1 Policy Document Information and Communication Technology and E-Safety Acceptable Use Policy
2 Mission Statement The school is committed to the use of ICT across the curriculum and to providing all students and staff with access to technology which will enhance teaching, facilitate learning and prepare them for the technological demands of a rapidly changing world. ICT Plan Targets and Objectives Overview To raise educational standards across all areas of the curriculum. To ensure staff and student training in the use of ICT is of the highest standard. To provide access on demand to technology that will meet the statutory demands and requirements of the National Curriculum in all subject areas. To ensure smooth management of a linked curricular and administrative network. To offer equal opportunities in ICT to all members of the school In considering how teaching might be extended by the use of ICT, the school recognises that research shows that both teachers and students who make frequent use of ICT to support their teaching and learning enjoy both greater motivation to teach and learn and enjoy higher levels of achievement. The school aims to use ICT to help reduce teacher workload in terms of preparation, planning and assessment. ICT should be used in a way that allows ideas to be presented or represented dynamically with information viewed in easily changed forms. ICT should be used in a way that allows feedback to be provided to pupils as they work. Interactive whole class teaching using ICT is a key way to deliver innovative and motivational lessons that really engage pupils and appeal to a range of sensory learning styles By teaching pupils using ICT they are prepared for a workplace dominated by computers. This is today s technology not tomorrow s. The positive effects of specific uses of ICT on pupils attainment in almost all the National Curriculum subjects is widely accepted. The most substantial evidence is in the core subjects of English, Mathematics and Science at all key stages. DSMS Governors have agreed to adopt this ICT policy and the whole school ICT development plan Departments should embed ICT within programs of study, schemes of work, long and short term planning. Whole school network infrastructure should be supported in a way that allows it to be developed in a sustainable way whilst allowing it to respond to changes in technology.
3 DSMS Acceptable Use Policy This Acceptable Use Policy refers to the regional broadband network supplied by Northern Grid and accessed via the DSMS network. DSMS are signatories of the Northern Grid and Easynet AUP For further details of Northern Grid s AUP please go to: /Final_AUP_for_Schools_and_LAs_November_2006.pdf For further details of Easynet s AUP please go to: This policy explains the behaviours, which are acceptable and unacceptable with regard to usage of the School s network. Any person using the DSMS network or service is required to comply with this Acceptable Use Policy (AUP). A version of this document must be agreed to by all users of the school network each time they logon to the school network. Failure or non-compliance will result in the School denying that person access to the school network. (see appendix a) This Acceptable Use Policy has been endorsed and approved by the Board of School Governors. The School seeks to promote high standards of teaching and learning by supporting the effective use of ICT. This policy applies to all users of the DSMS network. This includes local authority officers, head teachers, governors, teachers, pupils, classroom assistants, parent or voluntary helpers, school caretakers and other support staff. All users should note that the DSMS network is monitored on a regular basis and that DSMS reserve the right to delete anything held on their network and remove access rights without prior warning. Any user who is found to deliberately infringe this policy may be subject to disciplinary procedures or legal action. The DSMS Network (LAN) and associated services may be used for lawful purposes only. As a user of this service you agree not to use the service to send or receive materials or data, which is: in violation of any law or regulation which is defamatory, offensive, abusive, indecent, obscene which constitutes harassment is in breach of confidence, privacy, trade secrets is in breach of any third party Intellectual Property rights (including copyright) is in breach of any other rights or has any fraudulent purpose of effect. You are also prohibited from storing, distributing, transmitting or permitting the storage, distribution or transmission (whether intentionally or otherwise) of any unlawful material through the service.
