1 HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY This policy applies whenever you are using Heathfield High School information technology equipment or services. It should be read in conjunction with the Heathfield High School Cyber-Safety Policy, and for those students who have been issued with a school notebook computer, the Heathfield High School Student Notebook Acceptable Use Policy. In some cases, conditions of the Heathfield High School Student Notebook Acceptable Use Policy will override or modify conditions in this policy. Where this is the case, students must ensure that they apply those conditions only when using their personal notebook computer. When using school workstations, the conditions stated in this policy will apply. Your access to, and use of, the Heathfield High School IT System must be Only for school use with regard to your subject work. In accordance with the information contained in this policy. User-Names and Passwords Access to the network is only allowed through your individual network account, which has a unique user-name and password. You will be responsible for any and all use of the network, including the cost of printing, Internet access, access and disk storage, or actions such as harassment, bullying or accessing inappropriate material, which occurs using your user-name and password. You must keep your password secret. You must memorise your password, and not write it down anywhere. If you write your password down, or leave your password slip lying around, and someone else learns your password, they will be able to use your printing and Internet accounts, causing you to pay for their use. If you suspect that someone has learnt your password, report the matter immediately to one of the IT staff. When you finish using a computer, you must log-off using the Log off option on the Start menu. If you do not, another user will be able to print or access the Internet using your user-name and password, and you will be responsible for the cost and their actions. You must only log-on to the network using your own user-name and password. If you access the network using another user s user-name and password, or deliberately allow another student to access the network using your user-name and password, both accounts will immediately be disabled. In addition, other consequences will follow. If you forget your password, you will need to contact one of the IT staff to have a new one issued to you. An administration fee of $5.00 may be charged for this. Storing Data Files To make sure that your data is safe and backed-up, it is very important that you only save files on the network servers. You have been given your own folder on the network in which you must save your personal files. This folder appears as your Documents folder. Everything that you save should be saved in Documents. You must not save files in any other location on the network, or on the hard disk of a school workstation you are using, unless a staff member has given you specific permission to do so. You should not save documents to your desktop, as this will increase the time it will take for you to log-on or log-off the network. If you need to work on files at home, you should save those files on a USB memory device, or them to your home account. You are responsible for all information saved in your personal folder, as nobody can access your personal folder unless they know your user-name and password. You should be aware that your personal folders will be monitored by IT staff and/or teaching staff to ensure that you are not saving inappropriate material. Care Of The Network You have a responsibility to treat the school s computing resources (hardware, software, network, furniture, etc) with respect.
2 You must not take your bag(s) into any of the computing rooms. All bags must be placed on the racks provided outside the computing rooms. As this is a safety issue, all bags not placed in bag racks may be removed from the area, and may only be collected at a time convenient to the school. You must not eat or drink in any of the computing rooms, or while using any of the school s computers. You must leave the computing area neat and tidy when you have finished working. You must report any problems with network equipment to a member of the IT staff. You must not attempt to connect, disconnect, move or otherwise interfere with any computers, monitors, mice, keyboards, printers, cables, or any other hardware. You must not connect any personal IT equipment such as notebook computers or mobile phones to the network, including by wireless, infrared or Bluetooth connections, unless you have been given specific permission to do so by a member of the IT staff. You must not attempt to access, create, delete or otherwise change any software or hardware settings, or interfere with the normal operation of the network in any way. School computers carry labels with identification numbers and/or barcodes, and operating system licence numbers. These labels must not be removed or damaged in any way. The removal of, or damage to, the operating system licence sticker invalidates the licence. If this occurs, you will be charged for the cost of an equivalent operating system licence. If you are responsible for any damage to a computer or other hardware, your IT account will immediately be disabled, and you will be charged for the cost of that damage. If the damage is wilful, police may be involved. Before you logon to any computer, you must check the computer for any existing damage. If you find any damage, it is your responsibility to report that damage to a member of the IT support staff immediately you logon to the computer. To do this, you should click on the Report Computer Damage application on the Start menu. This application will automatically identify the computer and your user name. You should type a brief description of the damage, and then click on the Submit button. Once you have done this, you can close the application and continue with your work. A member of the IT support staff will rectify the damage you have reported as soon as possible, and if necessary, steps will be taken to identify the student responsible for the damage. If you logon to a computer which is damaged, and you do not report the damage immediately, you may be held responsible for that damage. Acceptable Use Of The Network The Heathfield High School computer system is provided for use related to your school studies only. You must follow the following guidelines. You must not use the computers for playing games at any time, including before or after school, or at recess and lunch times. You must not create, access, save, or send any material that contains common swear words, or that is violent, racist, sexist, pornographic, malicious, harassing, bullying, offensive, or illegal in any