttosynchronisetheirfilesbetweenthe CDrive,DDriveandexternalstorageonadailybasis. 6.3Virusprotection AlllaptopsareprovidedwithSemanticEndPointProtection.Thisisconfiguredtoupdate automaticallywhenthestudentisloggedontotheschoolnetwork. Studentsarenottoinstallanyothervirusprotectionsoftwareasthismayconflictwiththe existingconfiguration.studentsmustneverdisablethefirewallevenwhenpromptedtodo so. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx7
9 Studentsmusttakereasonablestepstoensurethattheydonotintroduceorpropagate computervirusinfectionswithinthestjamescollegecommunity.suchreasonablesteps include: regularlyscanninganyportabledrivesorcds/dvdsusedfortransportingordistributing files, notopening orfilesthatareofaquestionableordubiousorigin,and onlyopening attachmentsorfilesthatareexpectedorfromtrustedsources. 7.0 NetworkAccess, andInternetUsage 7.1AcceptableUseAgreement AllstudentshavesignedanAcceptableUseAgreementwhichoutlinesacceptableuseofthe schoolnetwork,intranetandinternetusage.thisagreementalsoapplieswhenstudentsare usingthelaptop. 7.2Monitoring Atanytimetheschoolhastherighttomonitorthestudent suseoftheschoolnetworkand theirlaptop.thisincludesinternetactivity,usbdrives,onlinestorage, accountsand laptopharddrives.inappropriateusagewillresultindisciplinaryactionbeingtaken. 7.3 AllStudentswillreceivean accountwhichtheywillbeabletousetosendworkto teachersfordraftingandmarking.studentswillalsobeabletoreceivetasks,assignments andassistancefromteachers.the accountswillalsoallowstudentstoaccess educationalwebsiteswhichrequireregistrationtouse,inparticular,web2.0sites. 8.0 Faults,BreakdownsandRepairs 8.1TheRepairProcess Whenthereisafaultwiththelaptop(hardwareand/orsoftware)studentsarerequiredto taketheirlaptoptotheitservices. Hardwarerelatedproblems IfthereisahardwareproblemthelaptopwillberetainedbyITservicesuntilthecausecan bedetermined.studentsmayreceivealoanlaptopduringthistimeifoneisavailable. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx8
10 Softwarerelatedproblems Inthecaseofaproblemduetosoftwareerrors,iftheproblemcannotbefixedwithin10 minutesthelaptopwillbereimagedandreturnedtothestudent.thiswilltakethelaptop backtoitsinitialconfiguration.latestupdates,however,willbeincluded. 8.2Reimaging Therewillbetimeswhenlaptopsmustbereimagedtosolvesoftwarerelatedissuesand conflicts. ITserviceswillnotbackupanyfileslocatedonthelaptop sharddrive. Warranty,Insurance,LossorDamage Thelaptopshavea3yearwarrantycoveringmanufacturingfaultsandaccidentaldamage, (NB.Nocoverageforlossortheft). Ifthereisanydamagetothelaptopand/orcase,orifthelaptopand/orcaseislostor stolen,andthisdamageorlossisduetowillful,deliberateornegligentactions,(apartfrom fairwearandtear),thestudentagreestomakegoodthedamageorlossorcompensatethe Collegeforthecostofrepairand/orrestitution. Shouldthestudent senrolmentatthecollegecease,thelaptopandcasemustbereturned tothecollegeingoodorderandcondition,(allowingforfairwearandtear). Duetotherelativelylowcostoftheindividuallaptops,thereisnoinsurancecoverageby thecollegeoverthelaptopsandcases.thereforeparentsandguardiansareurgedto reviewtheirowninsurancepoliciestodetermineiflossoftheequipmentiscoveredbytheir ownpolicies. TheCollegehaspurchasedhighqualitycasesforthelaptopsandtheseshouldbeusedatall timestopreventdamagetotheequipment.(pleasenote:thelaptopcasesmustbe returnedtothecollegeingoodorderattheendofthestudent senrolment.thesecases willremainthepropertyofthecollege.) 9.0 OnlineSafety Computerlaptops,althoughexcellenttoolsforeducation,canhaveanumberofnegative implicationsonthelivesofourstudents.wewouldliketoremindourparents/guardiansof thefollowingissuesthatmayarisewithcomputers. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx9