4 Use of Data Off Site It is the responsibility of staff to ensure that any pupil data taken off-site either on memory stick, CD,DVD, Mobile Device, external hard drive or kept in the cloud (e.g. Microsoft SkyDrive or similar) is secure and not accessed by people not employed by the Academy Trust. In most cases it is possible to access information remotely and work on the network at home. However please be aware that any data relating to staff and pupils should then be removed from your personal computer. If you believe that you need to take data away from school i.e. on a laptop or data stick then this device must be kept securely and safely.. Unlawful and Illegal Use All material, which depicts the abuse of children and young people, is illegal. Other illegal material includes race hatred and incitement to violence. These are not exclusive categories. There may be other information/material that is deemed to be illegal. Accidental access to material, which may be classed as illegal should be reported to the Internet Watch Foundation (refer to subsequent section enititled Reporting Accidental Access to Illegal Material ). Examples of unlawful material include: Direct threats of physical harm Child abuse images Incitement to racial hatred Copyrighted, trademarked and other proprietary material used without proper authorisation You may not post, upload or otherwise distribute or permit the posting, uploading or distribution (whether intentionally or otherwise) of copyrighted material on our servers without the consent of the copyright holder. In the event DSMS or our broadband provider Northern Grid or our Internet Service Provider Easynet becomes aware of any breach of this clause, DSMS or Northern Grid or Easynet may take action. The storage, distribution, or transmission of unlawful materials could also lead to UK authorities alleging criminal liability. Examples of Illegal Acts: Accessing any child abuse images. Incitement to racial hatred Incitement to violence Software media counterfeiting or illegitimate distribution of copied software. Reporting Accidental Access to Illegal Material If you receive images, which you believe could be illegal it is imperative that you report the fact to the School s Network Manager. Make no attempt to investigate the content. The Network Manager will make a log reference to show that there is suspicion of inappropriate or illegal material. This log reference is to protect you from any
5 suspicion of having potential illegal material in your possession. Once this log has been made the URL if appropriate should be reported to the Internet Watch Foundation This must be done by typing the URL address into the report not by copy and paste. It is possible to accidentally open a link so care must be taken. If the content is an image in the body of an close the and report the incident to the School s Network Manager who will make a log reference and contact the IWF for advice on what to do next. Under no circumstances forward the , copy the image or show it to another person, as each of these actions constitutes an illegal offence. The IWF, is licensed to investigate, you are not. Any User of the DSMS Network who accidentally comes across illegal material should do the following: 1. Report the incident to the Head teacher, Network Manager or a senior member of staff who should then report to the Network Manager 2. Do not show anyone the content or make public the URL 3. Go to the IWF website at and click the report button 4. If reporting a URL do not use copy and paste, type the URL Inappropriate Use Please be aware that the use of ICT during the time specified as your school work day should be restricted to educational purposes. Personal use of equipment and resources should be restricted to outside of these times. Inappropriate use of the network includes accessing or having possession of material that is thought to be offensive such as adult pornography of any level, content of an obscene, indecent and/or abusive nature. You should be aware that disciplinary and/or civil action might arise if users are found to be accessing material of this nature across the School, Local Authority or regional network. Examples of Inappropriate Use: Visiting pornographic sites Causing offence to religious groups Inappropriate use of (See below - Use) Deliberate sabotage of the network; i.e. hacking, mail bombing etc. Reporting Accidental Access to Inappropriate Material Like any online service, it is impossible to guarantee that there will never be accidental access to inappropriate or offensive material. Any user of the DSMS network who accidentally comes across inappropriate or offensive material should do the following: 1. Inform the school s Network Manager of the incident and give the website address.
6 2. Ask the Network Manager to log the web address, time and username in the school web log book. 3. The Network Manager will block the website via the School s own filtering system smoothwall. 4. The school s Network Manager will contact Easynet school support helpdesk and report the web address subsequently asking for an investigation as to whether the website should be permanently blocked. Reporting Suspected Deliberate Abuse or Misuse Any person suspecting another of deliberate misuse or abuse of the School s network should take the following action: 1. Report in confidence to the school Network Manager or a senior member of staff who should then report to the Network Manager. 2. A representative of the school should then inform the Academy Trust. 3. The Academy Trust should complete an internal RIPA form, requiring Northern Grid to complete an internal investigation. 4. If this investigation results in confirmation of access to illegal materials or the Committing of illegal acts, Northern Grid will inform the relevant police authority who will complete their own investigations. 5. If the investigation confirms that inappropriate behaviour has occurred, Northern Grid will inform the relevant authority. This may be the Academy Trust or the School s board of governors. 6. In exceptional circumstances, where there are reasonable grounds to suspect that a user has committed a serious criminal offence, the police will be informed and a criminal prosecution may follow. Violations of system or network security Any violations of systems or network security are prohibited, and may result in the user facing criminal and civil action. DSMS will investigate incidents involving such violations and will inform and co-operate with the relevant law enforcement organisations. Violations may include, but are not limited to, the following: Unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network. Unauthorised monitoring of data or traffic on any network or system without express authorisation of the owner of the system or network. Interfering with any user, host or network including mailbombing, flooding, and deliberate attempts to overload a system and broadcast attacks. All DSMS machines will have full up to date and appropriate anti virus and anti spam protection. Any person found to be uploading malicious software or attempting to gain inappropriate access over and above designated level of permission will be immediately removed from the network and appropriate action against will be taken which may include informing the Police.