way. You must not download, save, access or run any games, utility programs or other executable programs (.exe,.com,.bat,.scr,.pif, etc), either on the network file-servers, or on removable media such as USB devices used on the school network, apart from those applications provided by the school. You must not attempt to spread any form of unsolicited (spam) or chain letters, or any malicious software (such as viruses or worms). You must not use any kind of messaging program to send messages to other users of the network. You must respect the laws relating to copyright and intellectual property rights when using the network. You must not copy information from other students, the internet or any other source, unless the owner of that information has given permission for the material to be copied. You must not copy information and present that information as your own work. You must acknowledge the source of any information that you copy and include in your work. You should be aware that your use of the IT system is recorded in network logs, and is monitored by IT staff and/or teaching staff to ensure that you comply with this policy. If necessary, the school may commission an independent forensic audit that may cover any stored content, and all aspects of network use including and internet access. Printing Printing is costly, and it is important to make sure that resources are not wasted by indiscriminate use of printers. You will be given a printing account with an initial credit at the start of each year. Your printing account will be charged for each page you print on any of the school s printers. The cost per page will depend on the size of the page, and whether it is black and white or colour. Information about your initial printing credit and the cost per page is subject to change. Current information is available on the school website at Click on About HHS Policies Information Technology. You can check the balance of your printing account at any time by clicking on the Start menu, and then selecting Printing Account Status. When your printing account balance gets low, you can purchase additional printing credit from the cashier. This credit can be purchased in multiples of $1.00 or $5.00.
3 If you need to print as part of your studies, it is your responsibility to ensure that you have adequate credit in your printing account to cover your printing needs. Internet Access and Heathfield High School provides access to the internet and an account to all students for educational use only. Heathfield High School policy is to maximise the use of the internet for educational purposes by providing internet access for educational use at no charge to students and parents. However, if a student abuses this policy and downloads large quantities of non-educational material (including, but not limited to, music, videos, movies, games, applications, torrents), the school retains the right to recoup the cost of those non-educational downloads from students and/or parents. You must only connect to the internet in the approved manner, using the school s proxy server. You must not attempt to bypass this server, connect to the internet using alternative internet access devices, connect to the internet using any anonymous proxy server, or bypass any security, filtering or monitoring in any way. You will be given an internet account with an initial download credit at the start of each year. Your internet credit will be charged each time you access the internet. This includes viewing web pages, sending or receiving s, or downloading files. Information about your initial internet credit and download costs is subject to change. Current information is available on the school website at Click on About HHS Policies Information Technology. When your Internet account balance gets low, you can arrange additional internet credit at the IT Office. The granting of additional credit is provisional on your adherence to this policy, and in particular, on your use of the internet for educational use. If you request additional internet credit, and IT staff determine that your use of the internet has been for non-educational use, additional credit will not be granted, and you will be liable for the cost of that non-educational use, and subject to the consequences of breaching this policy. You must not use the internet to access or send content such as s, that contain common swear words, or that is violent, racist, sexist, pornographic, malicious, harassing, bullying, offensive, or illegal in any way. You must not download streaming audio or video from the internet unless you have been given specific permission to do so by a staff member or a member of the IT staff. You must not access any file-sharing websites (such as torrents) to download material from the internet, such as music, videos, games or applications, unless you have been given specific permission to do so by a staff member or a member of the IT staff. You should be aware that all your access to the Internet, including the sites you visit, any material you download, and attempts to access blocked sites or to send inappropriate are recorded in logs that are monitored by IT staff and/or teaching staff. What Happens If You Breach the Information Technology Acceptable Use Policy If you breach this policy, you will be subject to Heathfield High School s Behaviour Management Policy. Minor breaches of this policy will result in the suspension of your IT account for a period of two weeks. Repeated occurrences of a minor breach or breaches will lead to the suspension of your IT account for a period of up to ten weeks, and/or your suspension from school. Minor breaches include, but are not limited to - Eating or drinking in the IT areas. Not placing bags on the bag racks supplied. Inappropriate use of furniture. The playing of computer games. Sending s that contain a common swear word or words. Major breaches of this policy will result in the suspension of your IT account for a period of up to ten weeks, and/or your suspension from school. Major breaches include, but are not limited to - Giving your password to another student to access the network. Using another student s password to access the network. Saving executable programs from any source on the network. Using executable programs from any source, other than those programs installed on the network. Use of abusive, sexist, racist or threatening language in any document or . Using excessive swear words or other inappropriate language. Deliberately damaging any equipment, irrespective of the extent of damage. Interfering with any network hardware or software. Attempting to circumvent network security in any way. Attempting to bypass the DECS proxy server, accessing the internet through a non-approved device, or accessing the internet through an anonymous proxy server.