11 1. Computersarethemaintoolofthecyberbully.Pleasemonitoryourdaughterorson s useofthecomputerlaptopandcontacttherelevantpastoralcoordinatorifany concernsarise.pleasecontactthecollegedirectlyifissuesarise:usethecontactus fromthecollegewebsite,or school@stjamescollege.qld.edu.au,orphonethe Collegedirect: Addictiontocomputergames/socialnetworkingroomsisveryreal(Myspace,Bebo, etc.)ifyouareconcernedabouttheamountoftimeyourdaughterorsonisspending onthecomputerandyourequiresupportinrelationtothisissue,pleasecontactyour daughterorson spastoralcoordinatorand/orthestudentcounsellor. 3. Inappropriateinternetsites.Itisimportantthatwemakeallparents/guardiansaware thatonlywhenusingthestjamescollegenetworkdomainwillthestudent sinternet accessbeautomaticallyfiltered.itistheresponsibilityoftheparent/guardianto providingadequatefilteringoutsidethecollege snetworkdomain.agoodsourceof informationregardinginternetfilteringistheaustraliangovernment ssite, 4. Ethical,LegalandResponsibleUseofICLTResources StJamesCollegerequiresallusersofitsICLTresourcesdosoinanethical,legalandresponsible manner.usersofstjamescollegeicltresourcesmustbeawarethatuseoftheseresourcesare subject to the full range of laws that apply to the internet, communications and to the use of computers, and St James College policies.such law and principles include users' obligations in relation to copyright, intellectual property, breach of confidence, defamation, privacy, bullying/harassment, vilification and antidiscrimination legislation, the creation of contractual obligations,andothercivilandcriminallaws. St James College s ICLT resources must not be used for unauthorised commercial activities or unauthorisedpersonalgain.actionsperformedusingstjamescollegeicltresourcesmustcomply with the terms of any licence agreed to for the use of software programs and other online resources. 5. CopyrightandIntellectualPropertyRights Users must not, through the use of St James College ICLT resources, copy, download, store or transmit material which infringescopyrightortheintellectual propertyrights of others without appropriate approval.such material includes music files, movies, videos or any other form of media. Usersshouldbeawarethatactionsperformedusingcomputerandnetworkresources,regardless of any disclaimers that might be made, ultimately reflect on our educational institution and communityasawhole.thisisparticularlyrelevantwhereuserspostorsubmitmaterialinaway thatmakesitpubliclyavailableovertheinternet. 6. SecurityandPrivacy 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx10
12 Usershavearoletoplayinensuringthesecurityandprivacyofinformationtransmittedbyuseof theicltresources.usersareissuedwithuniqueusernamesandpasswords,whichshouldbekept strictlyconfidentialatalltimes. Usersmustprotectsystems,informationandaccountsby: Choosing a secure password which is changed regularly (a secure password is one that is difficulttoguess,forexample,containingacombinationofletterandnumbersandnotsimply anameordateofbirth) Notsharingapasswordwithanyone Respectingtheprivacyandconfidentialityofinformationthattheymaycomeacrossthrough accesstotheresources Reportinganybreachorprospectivebreachofnetworksecuritytotheappropriatetechnical personnelortheicltservices. Unacceptableconductbyuserswhichcouldresultinabreachofsecurityorprivacyincludes: Disclosingyourusernameandpassworddetailstoanotherperson Disclosingotherprivateorconfidentialinformationtounauthorisedpersons Gainingunauthorisedaccesstoanysystemsbyanymeans UsingStJamesCollegeICLTresourcestoattackorcompromiseanothersystemornetwork Downloading,installingorusingunauthorisedsoftwareprograms Deliberatelyinstallingcomputervirusesorothermaliciousprograms Accessingorinterceptingothers electroniccommunicationswithoutpermission. Usersshouldnot,asageneralrule,displaypersonalinformationaboutthemselvesinawaythatis publicly available. Where such disclosure is made through authorised avenues (for example, by the use of or an official website), users should be aware that invasions of privacy may sometimes occur and it is outside St James College's control to prevent such instances from occurring. Usersareremindedthat shouldnotbeusedtosendsensitiveandconfidentialinformation. Users must, however, be aware that the operation and maintenance of ICLT systems often requires the backup and caching of data, the logging of activity and the monitoring of general usagepatternsandassuch,completeconfidentialityandprivacycannotbeguaranteed.stjames College may also be required to inspect or provide copies of electronic communications where requiredtobylaw,orwheretheinvestigationofpossiblemisusesoficltresourcesisrequired. 7. BreachesoftheseConditionsofUse ThebreachoftheseConditionsofUsewillbetakenseriouslyandmayresultindisciplinaryaction beingtaken. ExamplesofpossibleconsequencesrangefromlossorrestrictionofaccesstoICLTresources,to formaldisciplinaryactionforbreachoftheacceptabletechnologyusepolicy.casesofserious, deliberate,and/orcriminalbreachwillbereferredtoexternalauthoritiesandmayresultincivilor criminalproceedings. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx11