7 Security and Protection All users of the DSMS network will be individually identifiable. This means that every user of the network will have an individual username and password. This must be securely kept and not passed onto other users. In the event of an investigation into misuse, proper use of passwords will protect innocent users from the upset and embarrassment of suspicion for inappropriate or illegal misuse. Members of staff who have rights to the school network should take care to ensure that no unauthorised user obtains access to their password. This includes accidental or deliberate access by leaving machines active when not in use by authorised personnel. This also applies to allowing pupils use to a machine on which a staff member has logged on. Under no circumstances should any staff member allow pupils access to computers that the staff member is logged on to. Taking such action would allow pupils access to confidential files and a less strict filtering regime for the internet.
8 Use You may not send to any user who does not wish to receive it. DSMS recognises that is an informal medium. However, users must refrain from sending further to a user after receiving a request to stop. Chain letters are unsolicited by definition and may not be propagated using the Service. Flood s will result in the site s broadband connection being shutdown. You may not send, distribute or reply to mailbombs. Mailbombing is defined as either e- mailing copies of a single message to many users, or sending large or multiple files or messages to a single user with malicious intent. You may not use false headers or alter the headers of messages to conceal their address or to prevent Internet users from responding to messages. You may not use any address that you are not authorised to use. Students should not give out personnel details via s. All school communications must take place using staff addresses provided by the school through office365. This is to provide a level of protection and privacy for individual members of staff. Violations of the AUP outlined in this document can sometimes result in massive numbers of responses. If users receive so much that the school service is affected, we will remove the user from the system. World wide web usage All school machines, which are connected to the regional broadband network, access the internet via a secure proxy server device. Any attempt to bypass the proxy server will result in the removal of internet access privileges or removal from the school network. Any attempt to bypass the filtered Internet access to banned sites may result in the user being reported to the appropriate authorities resulting in legal or civil actions. The laws of all nation states, regulating such diverse subjects as intellectual property, fraud, defamation, pornography, insurance, banking, financial services and tax apply equally to online activities. However, the practical legal position regarding internet usage is often uncertain. Strictly, documents must not be published on the web which are defamatory or which may constitute intimidating, hostile or offensive material on the basis of sex, race, colour, religion, national origin, sexual orientation or disability under the sovereign law of the country in which the web server hosting the published material is sited. Strictly, material must not be accessed from the web, which would be objectionable on the above grounds under the sovereign law of the countries in which the networks transporting the material are sited or which would violate the Acceptable Use Policies of those networks. Given the impracticality of assessing the exact legal position with regard to the previous two paragraphs, the DSMS acceptable use protocol governing material that could be objectionable on the above grounds is grounded in English law.
9 Once information is published on the worldwide web anyone from anywhere in the world can access it. It is therefore critical that material of a proprietary or sensitive nature should not be published on unsecured public web sites. Internet usage from the DSMS network is monitored and a log is kept of all sites visited. Any violations identified may result in further investigation and potential criminal/disciplinary action. Where authorised by the Academy Trust, DSMS will proactively monitor, log and investigate internet access for an entire site or nominated users. Copyrights and licensing conditions must be observed when downloading from the web. Such files must never be transmitted or redistributed to third parties without the express permission of the copyright owner. Relevant legislation The following are a list of Acts that apply to the use of DSMS Network and Services: Regulation of Investigatory Powers Act 2000 Computers Misuse Act 1990 Protection from Harassment Act 1997 Sex Discrimination Act 1975 Race Relations Act 1976 Disability Discrimination Act 1995 Obscene Publications Act 1959 Telecommunications Act 1984 Protection of Children Act 1978 Criminal Justice Act 1988 Data Protection Act 1998 The Patents Act 1977 Copyright, Designs and Patents Act 1988 Defamation Act 1996 Freedom of Information Act 2000 Human Rights Use of Mobile or Removable Storage Device. DSMS does not allow the use of any mobile or removable storage device that is capable of being connected to a network on the school s LAN network unless the device has been approved by the School s Network Manager. People wishing to connect mobile devices to the Wi-Fi network should consult with the Network Manager for details on how to do this to set up the devices for internet access only. Connecting devices in this way does not allow access to network files and folders or SIMS. 1. Any mobile device allowed to be connected to the DSMS LAN network must be connected on a regular basis so that the software can be updated. 2. Mobile devices must not be used to take photographs or sound clips of any person who is unaware of the action and who has not given their permission. 3. Any use of mobile technology to intimidate, bully, harass or threaten others will be counted as an infringement of network use. This may result in disconnection from the network or legal
10 or civil disciplinary action. Uploading images and sound is only permissible if the subject involved gives permission. 4. Any images that involve children must not identify children by name and permission must have been agreed by the relevant parent / carer before posting. At DSMS, parents are asked on entry to the school if they will consent to the school taking and storing pictures of their children. Details of pupils that are not to be photographed are stored with heads of house and pastoral staff. Decision to Advise the Police for Criminal Investigation On the facts that are immediately available, a decision will be taken whether to refer the matter to the Police for criminal investigation. This does not preclude the matter being referred to the Police at any later stage when a formal investigation has been undertaken. Where DSMS are approached by an officer in an LA or any public body and asked to provide evidence or monitoring of a suspected site the following rules will apply. The Regulation of Investigatory Powers Act 2000 and its Application for Northern Grid The Home Office states that: The Regulation of Investigatory Powers Act 2000 (RIPA) provides for, and regulates the use of a range of investigative powers, by a variety of public authorities. It updates the law on the interception of communications to take account of technological change such as the growth of the Internet. It also puts other intrusive investigative techniques on a statutory footing for the very first time; provides new powers to help combat the threat posed by rising criminal use of strong encryption; and ensures that there is independent judicial oversight of the powers in the Act. Each police force and most councils including the members of Northern Grid are defined as a Public Authority to which RIPA applies. The forms of surveillance that the police and any council are entitled to authorise are covert directed surveillance and the use of covert human intelligence sources (informants). In any council only officers of the rank of deputy chief officer and above may be designated as Authorising Officers under RIPA. No covert directed surveillance or use of covert human intelligence sources may be undertaken without obtaining authority from such an Authorising Officer. RIPA requires that third parties (Northern Grid), that are required to provide information about other people subject to surveillance and investigation, should be approached for that information in a highly controlled manner by means of standard forms published by the Home Office. Northern Grid will require that all such applications for information be made in the appropriate manner. Disclaimer DSMS will endeavour, wherever possible, to provide a safe and secure environment for its users. However, users must be aware that we cannot guarantee complete safety from inappropriate or illegal material.
11 Computer Use Agreement The computer systems are owned by the school and are made available to staff and pupils to support and enhance education. Every precaution is taken to prevent computer misuse but the responsibility must lie with each individual to use ICT in a safe, sensible and responsible way. This agreement has been drawn up to protect all parties. Anyone who fails to comply with the agreement or who acts in a way which may be deemed inappropriate or irresponsible may lose access to the school computers. I will only access the PC network with my own user name and password, which I will keep secret. I will not allow the use of my computer account by any other member of staff or any pupil. I will not access other people s files unless through shared work areas. Any use of the computers will not involve any activities which would be damaging to the school or its reputation. I will only send messages that are polite and responsible. I will report any unpleasant material or messages sent to me. I understand my report would be confidential and would help protect everyone. I understand that the school has forensic software in place that monitors keystrokes and will report inappropriate activity and that the school may check my files at any time and may check the internet sites I visit. I understand that the school reserves the right to delete any files that may be held on its computer systems. I will not use the computer systems to access anything inappropriate i.e. pornographic, racist, sexist or offensive material. I will not download anything via the internet that may threaten the school ICT systems or attempt to bypass the school's filtering system. If issued with a lap top computer, ipad or any other ICT device I agree to bring it into school as requested. No software should be installed through any medium without first discussing this matter with the Network Manager. Any person who damages IT equipment will have their account suspended from the School system. They may not allowed to use IT in School until the costs to replace or repair damaged equipment is met. The full terms of this agreement and policy documentation is available on request.
12 Computer Use Agreement (Mobile Devices) The mobile computer systems, namely ipads and laptops, are owned by the school and are made available to staff and pupils to support and enhance education. Every precaution is taken to prevent computer misuse and our Internet Service Provider (ISP) has connected the devices via a nationally recognised blacklist program which endeavours to restrict connection to inappropriate websites. However, the responsibility must lie with each individual to use their own ICT, specifically Mobile Phones and their hard-ware (e.g. camera / voice recorder) in a safe, sensible and responsible way and as directed by staff. This agreement has been drawn up to protect all parties. Anyone who fails to comply with the agreement or who acts in a way which may be deemed inappropriate or irresponsible may have their access restricted or have the device confiscated. I will only access the Mobile Learning Device (MLD) with my own user name and password, which I will keep secret and I will not allow the use of my computer account by any other member of staff or pupil. I will not access other people s files unless through shared work areas. Use of the MLD will not involve any activities which would be damaging to the school or its reputation. I will only send messages that are polite and responsible. Pupils will only use with staff approval and will not give out personal information on line. I will report any unpleasant material or messages sent to me. I understand my report would be confidential and would help protect everyone. I understand that the school has forensic software in place and will report inappropriate activity; the school may check my files at any time and may check the internet sites I visit. I understand that our ISP, while blocking and managing the internet sites accessed, will report any inappropriate use of the device. This includes excessive download quantities. While there is no additional charge for excessive download quantities, pupils who do so may find their allowance limited to prevent additional bandwidth restrictions, this protects all parties. I understand that the school reserves the right to delete any files that may be held on its computer systems or on the MLD and that files should be removed when the devices are swapped between classes. I also understand that it is my responsibility to back-up files / data on a home or school computer as loss / breakage of the device could result in loss of pupil work. I will not use the school computer systems to access anything inappropriate i.e. pornographic, racist, sexist or offensive material. I will not download anything via the Internet that may threaten the school ICT systems or attempt to bypass our ISP s filtering system. I agree to bring my MLD in as requested and understand that it may be out of service while essential maintenance is performed. Apps and software for the ipads may be installed by the user of the ipad using their own Apple ID. Money for paid apps may be claimed back by producing valid receipts to the finance office. This money will come from department budgets. Any person who damages IT equipment will have their account suspended from the School system. They may not allowed to use IT in School until the costs to replace or repair damaged equipment is met. The full terms of this agreement and policy documentation is available on request. While MLD s are insured, all reasonable care should be taken of them so that cost of replacement is minimal.
INFORMATION TECHNOLOGY User Standards and Guidelines Manual May 2010 Division of Information Technology http://www.palmbeachschools.org/it/security.asp Table of Contents 1. Introduction... 4 2. Definitions...
Guideline Cyber-safety: Keeping Children Safe in a Connected World This document is currently under review. Please direct any queries regarding this document to the policy officer listed in Table 1. Insert
Delgado Community College Information Technology Security Policy Approved: *November 5, 2010 ) Delgado Community College IT Security Policy Page 2 *November 5, 2010 Table of Contents Title Page 1.0 Introduction
Guidance for Safer Working Practice for Adults who work with Children and Young People in Education settings. Guidance for Safer Working Practice for Adults who work with Children and Young People in Education
Let s Fight It Together What we can all do to prevent cyberbullying A GUIDE TO USING LET S FIGHT IT TOGETHER Welcome to Let s Fight It Together. This resource packs aims to help children, young people,
Location: The Juilliard School Irene Diamond Building Main Office Room: 248 Phone: 212-799-5000 ext. 7121 Email: firstname.lastname@example.org Website: Information Technology Computer Labs There are two computer
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Reducing the Cyber Risk in 10 Critical Areas Information Risk Management Regime Establish a governance framework Enable and support risk management across the organisation. Determine your risk appetite
bullying and harassment at work A toolkit for UCU branch and LA officers Including health and safety representatives and equality officers Contents Introduction.............................................................
Cyber Security Planning Guide The below entities collaborated in the creation of this guide. This does not constitute or imply an endorsement by the FCC of any commercial product, service or enterprise
CODE OF ETHICS & BUSINESS CONDUCT 1 FOREWORD Dear Employees, Dear Officers, As representatives of the European Olympus companies (all European companies belonging to Olympus Europa Holding GmbH, Olympus
Mediacom Online Internet Access Service Customer and User Agreement The following are terms and conditions for use of Internet access and related services offered to residential, business and other subscribers
THE USE OF TECHNOLOGY IN WALDORF SCHOOLS 2013 SURVEY RESULTS COLLECTED AND COMPILED BY SAM GLAZE AWSNA SURVEY ON TECHNOLOGY IN WALDORF SCHOOLS FINAL REPORT JUNE 2013 The Office of Outreach and Development
December 2009 www.riotinto.com The way we work Our global code of business conduct 01_02 Rio Tinto Rio Tinto is a world leader in finding, mining and processing the Earth s mineral resources. The Group
Protective practices for staff in their interactions with children and young people Guidelines for staff working or volunteering in education and care settings Protective practices for staff in their interactions
Cyber Security Planning Guide The below entities collaborated in the creation of this guide. This does not constitute or imply an endorsement by the FCC of any commercial product, service or enterprise
Yorkshire Adoption Agency DOMESTIC ADOPTION INFORMATION 1 Thank you for requesting this information leaflet about Domestic Adoption. The purpose of the leaflet is to answer frequently asked questions about
Data breach notification guide: A guide to handling personal information security breaches August 2014 The Office of the Australian Information Commissioner (OAIC) was established on 1 November 2010 by
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Data protection Subject access code of practice Dealing with requests from individuals for personal information Contents 3 Contents 1. About this code of practice 4 Purpose of the code 4 Who should use