4 If you behave online in a manner that threatens the well-being of another child, student, parent or member of the school community, even if this occurs off-site and or out of school hours, the principal has the authority under regulations pursuant to the Education Act 1972 to suspend or exclude you from attendance at school. If the principal suspects an electronic crime has been committed, this will be reported to the South Australian Police Department (SAPOL). Where there is a further reasonable suspicion that evidence of a crime, such as an assault, is contained on a mobile phone or other electronic device such as a notebook computer, the device will be confiscated and handed to the investigating police officer. SAPOL will determine any further action.
5 HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY PARENT & STUDENT AGREEMENT 1. To gain access to Heathfield High School s Information Technology systems, student and parent(s) must read this policy, understand its contents, and sign and return this Parent and Student Agreement page to the school. You should keep the policy for reference. 2. This agreement supersedes all previous agreements relating to information technology use at Heathfield High School, and should be read in conjunction with the Heathfield High School Cyber-Safety Policy, and where appropriate, the Heathfield High School Student Notebook Acceptable Use Policy. 3. This policy and agreement, along with any additions or amendments, will remain in force as long as a student is enrolled at Heathfield High School. 4. If it becomes necessary to add to, or to amend any of the conditions of this policy, parents and students will be advised in writing via the school newsletter. 5. The latest version of this policy is available for download from the Heathfield High School website, at PARENT AGREEMENT I have read and understood the Heathfield High School Information Technology Acceptable Use Policy, and understand that student access is granted for educational purposes according to the conditions stated in this policy. I understand that the internet is a global network of computers, and that whilst Heathfield High School will monitor student use of the internet, it is not able to control the content, or restrict student access to all controversial or inappropriate materials. I agree that I will not hold the school responsible for any material encountered on the internet. I am aware that any costs associated with the repair or replacement of information technology equipment damaged by my child may be borne by me, the parent / caregiver. I am aware that my signing and returning of this form constitutes a commitment to pay such costs, and that Heathfield High School's policies relating to the recovery of debts will apply. I give permission for to be granted access to the Heathfield HS IT systems, and to the internet. (student name) Parent s Signature: Date: STUDENT AGREEMENT I have read and understood the Heathfield High School Information Technology Acceptable Use Policy, and agree to abide by those rules and conditions. I understand that if I do not abide by this policy, my use of Heathfield High School information technology systems will be suspended, and that I will be subject to the school s Behaviour Management Policy and the possible repercussions stated below. Student s Signature: Date: If you breach this policy, you will be subject to Heathfield High School s Behaviour Management Policy. Minor breaches of this policy will result in the suspension of your IT account for a period of two weeks. Repeated occurrences of a minor breach or breaches will lead to the suspension of your IT account for a period of up to ten weeks, and/or your suspension from school. Minor breaches include, but are not limited to - Eating or drinking in the IT areas. Not placing bags on the bag racks supplied. Inappropriate use of furniture. The playing of computer games. Sending s that contain a common swear word or words.