13 IfyouhaveanyconcernspleasefeelfreetocontacttheCollege. Forfurtherinformationonprovidingasafeonlineenvironmentforstudentsvisitthesiteson thefollowingpage. Websites StaySmartOnline StaySmartOnlineprovidesallAustralianonlineuserswithinformationonthesimplestepsthey cantaketosecurethemselvesonline.thisincludesinformationandadviceonhowtosecure yourcomputerandyourtransactionsonline. Thiswebsitecontainsafreealertservicethatprovideseasytounderstandinformationonthe latestcybersecuritythreatsandvulnerabilities,afreeinteractiveeducationresourcefor primaryandsecondaryschoolstudents,videoswithusefultipsonprotectingyourcomputer,a selfassessmenttoolforsmallbusinesses,andinformationforparents. NetAlert NetAlertispartoftheAustralianGovernment'songoingcommitmenttoprovidingasafeonline environmentforallfamilies,especiallychildren. TheNetAlertwebsiteprovidesinformationaboutinternetcontentfiltersforPCsandis managedbythedepartmentofbroadband,communicationsandthedigitaleconomy(the Department). CyberSmart Cybersmartprovidesactivities,resourcesandpracticaladvicetohelpyoungkids,kids,teens andparentssafelyenjoytheonlineworld. Cybersmartalsoofferstrainingandresourcesforschoolsandmaterialsforlibrarystaff. DevelopedbytheAustralianCommunicationsandMediaAuthority,Cybersmartispartofthe AustralianGovernment scybersafetyprogram. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx12
14 AppendixA:LaptopTechnicalSpecifications FeComponents Technical Specification 1NoSmartCardReader,Intel(R)Core(TM)i53320M ProcessorBase 112.5"HD(1366x768)AntiglareLEDwithHDFixed FocusWebcam&DigitalArrayMicrophones 14GB(1x4GB)1333MHzDDR3SDRAM 1HardDriveBracket,LatitudeE GB7200rpmHardDrive 13YearWarranty,6cell(58Wh)PrimaryBattery 1IntegrationInformation 1OrderReadyProSupportTag 1ProSupportServiceLabel 1Intel(R)Core(TM)i5ProcessorLabel 1Intel(R)HDGraphics WACAdapter,3pin 1Intel(R)Centrino(R)AdvancedN6205( /05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx13
15 a/b/g/n)halfminicard 1DellWireless380BluetoothModule 1InternalBluetoothModuleCable,LatitudeE6230 1NoWWANCard 1InternalSinglePointingKeyboardwithAnti microbialprotection(english) 1BatteryCarries1YearWarrantyfromInvoiceDate (unlessselect3yrwarrantedbatteryis purchased) Software 1DellWebcamCentralSoftwareMediaKit 1DellWebcamCentralSoftware 1WindowsLiveEssentials 1Windows(R)7QFE 1Windows(R)7Professional32bit(English) 1Office2013Trial 1Office2013Software 1DellBackupandRecoveryManager(DBRMV1.3for Windows7) 1NoAntiVirusSoftware Service 1TechnicalSupport 13YrProSupport:NBDOnsiteService 1ProSupport:7x24TechnicalSupport&Assistance: 13YrAccidentalDamageProtection ture 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx14
16 APPENDIXB:StudentandParentLaptopComputer Guidelines 1.EducationPurposes a. Studentsaretousetheirlaptopcomputeronlyforeducationalpurposes. b. Thelaptopcomputercomespreinstalledwithallthenecessarysoftwareforstudentuse.Only authorisedsoftwareistobestoredonthelaptopcomputer. c. TheCollegereservestherighttocarryoutsoftware,hardwareanddatainspectionsoflaptop computersatanytime. 2.StudentResponsibilities a. Laptopsaretobekeptcleanandfreefromgraffitiandstickers. b. It is the student s responsibility to charge their laptop computer at home each evening. A limitednumberofsparebatteriesandchargingfacilitieswillbeavailable c. Studentsarenottoremoveanyidentificationlabelsfromtheirlaptopcomputer. d. Whiletravellingtoandfromschoollaptopcomputersaretobecarriedintheprotectivecase providedandplacedinschoolbags. e. laptopcomputersarenottobetakenoutofschoolbagsandusedduringrecessandlunchand shouldbeintheirprotectivecaseinsidethestudent sbagorlocker. f. The software loaded on the laptop computers is licensed to the College. Students are not permittedtocopy,transferordeletesoftware. 3.ParentResponsibilities a. Ensurestudentsfulfiltheirresponsibilitiesasoutlinedabove. b. SupervisestudentuseofthecomputerwhenathomeincludingtheirInternetuse. c. Ensurethestudenthastheircomputeratschooleachdayinaconditionthatwillenableittobe usableforanyeducationalpurpose. d. Complywiththepolicyoftheschoolinrelationtothereturn/transferofthedeviceintheevent ofthestudentleavingtheschoolpriortotheendofyear12. 4.DataBackupandSoftwareUpgrading a. StudentsareresponsibleforthebackupofalldataasrecommendedbytheCollege. b. Studentsareresponsibletoensurethatallsoftwareiskeptuptodate.(eg.OperatingSystem andinstalledantivirussoftware). 5.TechnicalSupport a. Studentswillbegivenfulllocaladministratorrightsoftheirlaptopcomputer. b. Studentswillbetrainedonhowtosupportandmaintaintheirlaptopcomputer. c. In the event of a software malfunction students may contact the College ICT Department for assistance. d. StudentsarerequiredtokeeptheirlaptopwithlatestMicrosoftandAntiVirusupdates 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx15
17 6.UseoftheCollegeWirelessNetworkandInternetAccess a. The use of the College Wireless Network and all associated infrastructure are available for educationalusewithstudentlaptopcomputers. b. Thedownloadingoflargefilesisnotpermittedduetobandwidthrestrictions. c. Studentsarenottoremovethevirussoftwareprovidedandreplaceitwithanothertypeofvirus software. d. Specific network settings are not to be removed or altered as this could affect the laptop computersabilitytoconnecttothecollegewirelessnetwork. 7.Warranty,Insurance,Loss,TheftorDamage a. Allinstancesofloss,damageortheftmustbereportedtotheCollegeICTSupportpersonnelas soonaspossible. b. Student laptop computers are covered by a three year warrantywith Accidental Damage Protection.Thiswarrantydoesnotcovertheftand/orfiredamage. c. Ifthereisanydamagetothelaptopand/orcase,orifthelaptopand/orcaseislostorstolen, andthisdamageorlossisduetowilful,deliberateornegligentactions,(apartfromfairwear andtear),youagreetomakegoodthedamageorlossorcompensatethecollegeforthecostof repairand/orrestitution. d. Shouldthestudent senrolmentatthecollegecease,thelaptopandcasemustbereturnedto thecollegeingoodorderandcondition,(allowingforfairwearandtear). e. In the event of a hardware malfunction a report must be made to ICLT Services as soon as possibleforwarrantyrepairtobeorganised. 8.AssessmentandHomework a. Students are encouraged to use their laptop computer for homework and assessment tasks. However, the loss of data or hardware malfunction cannot be grounds for the appeal of any assessmenttaskorhomework. 9.ClassroomUsage a. Studentlaptopcomputersaretobebroughttoschooleachday,howevertheclassroomteacher willmanagetheuseofthelaptopcomputersintheclassroom. b. No student is to take out or use a laptop computer without the permission of the classroom teacher. c. Wheninuse,thelaptopshouldbeplacedonatableordesk,notonlaps.Thelaptopshouldnot becarriedaroundwhilstthescreenisopen. 10.Ownership a. StudentshaveuseofthelaptopcomputerwhilsttheyareenrolledattheCollege.Ifstudents leave the College before the completion of Year 12 the laptop (including the case) must be returned to the College. Students who complete Year 12 at the college will have the laptop signedovertothemifthelaptopandsdcardareover3.5yearsinage. 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx16
18 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx17 APPENDIXC:AcceptableTechnologyUsePolicy Purpose Inlinewithtechnologicaldevelopment,StJamesCollegerecognizestheneedtoprovideaccessto onlineservicesthatenablestaffandstudentstoengageintheteaching,learningandadministrative processesoftheschool. Thepurposeofthispolicyistoestablishandmaintainanattitudeofvigilanceinrelationtosafety, misuseandlegalliability. Staff,studentsandvolunteers(afterwardsinthisdocumentknownas Users )areprovidedwith accesstoselectedictincludinginternet,intranetfacilitiesandservicestosupporttheirrolesin teaching,learning,researchandadministration. Useforothernoneducationalreasons,includingbutnotlimitedto,conductingbusinessor commercialactivity,otherprofitmakingventures,productadvertising,disclosureofpersonalor privateinformation,politicalactivityandmischievousorfraudulentpurposesisnotacceptableand maybedealtwithundercollegebehaviormanagementprocedures,ereapolicies,orstateor Commonwealthlegislation. Scope Thispolicyappliestoallstudents,staffandvolunteersassociatedwithStJamesCollege.Itisexpected thatallusersatstjamescollegewillrefrainfromanyinappropriateuse,upholdthepoliciesandvalues oftheschool,therequirementsofthestateandcommonwealthlawandguidetheiractivities accordingly. Procedure Allusersmaybegrantedaccesstotheinternetinordertoachievethemaximumeducational opportunitiessubjecttothefollowingprocedures. BeforebeinggrantedaccesstoICT,internetand services,allusersmustsigntheAcceptable TechnologyUseAgreement. Usersmayusetheservicesforworkrelatedbusinessandaredirectedtorefrainfrompersonaluse ofservicesprovidedbeyondwhatisdescribedasbeinglimitedpersonaluse. Usersshallnotaccessanyobjectionableoroffensivematerial,materialcontrarytothelawor materialinappropriatetoaneducationalorworkenvironment. Usersshallnotpostorforwarddefamatory,inaccurate,personal,sensitive,abusive,obscene, profane,sexuallyoriented,threatening,offensiveorillegalmaterial. messagesorattachmentsthatcontainorarereasonablysuspectedtocontainoffensive materialmustnotbeopenedorsent. Usersareaccountableforadutyofcareintermsoftheinformationtheyprovideandaccessover internet/intranetconnections. UserswhosuspectorknowofinappropriateusemustreportthemattertothePrincipal. Everyeffortistobemadetouseanyinformationservicesprovidedinacostefficientway.
19 Anyuseridentifiedasasecurityriskorwhohasbeenaccessinginappropriatematerialorusingthe networkforanyinappropriateactivitymaybedeniedaccesstotheservicesatthediscretionofthe Principal. AnyuserwhobreachesthispolicyoranyotherrelevantStateorCommonwealthlegislationwillface disciplinaryactioninaccordancewiththesepolicies. Usersshouldbeawarethatbreachofthispolicymayalsoleadtoexternalactionbeingtakenagainst thembyathirdparty(egbreachoftheantidiscriminationlawsordefamationofcharacter). Usersmustnotshareaccountsordivulgepasswordstoothers. Usersmustnotattempttogainaccesstosystemsorserviceswithoutauthorization,orengagein activitieswhichdisruptorcorruptservicesorinformation. Usersmustnotdisclosepersonalinformationofschoolpersonnelorgroup addressesto agenciesorindividualsoutsidetheschool. Usersmustnotaccess,intercept,modifyordestroy ,data,filesorprogramsbelongingtoother usersorengageinactivitieswhichharassorthreatenotherusers. Usersmustnotaccess,downloadordistributecopyrightedorillegalmaterialsormaterialofa morallydubiousnaturefromtheinternet. StaffandstudentsmaynotuseCollegeICTresourcestoaccesssocialnetworksites. StaffmaynotuseICTsocialnetworkssitestocontact,accessorengagewithstudentspresently enrolledattheschool. StaffandstudentsaretoensurethattheCollegeisportrayedinapositivewayonallsocial networkingsitesincluding . AstheCollegehasownershipandlegalrighttoICTproperty,itreservestherighttoaccessany informationthatresidesorissentfromortoanycollegeowneddevice. Relatedlegislation CommonwealthCriminalCode AntiDiscriminationActQLD1991 PrivacyAmendment(PrivateSector)Act2001(Commonwealth) WorkingwithChildrenAct2000 Education(AccreditationofNonStateSchools)Act2001 2/05/2013G:\TTG_ICT\11Laptops\SJCLaptopPolicy.docx18
HP Laptop & Apple ipads
Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview
More informationSt Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet
St Peter Claver College Student 1:1 Laptop Program Years 7-12 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Acceptable use of ICT resources
More informationST MARY S COLLEGE STUDENT 1:1 LAPTOP PROGRAM YEARS 7-12. Policy and Guidelines Booklet
ST MARY S COLLEGE STUDENT 1:1 LAPTOP PROGRAM YEARS 7-12 Policy and Guidelines Booklet Contents 1. St. Mary s College Vision for Learning and teaching... 2 2. Overview of Student and Parent Responsibilities...
More informationStudent Laptop Program
Student Laptop Program Student Name: Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 3 2. Overview of Student and Parent Responsibilities... 4
More informationSt John Fisher College
2015 Information Technologies (IT) Policy and Guidelines Booklet For Students and Parents TABLE OF CONTENTS INTRODUCTION... 2 IT ACCEPTABLE USE POLICY... 3 STUDENT AND PARENT LOAN LAPTOP COMPUTER GUIDELINES...
More informationSt Columban s College 1:1 Laptop Guidelines & Policy Booklet
St Columban s College 1:1 Laptop Guidelines & Policy Booklet St Columban's College 1:1 Laptop Program Page 1 TABLE OF CONTENTS OVERVIEW 2 SECTION 1 THE 1:1 MACBOOK PROGRAM 3 SECTION 2 STUDENT RESPONSIBILITIES
More informationICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
More informationStudent Laptop Computer Program
Student Laptop Computer Program v0.1 29 October 2009 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Overview of Student and Parent Responsibilities...
More informationONE TO ONE LAPTOP PROGRAMME POLICY
ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...
More informationUnity College Student 1:1 Laptop Computer Program Policy and Guidelines Booklet
Unity College Student 1:1 Laptop Computer Program Policy and Guidelines Booklet Year 2015 TABLE OF CONTENTS TABLE OF CONTENTS... 1 EDUCATIONAL OPPORTUNITIES OF A 1 TO 1 LAPTOP PROGRAM... 2 OVERVIEW OF
More informationDIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
More informationKenmore State High School Student Laptop Charter
Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6
More informationHAZELDENE LOWER SCHOOL
HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016
More informationTECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
More informationSt Charbel s College. Bring Your Own Device (BYOD) Policy Agreement
St Charbel s College Bring Your Own Device (BYOD) Policy Agreement St Charbel s College s Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. St
More informationAuthorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together
Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:
More informationK-20 Network Acceptable Use Guidelines/Internet Safety Requirements
Page 1 of 5 K-20 Network Acceptable Use Guidelines/Internet Safety Requirements These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive
More informationStudent Laptop User Charter
Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both
More informationBlacklisting Procedure
Blacklisting Procedure Related Policy ICT Services and Facilities Use Policy Responsible Approved by Approved and commenced August, 2014 Review by August, 2017 Responsible Organisational Unit Information
More informationNazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures
Nazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures 1. Introduction Nazareth Catholic College acknowledges the increasing use of Information and Communication
More informationPOSITION INFORMATION DOCUMENT EDUCATION SUPPORT OFFICER CHRISTIAN BROTHERS COLLEGE - Adelaide (AN ACCREDITED EDMUND RICE EDUCATION AUSTRALIA SCHOOL)
POSITION INFORMATION DOCUMENT EDUCATION SUPPORT OFFICER CHRISTIAN BROTHERS COLLEGE - Adelaide (AN ACCREDITED EDMUND RICE EDUCATION AUSTRALIA SCHOOL) Name Position Title Employment Stream IT Technician
More informationNOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0
NOS for IT User and Application Specialist IT Security (ESKITU04) November 2014 V1.0 NOS Reference ESKITU040 ESKITU041 ESKITU042 Level 3 not defined Use digital systems NOS Title Set up and use security
More informationBox Hill Senior Secondary College/MYSC
Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication
More informationDigital Device LOAN CHARTER
Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to
More informationSydney Technical High School
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
More informationSOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
More informationStudents are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
More information1 to 1 Laptop Programs Brisbane Catholic Education
1 to 1 Laptop Programs Brisbane Catholic Education Introduction What is a one to one program? A 1 to 1 laptop program provides every student and teacher access to his or her own laptop computer in a wireless
More informationAcceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
More informationResponsible Use Agreement
BYOD is an acronym for Bring your Own Device. For BYOD, a "device" is a privately owned laptop, tablet computing device, netbook, notebook, e-reader, ipod touch (or similar), or cell/smart phone. For the
More informationBOARD OF EDUCATION Cherry Hill, New Jersey
BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to
More informationVICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationBCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
More informationStrathfield Girls High School Bring your Own Device User Charter
Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More informationICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
More informationDevice: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.
Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring
More informationElectronic business conditions of use
Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users
More informationCyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.
Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes
More informationSenior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES
Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the
More informationComputer Facilities and External Networks Acceptable Use by Students
Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic
More informationAcceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
More informationPolicy No: 2-B8. Originally Released: 2001. Date for Review: 2016
Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for
More informationmicros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
More informationBring Your Own Device Program: User Charter
Bring Your Own Device Program: User Charter Turramurra High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. The wireless network and
More informationMeánscoil na mbráithre Críostaí, Cill Chainnigh
Meánscoil na mbráithre Críostaí, Cill Chainnigh Christian Brothers Secondary School, Kilkenny. Phone: : 056 056 7721402 7721402 Fax: Fax: 056 056 7763652 7763652 email: E-mail: office@cbskilkenny.ie cbskk@indigo.ie
More informationCloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online
More informationICT-based communication and collaboration for learning policy
ICT-based communication and collaboration for learning policy Approved by School Association October 2007 Table of Contents Policy statement... 3 Background and rationale... 3 Introduction... 3 The national
More informationInformation Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy
Working Together Information Security Policy Information Security Policy May 2012 Borders College 19/10/12 1 Working Together Information Security Policy 1. Introduction Borders College recognises that
More informationThird Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
More informationBring Your Own x. INFORMATION AND PROCEDURES HANDBOOK Version 2014-12-10
Bring Your Own x INFORMATION AND PROCEDURES HANDBOOK Version 2014-12-10 Contents BYOx Transition Plan... 3 Forward... 3 Introduction... 3 BYOx Vision... 4 Software and Applications... 4 Microsoft Office...
More informationInformation Management and Security Policy
Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail
More informationQuincy Public Schools Information Technology. Acceptable Use Policy for Staff, Students, and Guests
Quincy Public Schools Information Technology Acceptable Use Policy for Staff, Students, and Guests Revised May 6, 2013 Introduction This Acceptable Use Policy is enacted as of May 2013 by the Quincy School
More informationNAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures. (March 2012)
NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures (March 2012) Contents Ownership... 3 Privately-owned devices... 4 Optional peripherals... 4 Warranty & Insurance... 4 Stolen or Lost Laptops...
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationService Schedule for CLOUD SERVICES
Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this
More informationHUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
More informationINTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP)
4510.2 INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP) The Board of Education is committed to the optimization of student learning and teaching. The Board considers computers to be a valuable tool for
More informationBring Your Own Device (BYOD) Acceptable Use Agreement 2015
Monivae College Bring Your Own Device (BYOD) Acceptable Use Agreement 2015 This agreement is applicable to all: 1. students in Years 7, 8, 9, 10 and 11 using their own device to access the College network
More informationGREENWICH PUBLIC SCHOOLS Greenwich, Connecticut
Policy E-040 Effective Learning Environment GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut Procedure E-040.4 - Acceptable Use and Internet Safety Agreement Acceptable Technology Use Regulations/Internet
More informationipad Acceptable Use Regulation
ipad Acceptable Use Regulation The Mamaroneck School District has purchased Apple ipads for selected students of the Mamaroneck School District. These students will be issued ipads with predetermined applications
More informationINTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures Purpose The purpose of the ACH Network Acceptable Use Procedures is to provide the procedures, rules, guidelines,
More informationAcceptable Media Use and Bring Your Own Device (BYOD) Policy
Acceptable Media Use and Bring Your Own Device (BYOD) Policy Author: Mr Joe Cowell Headteacher Date Ratified by Governors: September 2015 Date of Review: September 2018 Wollaston School Acceptable Media
More informationDublin City University
Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationImproving Classroom Management
Improving Classroom Management Research suggests ways administrators and staff developers can help teachers with the important task of organizing and managing classrooms. Julie P. Sanford, Edmund T. Emmer,
More informationParent Owned Device Program
Parent Owned Device Program Faith Excellence Community Compassion Purpose Introduction of the Parent Owned Device Program supports our vision to provide excellence in student centered learning in a global
More informationChristian Academy of Knoxville Technology Responsible Use Agreement 2015-2016
Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 PURPOSE Christian Academy of Knoxville provides technology resources for the school community with a belief that the educational
More informationIAAS Product Terms PRODUCT TERMS
IAAS Product Terms PRODUCT TERMS 1. Our contract with you 1.1. These Product Terms apply to the services ( IAAS Services ) provided by the Company ( us, we or our ) to the Client ( you or your ) under
More informationHow To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
More informationThis page outlines the General Conditions of access to and use of the Site. Acknowledgment and acceptance of General Conditions
TERMS OF USE This page outlines the General Conditions of access to and use of the Site. Acknowledgment and acceptance of General Conditions (Site) is owned and operated by 3P Learning Pty Ltd, the company
More informationAcceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
More informationUSER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting
More informationSaint Martin s Catholic Academy
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
More informationIP AUSTRALIA B2B ONLINE TRANSACTION SYSTEM AGREEMENT
IP AUSTRALIA B2B ONLINE TRANSACTION SYSTEM AGREEMENT Name of Customer: (The Customer) A.C.N. A.B.N. IPA Customer Number Telephone Fax Email Physical Address Postcode Mail Address Postcode Name of the Customer
More informationLowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy
BYOD Program 2015 BYOD Student Agreement/Acceptable Use Policy/Online Services Policy The student and parent/guardian must carefully read the above contract before signing it. Any questions should be addressed
More informationCalwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement
111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use
More informationEMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards
EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data
More informationHow To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
More informationEastwood Local Schools Laptop Policies and Handbook
Eastwood Local Schools Laptop Policies and Handbook Table of Contents Program Overview - 3 Acceptable Use Policy - 4 Information Technology Resources Responsibilities & Agreement - 7 District Laptop Service
More informationHIPAA/HITECH Compliance Using VMware vcloud Air
Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More informationInformation Technology Services
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
More informationCARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
More informationQUALIFICATION HANDBOOK
QUALIFICATION HANDBOOK Level 2 Extended Certificate in Health Informatics (7450-12) February 2012 Version 1.0 Qualification at a glance Subject area City & Guilds number 7450 Health Informatics Age group
More informationParent FAQ s. 1:1 Laptop Program. Introduction. 1-to-1 devices and student learning. Will students use computers too much for schoolwork?
Introduction What is a one-to-one program? One-to-one learning provides every student and teacher access to his or her own laptop computer in a wireless environment allowing students to learn at their
More informationViva Energy may from time to time amend, delete or supplement these Terms and Conditions. Any change takes effect from the earlier of:
SHELL CARD ONLINE TERMS AND CONDITIONS VERSION: AUGUST 2014 1. SCOPE 1.1 These Terms and Conditions apply to use of the Shell Card Online (SCOL) web programme accessible via www.vivaenergy.com.au, by a
More informationNational Secondary School Computer Fund Meridan State College Q3 Take Home Laptop Charter. Student NSSCF Charter
National Secondary School Computer Fund Meridan State College Q3 Take Home Laptop Charter Student NSSCF Charter Contents STUDENT NSSCF CHARTER... 3 NSSCF OVERVIEW... 3 DEVICE CARE... 4 DATA SECURITY AND
More informationAcceptable Network Usage Policy
Acceptable Network Usage Policy Purpose: The Lumen Christi Catholic College computer network is provided for staff and students to facilitate resource sharing, innovation and communication. All students
More informationLEEMING SENIOR HIGH SCHOOL. Bring Your Own Device Information and Policy 2015
LEEMING SENIOR HIGH SCHOOL Bring Your Own Device Information and Policy 2015 1 1 Dear Parent/Guardian Since the ending of the Federal Government s Digital Education Revolution funding, Leeming SHS can
More informationGARDENVALE PRIMARY SCHOOL BYOD
GARDENVALE PRIMARY SCHOOL BYOD (Bring Your Own Device) POLICY This policy operates in conjunction with the Victorian Department of Education and Early Childhood development and Gardenvale Primary School
More informationAcceptable Use Guidelines
Attachment to the Computer and Information Security and Information Management Policies Acceptable Use Guidelines NZQA Quality Management System Supporting Document Purpose These Acceptable Use Guidelines
More informationStudent & Staff Access and Use of Networked Information Resources and Communications
Page 1 of 6 These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive and effective digital citizenship among students and staff. Digital
More informationSt Vincent s Catholic Primary School e-safety Policy
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
More informationICT Acceptable Use Policy. August 2015
ICT Acceptable Use Policy August 2015 Document title ICT Acceptable Use Policy August 2015 Document author and department Responsible person and department Robbie Walker, Information Security Architect,
More informationCustodian-Node data provision terms and conditions
Custodian-Node data provision terms and conditions Parties Node Operator Data Custodian Background A B C D E [Insert legal name of node][insert ACN/ABN/ARBN] of [Insert address]\ [Insert legal name of
More informationDATA PROTECTION POLICY
DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy
More informationBring Your Own Device Program: 2015 User Agreement
Bring Your Own Device Program: 2015 User Agreement Asquith Girls High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. Asquith Girls High
More information