FIRBANK GRAMMAR SCHOOL

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "FIRBANK GRAMMAR SCHOOL"

Transcription

1 FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated

2 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students... 3 General Agreement for use of Classroom Technology at Firbank Grammar School... 3 Computer Hardware and Software Protocols... 3 Communication and Internet Protocols... 4 Studywiz Use... 5 Backing Up of Work... 5 Mobile Device Management... 5 Policy Agreement... 6 Cyber Safety

3 Policy for the Acceptable Use of Technology - Students Firbank recognises and values the importance of technology and the pivotal role it plays in the education of our students. The technology programs and facilities at Firbank Grammar School provide students, teachers and support staff with resources to assist with the school programs and administrative duties. The Firbank Grammar School computer network is provided for students and staff members to facilitate educational excellence through resource sharing and communication. All students from Year 3 are provided with School-administered individual network accounts enabling resource sharing, communication and internet access. As with all privileges, its use involves responsibilities. Student use of communication systems (e.g. internet and ) may be monitored to ensure compliance with this policy and privileges may be withdrawn if students fail to comply with this agreement. It is the responsibility of individual students to ensure that their behaviour does not contravene School rules. General Agreement for use of Classroom Technology at Firbank Grammar School When using technologies provided by Firbank Grammar School, students should understand that electronic communications is not a secure means of communication and nothing is private. Students must protect all computer and technology resources and adhere to the following protocols and guidelines: 1. Students must not reveal their password to anyone except the network manager/system administrator or Senior member of staff( if requested to do so) 2. Students should not consume food or drink (including water bottles) while using technology hardware 3. Students should not play computer games or use mobile devices or computers in any way not approved by a teacher. 4. Student computer laboratories are not open for unsupervised student use at lunch time or after school 5. Students should abide by Copyright laws and should not infringe by stealing, copying or using another person s work without authorisation and acknowledgement. 6. Students should be aware that any photos, videos, recordings and text that they put online will remain online (even after deletion), possibly forever. They should be aware that they have very limited control over what happens to content once it is online. Computer Hardware and Software Protocols Firbank Grammar School has modern and reliable technology facilities for the benefit of students and their learning. This equipment is expensive and must be treated with respect. 1. Students must not do anything likely to disable or cause damage to any equipment or digital information deliberately or carelessly including stealing, vandalising, marking or defacing 3

4 equipment, interfering with software, reducing network security, accessing another s home directory, etc. 2. Students must not attempt to change any computer settings (including screen savers, wallpapers, desktops, menus, etc) without permission. 3. Students must not bring or download unauthorised programs (including games) to the School or run them on School computers. 4. Students must take responsibility for all their printing costs. 5. External devices e.g. USBs, digital cameras, portable hard drives, ( but not limited to these), are not to be used for inappropriate purposes. 6. The use of mobile devices is encouraged in all lessons provided they are used as directed by teaching staff. Recess and lunchtime use of mobile devices is permitted provided guidelines in the user agreement are adhered to. Communication and Internet Protocols and other electronic communication facilities are valuable tools for personal and official communication. 1. Students must never log on for another student, or as another student 2. Students should not use the School s or any other communication system in a manner that brings the School into disrepute. 3. Students should be aware that all sent is the property of the School and cannot be regarded as their private property. 4. Students should understand that their correspondence via and other communication systems while using the school network is not guaranteed to be private. All is available to the School network administrators when they deem it necessary to investigate inappropriate behaviour. 5. Students should use appropriate language in all electronic communication; they must not be insulting, abusive, swear or use vulgarities. 6. Students should not communicate offensively using , websites and other social media environments with the intention of attacking, bullying, harassing or intimidating any other person. 7. Students must behave online in the same way as they would offline or in person (i.e. treat everyone fairly and with courtesy). They must avoid communicating anything digitally that they would not say in person. 8. Students should be careful of websites requiring them to submit their address because this may put them at risk of receiving unsolicited (SPAM) which may be offensive and may render their account inoperable. 9. Students should know and understand that anonymous electronic communication is prohibited. 10. Students must never send or receive electronic messages using someone else s name or account. 11. All electronic communication between students and School staff should be via the student s Firbank account or via Studywiz. 12. If an comes from someone that the student does not know they should delete it immediately to avoid system infection, particularly if it contains attachments. They must NOT open the attachment in case it contains a virus. 13. Real time chat programs (eg. imessage, Facebook, Windows Messenger, etc) are NOT to be used by students during lesson time. 4

5 14. Firbank Grammar School provides access to the Internet for educational purposes. The School is aware that, despite security precautions, there is a possibility of inappropriate material intentionally and unintentionally being obtained and displayed. Students must not deliberately enter or remain in, websites containing objectionable material. The School will monitor internet sites and will block those which are deemed inappropriate 15. Students must not use the School s Internet facility in a manner that brings the School into disrepute. 16. Students must not use the Internet for inappropriate use. 17. Students must understand that their use of the internet at School is for educational purposes and that their digital footprint (analysis of websites visited) may be tracked by the School s technical staff. 18. Students should understand that material posted online or sent via social networking sites may develop a life of its own and may be used by others in ways not predicted or intended. 19. Students need to be aware and understand that, under current Australian law and Digital Rights Management (DRM), it is illegal to download or share copyrighted music, video and games without permission or payment. If they download these files illegally or share illegal downloads, they may be prosecuted. Studywiz Use Studywiz is the School s secure online intranet (or Virtual Learning Environment VLE) designed to manage any type of files (eg. MS Word, IWB flipcharts, graphics, etc) and facilitate communication between students, teachers and staff. Studywiz enables the use of Calendar, Discussions, ebulletins, Chats, Student Websites and Messaging, all within the protected and safe Firbank environment. Material uploaded by students to Studywiz must be appropriate and accurate and must not violate Copyright law. Backing Up of Work Files stored on the Home Drive and Student Public Drives is backed up. Work stored locally on classroom computers is not backed up. If you work on a shared project with other students and save it on the Student Share drive, be aware that this will be deleted at the end of each academic year. If you wish to keep a copy of the work, you need to move it to your own Home Drive or make a personal copy. Mobile Device Management Students will be allowed to bring such devices to School and use them in out of class time. Students will use these as directed by the teacher during class time, for educational purposes. The use of mobile devices on camps, tours and excursions will be the decision of the teacher in charge of the event, and will depend on the nature and need of each individual event. The uploading to public sites (including Studywiz), of any photos or videos which are taken during the course of the School day, or of a School event, is prohibited. Students may only do this when directed to by a teacher. The care and safety of mobile devices is the responsibility of the student. The School will not accept responsibility for the damage or loss of such devices. 5

6 Policy Agreement To be completed on enrolment by the Firbank Grammar School student Name: School: Year Level: Network User Name: I have read the attached Guidelines and Procedures for the Use of Technology document and agree to comply with the guidelines and conditions contained in this Policy. I understand that if I break any of these guidelines and protocols, appropriate penalties will apply Student signature: Date: To be completed on enrolment by the Parent or Legal Guardian of the Firbank Grammar School student and forwarded to the Enrolment Office Name of Parent or Legal Guardian: I, the Parent or Legal Guardian of have read and understand the Student Policy of Acceptable Classroom Use of Technology document. I agree that my child will comply with the guidelines and conditions contained in this Policy. Signature: Date: 6

7 Cyber Safety Cyber Bullying can take different forms. It includes, but is not limited to the following definitions Cyber bullying includes text or images which may be posted on personal Web sites, blogs or transmitted via , discussion groups, message boards, chat rooms, IM or cell phones. More frequently, cyber bullying occurs on social network sites. Cyber bullying is being hurtful to others by sending or posting harmful material or engaging in other forms of social cruelty using the Internet or other digital technologies. Cyber bullying can take different forms, including the following: Flaming: Online fights using electronic messages with angry and vulgar language Harassment: Repeatedly sending offensive, rude and insulting messages Denigration: Dissing someone on-line; sending or posting hurtful gossip or rumours about a person to damage that person s reputation or friendships. Impersonation: Breaking into someone s account, posing as that person and sending messages to make the person look bad, get that person into trouble or danger, or damage that person s reputation or friendships. Outing and Trickery: Sharing someone s secrets or embarrassing information or images on-line; tricking someone into revealing secrets or embarrassing information which is then shared on-line Exclusion: Intentionally excluding someone from an on-line group, such as a buddy group. Cyber Stalking: Repeatedly sending messages that include threats of harm or are highly intimidating, engaging in other on-line activities that make a person afraid about personal safety. The impact of Cyber Bullying: Bullying can result in long term psychological harm. This harm includes low self esteem, depression, anger, school failure, school avoidance, and in some cases may lead to more serious consequences. On-line communications can be extremely vicious. There is no escape as it can occur at all times of the day and evening. Cyber bullying material can be distributed worldwide and is often irretrievable. Students may be reluctant to tell an adult because they are emotionally traumatised, blame themselves, fear greater retribution, or fear that their on-line activities or use of mobile devices will be restricted. In order to keep safe on-line and have positive experiences, students should remember these important steps Messaging and Never share your passwords, no matter how much you trust your friends. Do not reply to nasty messages. Block senders of inappropriate or unpleasant messages or delete the person if she or he are on your contact list. Set your account to off-line, even when you are on-line. Save all s and turn on history in your messaging service to keep a record of all messages. Print out the history. 7

8 Create a screen capture of any negative contact by pressing Alt PrtSc on your keyboard. Paste the message into a document and save a copy as well as printing a copy for evidence. Go to the program s website. Find the help menu and type in How to report abuse? Follow the guidelines. Create a new account to contact friends. Report the sender to the messaging or provider. Remember that unknown, private and anonymous communication can be traced. Mobile Phone Don t give out your mobile number to people you don t know or trust. Don t reply to nasty messages. Turn your phone off or onto silent when it s bedtime. Save all messages as evidence. Tell a trusted adult or call the Cybersafety Contact Centre phone: Contact your telecommunications carrier to block numbers If you or someone you know is being bullied online, there are a number of ways to obtain some help. You can contact or obtain help from: Your friends A trusted adult Teachers Tutor Head of Year Parents School Counsellors Bullying No Way visit Cybersafety Contact Centre phone Kids Help Line phone

Acceptable Network Usage Policy

Acceptable Network Usage Policy Acceptable Network Usage Policy Purpose: The Lumen Christi Catholic College computer network is provided for staff and students to facilitate resource sharing, innovation and communication. All students

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

Lee County School District

Lee County School District Lee County School District Acceptable Use Policy This Acceptable Use Policy outlines the guidelines and behaviors that users are expected to follow when using school technologies or when using personally-owned

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

Box Hill Senior Secondary College/MYSC

Box Hill Senior Secondary College/MYSC Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication

More information

School Policy Regarding Computer Use, Technology and Internet Access

School Policy Regarding Computer Use, Technology and Internet Access School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school

More information

La Mesa-Spring Valley School District Acceptable Use of Technology Agreement for Students Grades 3 8

La Mesa-Spring Valley School District Acceptable Use of Technology Agreement for Students Grades 3 8 La Mesa-Spring Valley School District Acceptable Use of Technology Agreement for Students Grades 3 8 Introduction - La Mesa-Spring Valley School District believes that access to technology in school gives

More information

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 1.0 Introduction St. Thomas Aquinas Catholic School recognizes that access to technology in school gives

More information

Brownsburg Community School Corporation Acceptable Use Policy 2012-2013

Brownsburg Community School Corporation Acceptable Use Policy 2012-2013 Introduction Brownsburg Community School Corporation Acceptable Use Policy 2012-2013 The Brownsburg Community School Corporation (BCSC) recognizes that access to technology in school gives students greater

More information

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.

More information

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois 6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission

More information

Grace Christian School Technology Acceptable Use Policy

Grace Christian School Technology Acceptable Use Policy Grace Christian School Technology Acceptable Use Policy Introduction Grace Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate,

More information

INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY

INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY Your access to, and use of, the Heathfield High School IT System must be - Only for school use with regard to your subject work. In accordance

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage. Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or

More information

Simon Langton Grammar School for Boys E-Safety Policy

Simon Langton Grammar School for Boys E-Safety Policy Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

Baldwin County Public Schools. Acceptable Use Policy

Baldwin County Public Schools. Acceptable Use Policy Introduction Baldwin County Public Schools Acceptable Use Policy Baldwin County Public Schools (BCPS) recognizes that access to technology in school gives students greater opportunities to learn, engage,

More information

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 (Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I

More information

Technology Acceptable Use Policy

Technology Acceptable Use Policy Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop

More information

E-Safety Policy (Parent/Pupil) March 2013

E-Safety Policy (Parent/Pupil) March 2013 E-Safety Policy (Parent/Pupil) March 2013 1 ICT, Internet, Intranet and E-Mail Policy (Parent/Pupil) 1. Policy statement The purpose of this document is to set out detailed guidance for parents of pupils

More information

ICT Policy Rationale Desired Outcomes Pupils Safe and legal use of ICT by al. E-confident staff A school community Self-seeking pupils and staff

ICT Policy Rationale Desired Outcomes Pupils Safe and legal use of ICT by al. E-confident staff A school community Self-seeking pupils and staff ICT Policy Rationale Belfast Boys Model School believes in using digital and online technologies appropriately, effectively and creatively to empower learning, teaching and leadership. The school recognises

More information

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) YUKON PUBLIC SCHOOLS: DISTRICT POLICY BJ-R1 YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) To ensure that our students and employees become proficient in

More information

Passwords Students should not share their assigned password, or attempt to discover the school Apple Id.

Passwords Students should not share their assigned password, or attempt to discover the school Apple Id. Alta Loma Christian School Acceptable Use Policy 1:1 ipad Program Revised January 20, 2014 Alta Loma Christian (ALCS) recognizes that access to technology in school gives students greater opportunities

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

COMPUTER NETWORK FOR EDUCATION REGULATION

COMPUTER NETWORK FOR EDUCATION REGULATION COMPUTER NETWORK FOR EDUCATION REGULATION 4526-R The following rules and regulations govern the use of the district's computer network system and access to the Internet. I. Administration The Superintendent

More information

CYBER BULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING. Read this CYBERBULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING

CYBER BULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING. Read this CYBERBULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING Read this CYBER BULLYING An initiative of the Department of Basic Education If you re like most teenagers, you spend a lot of time on a cell phone or instant messenger chatting with friends and uploading

More information

CYBERSAFETY USE AGREEMENT for Cambridge High School Students

CYBERSAFETY USE AGREEMENT for Cambridge High School Students CYBERSAFETY USE AGREEMENT for Cambridge High School Students Cambridge High School This document is comprised of this cover page and three sections: Section A: Introduction Section B: Cybersafety Rules

More information

Responsible Computer Use Policy for Students

Responsible Computer Use Policy for Students Responsible Computer Use Policy for Students Introduction By using the Sheldon College Network and ICT Services students agree to accept the terms and conditions outlined in this document. This policy

More information

HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY

HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY This policy applies whenever you are using Heathfield High School information technology equipment or services. It should be read in

More information

Portmarnock Community School ICT and Social Media Expected Use Policy. June 2013

Portmarnock Community School ICT and Social Media Expected Use Policy. June 2013 Portmarnock Community School ICT and Social Media Expected Use Policy June 2013 1.0 Introduction Portmarnock Community School recognizes that access to Information and Communication Technology (ICT) gives

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Acceptable Use Policy (AUP) School Computing

Acceptable Use Policy (AUP) School Computing Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

Parent / Guardian Consent for Technology Use in Schools

Parent / Guardian Consent for Technology Use in Schools Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,

More information

Front Range Christian School ipad Acceptable Use Policy

Front Range Christian School ipad Acceptable Use Policy Introduction Front Range Christian School ipad Acceptable Use Policy Front Range Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate,

More information

How will pupils gain access to the Internet and VLEs at Saintfield High School?

How will pupils gain access to the Internet and VLEs at Saintfield High School? SAINTFIELD HIGH SCHOOL POLICY FOR THE ACCEPTABLE USE OF THE INTERNET AND VIRTUAL LEARNING ENVIRONMENTS What is the Internet? The Internet is an electronic information highway connecting many thousands

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+

TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ BYOD (Bring Your Own Device) Technology Acceptable Use Washington District Schools provides all students access to technology, the district

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3

More information

ICT Safe and Acceptable Use Policy for Students

ICT Safe and Acceptable Use Policy for Students ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...

More information

THE LONG EATON SCHOOL

THE LONG EATON SCHOOL THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

MOBILE PHONE & COMPUTER USE POLICY

MOBILE PHONE & COMPUTER USE POLICY MOBILE PHONE & COMPUTER USE POLICY epal epal is the online learning hub for the Australian Performing Arts Grammar School. It is a main form of communication between parents, students, staff and administration.

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Cyber bullying, sexting and Facebook. Know the law, know your rights

Cyber bullying, sexting and Facebook. Know the law, know your rights Cyber bullying, sexting and Facebook Know the law, know your rights 2 Cyber bullying, sexting and Facebook Contents 4 Cyber bullying 10 Sexting 14 Facebook 17 More information 18 Useful websites Disclaimer

More information

Wakefield Public Schools Technology Acceptable Use Policy

Wakefield Public Schools Technology Acceptable Use Policy Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of

More information

Computer Facilities and External Networks Acceptable Use by Students

Computer Facilities and External Networks Acceptable Use by Students Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

Auburn University at Montgomery Policies and Procedures

Auburn University at Montgomery Policies and Procedures Auburn University at Montgomery Policies and Procedures Title: Responsible Office: Social Media Policy University Relations I. PURPOSE This policy outlines the procedures governing social media pages created

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Technology Acceptable Use Policy. Introduction

Technology Acceptable Use Policy. Introduction Technology Acceptable Use Policy Introduction Shiloh Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop skills

More information

Roles and Responsibilities The following section outlines the roles and responsibilities for e-safety of individuals and groups within the College:

Roles and Responsibilities The following section outlines the roles and responsibilities for e-safety of individuals and groups within the College: Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,

More information

Guidelines for Preventing and Dealing with Bullying Issues

Guidelines for Preventing and Dealing with Bullying Issues Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.

More information

PART A School support for the safe and responsible use of digital technologies

PART A School support for the safe and responsible use of digital technologies Western Port Secondary College Internet and Digital Technologies Acceptable Use Agreement for Students and Families Western Port Secondary College uses the Internet as a teaching and learning tool. We

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

Vail School District Acceptable Use Policy 2015 2016

Vail School District Acceptable Use Policy 2015 2016 Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will

More information

DISTRICT-WIDE NETWORK AND INTERNET APPROPRIATE USE

DISTRICT-WIDE NETWORK AND INTERNET APPROPRIATE USE Administrative Procedure 140 DISTRICT-WIDE NETWORK AND INTERNET APPROPRIATE USE Background School District No.43 (Coquitlam)'s District-wide network provides data communication links among all District

More information

Responsible use of ICT Devices Agreement

Responsible use of ICT Devices Agreement Responsible use of ICT Devices Agreement This document is comprised of this cover page and three sections: Section A: Section B: Section C: Introduction Cybersafety Rules for Junior Primary Students Cybersafety

More information

FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:

FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review: FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY Acceptable Use Policy Educational Purpose The computer system in Blackrock College has been established for a limited educational purpose. The term "educational purpose" includes classroom activities,

More information

Tablet Agreement. Sir Charles KAO UTC Tablet Usage Policy Amended: 20/8/15

Tablet Agreement. Sir Charles KAO UTC Tablet Usage Policy Amended: 20/8/15 ` Tablet Agreement 1 Tablet Agreement The focus of the Sir Charles Kao UTC is to support the learning and progress of our students through the use of technology and information. Excellence in education

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Marion County School District Computer Acceptable Use Policy

Marion County School District Computer Acceptable Use Policy Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through

More information

Students Acceptable Use Policy for Electronic Resources Rules Summary

Students Acceptable Use Policy for Electronic Resources Rules Summary Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must

More information

Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.

Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community. Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

Virginia Primary School Learning Together, Learning for our Future

Virginia Primary School Learning Together, Learning for our Future Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of

More information

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to

More information

Dracut Public Schools Technology Acceptable Use Policy Revised 2014

Dracut Public Schools Technology Acceptable Use Policy Revised 2014 1 Dracut Public Schools Technology Acceptable Use Policy Revised 2014 The Dracut Public Schools (DPS) encourages the use of information technology to assist staff and students with academic success, preparation

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

section 15 Computers, Email, Internet, and Communications

section 15 Computers, Email, Internet, and Communications section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

Dulwich College ICT Acceptable Use Policy

Dulwich College ICT Acceptable Use Policy Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These

More information

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

POLICY 4526. Adopted by Board of Education: 4/20/05

POLICY 4526. Adopted by Board of Education: 4/20/05 POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,

More information

Lutheran Education Association of Houston Acceptable Use Policy (Students)

Lutheran Education Association of Houston Acceptable Use Policy (Students) Lutheran Education Association of Houston Acceptable Use Policy (Students) With the use of technology, including the Internet, Intranet, hardware and software, the Lutheran Education Association of Houston

More information

Red Cloud Community Schools Acceptable Use and Internet Safety Policy

Red Cloud Community Schools Acceptable Use and Internet Safety Policy Red Cloud Community Schools Acceptable Use and Internet Safety Policy The Red Cloud Community School system maintains quality technology systems (hardware, software, and services) for the purposes of enhancing

More information

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement 111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

Years 3-7 Acceptable Use Policy & Agreement

Years 3-7 Acceptable Use Policy & Agreement Years 3-7 Acceptable Use Policy & Agreement Reidy Park Primary School is committed to enhancing teaching and learning through the safe use of information and communication technologies (ICTs). We require

More information

Cyber Safety Use Agreement Year 4 to Year 7 students

Cyber Safety Use Agreement Year 4 to Year 7 students Cyber Safety Use Agreement Year 4 to Year 7 students Dear Parents and Caregivers, To assist us to enhance learning through the safe use of information and communication technologies (ICTs), we are now

More information

ST JAMES PRESENCE ON SOCIAL MEDIA

ST JAMES PRESENCE ON SOCIAL MEDIA P o l i c i e s n P r o c e d u r e s n I n f o r m a t i o n T o t a l n u m b e r o f p a g e s 2 P o l i c y C r e a t i o n D a t e : 2 4 S e p t e m b e r 2 0 1 4 P o l i c y R e v i e w D a t e :

More information

COMPUTER, NETWORK AND INTERNET USE POLICY

COMPUTER, NETWORK AND INTERNET USE POLICY 4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate

More information

Ingle Farm East Primary School

Ingle Farm East Primary School Ingle Farm East Primary School Cyber-Safety Policy Endorsed by Governing Council on AUGUST, 2015 Review date AUGUST, 2018 Overview Measures to ensure the cyber-safety of Ingle Farm East Primary School

More information