6 Major breaches of this policy will result in the suspension of your IT account for a period of up to ten weeks, and/or your suspension from school. Major breaches include, but are not limited to - Giving your password to another student to access the network. Using another student s password to access the network. Saving executable programs from any source on the network. Using executable programs from any source, other than those programs installed on the network. Use of abusive, sexist, racist or threatening language in any document or . Using excessive swear words or other inappropriate language. Deliberately damaging any equipment, irrespective of the extent of damage. Interfering with any network hardware or software. Attempting to circumvent network security in any way. Attempting to bypass the DECS proxy server, or accessing the internet through an anonymous proxy server. If you behave online in a manner that threatens the well-being of another child, student, parent or member of the school community, even if this occurs off-site and or out of school hours, the principal has the authority under the regulation pursuant to the Education Act 1972 to suspend or exclude you from attendance at school. If the principal suspects an electronic crime has been committed, this will be reported to the South Australian Police Department (SAPOL). Where there is a further reasonable suspicion that evidence of a crime, such as an assault, is contained on a mobile phone or other electronic device such as a laptop, the device will be confiscated and handed to the investigating police officer. SAPOL will determine any further action.
INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY Your access to, and use of, the Heathfield High School IT System must be - Only for school use with regard to your subject work. In accordance
ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
Nazareth Catholic College Student Acceptable Use of Information and Communications Technology Procedures 1. Introduction Nazareth Catholic College acknowledges the increasing use of Information and Communication
CYBERSAFETY USE AGREEMENT for Cambridge High School Students Cambridge High School This document is comprised of this cover page and three sections: Section A: Introduction Section B: Cybersafety Rules
Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes
KINGSTON COMMUNITY SCHOOL Country Style Education with City Style Opportunities Student Laptop User Agreement Contents Agreement Rationale 2 TERM AND CONDITIONS 2 The Laptop 2 Software, Copyright and Intellectual
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
GLENUNGA INTERNATIONAL HIGH SCHOOL ONE-2-ONE LEARNING LAPTOP PROGRAM 2011 Department of Education and Children s Services T/A South Australian Government Schools CRICOS Provider No. 00018A 1. VISION and
Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6
South Sydney High School Bring-Your-Own-Device (BYOD) Policy Bring your own device (BYOD) refers to technology models where students bring a personally owned device to school for the purpose of learning.
Years 3-7 Acceptable Use Policy & Agreement Reidy Park Primary School is committed to enhancing teaching and learning through the safe use of information and communication technologies (ICTs). We require
Student Tablet Guide Contents 1. School Day 2. A list of Do s 3. A list of Do Not s 4. Support Model 5. FAQ 6. File management 7. Backing up 8. Online citizenship 9. Parents 10. Tablet Keys and Ports Front
Bright Local Schools BYOD Acceptable Use Policy Why Bring Your Own Device at Bright Local Schools? Bright Local is dedicated to providing 21st Century instruction to all its students. We feel we must provide
National Secondary School Computer Fund Meridan State College Q4 Take Home Tablet Charter Student NSSCF Charter Contents Student NSSCF Charter... 3 NSSCF overview... 3 Device care... 4 Data security and
Bring Your Own Device Program: 2015 User Agreement Asquith Girls High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. Asquith Girls High
Havelock Academy Broadening Horizons Acceptable use of IT, e-safety and BYOD September 2014 M Trussell Director of IT September 2014 Purpose The purpose of this Acceptable Use of IT Policy (referred to
MOBILE PHONE & COMPUTER USE POLICY epal epal is the online learning hub for the Australian Performing Arts Grammar School. It is a main form of communication between parents, students, staff and administration.
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
National Secondary School Computer Fund Meridan State College Q3 Take Home Laptop Charter Student NSSCF Charter Contents STUDENT NSSCF CHARTER... 3 NSSCF OVERVIEW... 3 DEVICE CARE... 4 DATA SECURITY AND
Administrative Procedure 140 Background RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET This Administrative Procedure is to guide users in the proper use of technology within the Division. The goal of the
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
1 Dracut Public Schools Technology Acceptable Use Policy Revised 2014 The Dracut Public Schools (DPS) encourages the use of information technology to assist staff and students with academic success, preparation
Administrative RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES For any individual or group utilizing WRDSB technology Responsibility: Legal References: Related References:
Dresden International School Computer and IT Use Policy Overview This document specifies the important ground rules that students must follow when using computers, IT services and IT equipment provided
Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:
Laptops for Students Program Technology Use Agreement Handbook Expanding Learning to the 21st Century and Beyond PAGE 1 OF 13 Table of Contents Laptop Policy & Procedures Handbook 3 Objectives 3 Laptop
JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.
Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to
I N F O R M A T I O N C O M M U N I C A T I O N A N D T E C H N O L O G Y P O L I C Y PURPOSE To ensure that the safety and integrity of MRAEL s and ATCNB s data, physical information technology infrastructure
BYOD is an acronym for Bring your Own Device. For BYOD, a "device" is a privately owned laptop, tablet computing device, netbook, notebook, e-reader, ipod touch (or similar), or cell/smart phone. For the
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring
Maypearl ISD Bring Your Own Device (B.Y.O.D.) 1 Purpose Providing students and staff with a 21 st century digital learning environment is part of the Maypearl ISD core values. Maypearl Independent School
SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081 POLICY: COMPUTER/INTERNET ACCEPTABLE USE POLICY AGREEMENT Overview Access to information is fundamental to citizenship and the foundation for further
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will
The Fulham Boys School ipad Acceptable Use Policy, Procedures and Information Except where specifically stated otherwise, the policies, procedures and information within this document apply to all ipads
Iowa Park CISD BYOD Policy 2013-2014 Table of Contents Table of Contents Table of Contents... 2 Purpose... 3 What is the D in BYOD.... 3 Guidelines... 3 Wireless Information...5 Responsible Use Policy...6
Acceptable Network Usage Policy Purpose: The Lumen Christi Catholic College computer network is provided for staff and students to facilitate resource sharing, innovation and communication. All students
Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Marryatville High School Laptop Handbook 2014 Contents Battery... 3 Charging Your Battery... 3 Caring For Your Laptop... 3 Packing Away Your Laptop... 3 Operating Conditions... 3 LCD Screens... 3 AC Adaptor...
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET ACCEPTABLE USE POLICY As part of the College IT programme we offer pupils filtered access to the Internet. Before being allowed to use
Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
Policy Document Information and Communication Technology and E-Safety Acceptable Use Policy Mission Statement The school is committed to the use of ICT across the curriculum and to providing all students
CC. TECHNOLOGY ACCEPTABLE USE POLICY 1. Purpose a. The Children s Internet Protection Act (CIPA), 47 U.S.C. 254(h)(5), and South Dakota Consolidated Statues Section 22-24-55 require public schools to implement
Parent Owned Device Program Faith Excellence Community Compassion Purpose Introduction of the Parent Owned Device Program supports our vision to provide excellence in student centered learning in a global
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have
Palacios High School Creating a Culture of excellence through High Expectations Student/Parent Laptop Handbook 2014-2015 Page 2 of 18 Table of Contents Purpose of the Laptop Checkout Initiative 3 Terms
Eastwood Local Schools Laptop Policies and Handbook Table of Contents Program Overview - 3 Acceptable Use Policy - 4 Information Technology Resources Responsibilities & Agreement - 7 District Laptop Service
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal
2011-2012 Frisco ISD Table of Contents Table of Contents Table of Contents... 2 Purpose... 3 Google Apps for Students... 3 Responsible Use Policy... 4 Wireless Information... 5 Frequently Asked Questions...
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important
E-Safety Policy & Procedures Version Policy Originator: Equality Impact Assessed: Approved by: SMT Date Approved: April 2015 Review Interval: Annually Last Review Date: - Next Review Date: April 2016 Audience:
MOSMAN HIGH SCHOOL NSW DEC BRING YOUR OWN DEVICE STUDENT AGREEMENT Students who wish to take advantage of the BYOD policy must read this agreement in the company of their parent/caregiver. This page is
Geyserville New Tech Academy Student Technology Acceptable Use Policy Overview. The (GUSD) makes a variety of communications and information technologies available to students through computer/network/internet
WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT Revised 2011 IRON MOUNTAIN PUBLIC SCHOOLS ACCEPTABLE USE POLICY FOR ELECTRONIC RESOURCES All Iron Mountain Public
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized