Colmers Computer Monitoring Guidance for best practice
|
|
- Laurence Mathews
- 8 years ago
- Views:
Transcription
1 Colmers Computer Monitoring Guidance for best practice
2 Background Having computers in Colmers classrooms enables there to be a fantastic tool for teaching and learning close at hand. Use of computers provides teachers with ideas; enable lesson delivery and planning, enable the sharing of resources, reduce workload, facilitate record keeping, progress tracking and communication with other staff members or the wider educational community. For student use the benefits are widely acknowledged. On the downside is the need for monitoring computer activity, protecting network users from unwanted advertising or malicious hacking, and from inappropriate social exchanges, or even illegal and unprofessional conduct. Colmers has monitored computer use for a long time. There is now a need to put in place a policy that demonstrates how we are to use the enormous amount of data our monitoring system generates. Colmers Acceptable Use Policy (AUP) Colmers Acceptable use Policy is a key document. Colmers School has separate policies for staff and students, but both delineate parameters for using school computers, stating clearly which activities are permissible and which are not. Each time we log on to the network we are reminded of the AUP, if users do not agree then they do not have to log on. Mechanical and Software Filtering We use content filtering on any Colmers computer that may be able to access the Internet. Birmingham Grid for Learning (BGFL) manages our filtering of content accessible via the internet. Filtering is by keyword and barring sites to be viewed. Individual requests to bar specific sites can be made. This is usually a 4 day turn around. Filtering may be done in a number of ways including using a firewall set to block an array of known "bad sites" or by using content filtering software or a content filtering service. Content commonly filtered includes pornography, gratuitous violence and hate literature. Unfortunately, software does not always distinguish between medical information and pornography or historical information and hate literature. Human intervention may be required to train our software and manually block sites and contents as required. This is often referred to as managing false positives.
3 Monitoring Computer Activity There are three ways we monitor activity on computers. 1. For students the first is by the teacher walking around the room or being seated where the student computer screens are easy to view. This has the advantage of being inexpensive and needing minimal expertise. This is still to be encouraged as you can see the frantic mouse activity that ensues when you approach, students attempt to quickly close something, click off a window or close down a machine. The student can log back on or / and the teacher can see what they have been doing on the internet by looking at Internet Browsing History. 2. The second way is our use of software that allows the teacher to monitor the students activities in our IT rooms. This can be used to give feedback, celebrate success and give demonstrations, redirect, or even shut down a computer where the user is off-task or reaching questionable territory. We have Classroom Computer Monitoring Software in all IT Rooms. 3. The third way is the use of our Schoolwide Computer Monitoring Software. This is a piece of software provided by BGFL that captures images of questionable behaviour as the user does it. It enables us to create a safe learning environment for students and teachers, where the freedom to explore is balanced with our commitment to e-safety. Best practice advice (some starting points) Preselecting web sites and Teacher Directed Web Searches Preselecting sites (choosing a range of suitable sites for the students to visit before the lesson) and Teacher Directed Web Searches (for example the teacher suggesting key words for a Google search) is a really effective tip to stop the temptations of students and preventing them stumbling on inappropriate subject matter. This is particularly recommended for sensitive issues. Computer activity in any classroom should focus on the subject matter being taught. Teachers may choose to preselect websites for their topic, or they may be able to take advantage of subscription web resources so that viewed content is guaranteed by the student logging on. (A good example is used by the Maths Department, By using web links and viewable instruction sheets for students the E- Learning portal allows you to do this very easily. Visible monitoring of students as they work in an IT room
4 Where students are using a computer in a lesson the teacher will need to monitor activities closely, as best as they can, making sure the students remain on-task and that their activity, both directed and undirected is appropriate. Using our Classroom Computer Monitoring Software is a useful tool to assist you with this Independent / Less structured use of ICT in class time There can be tremendous benefits of this, for example students using their own key words in Google to search for information regarding their project. Staff do need to consider how they will monitor this type of activity Seating plan for learning A booked IT room might need a planned seating plan for its use to be effective. All rooms have their blind spots, students are very savvy about this. Alternate boy / girl seating is useful if you are short on prep time, if the group is small them leave a computer gap in between students. Do not allow computers to be unattended, including staff. Incidents do occur when students are fetching a printout, or out of their seat. Staff can freeze their whiteboard screen and lock their computer if they need to, leaving material on the whiteboard, and assist students with the IT task. Possible Department management of Situations and Sanctions Level 1 Infringement Low level naughty silly boy or girl stuff caught by or witnessed by you in your class while computers are being used. Examples might be:- a Google search for.. Writing something silly in a user name space on a logon screen The sanctions and correction of poor ICT habits and poor judgement for this sort of AUP infringement lies with you, the teacher, and within the department. So a detention might be appropriate, HOD may need to be informed or involved Level 2 Infringement Concerted or persistent infringement of the AUP in your class as witnessed by you or captured by our Schoolwide Computer Monitoring Software and made available to you.
5 Eg a persistent search for guns, or simply a failure to respond to earlier advice. Still dealt with in the Department, but you might want to involve HOY or the HoE-Learning for support, as clearly this is defiance. Record the infringement in our MIS? Level 3 Infringement E=Safety incident. Child protection issue, follow the E-Safety flowchart E.g. Cyberbullying, inappropriate or image search, logon or attempted logon to something via a proxy or another user either witnessed by yourself and captured (print screen or Classroom Computer Monitoring Software) or you are informed by IT Technicians Level 4 Infringement A very serious E-Safety incident or Child Protection issue, follow the E-Safety flowchart Staff Our Schoolwide Computer Monitoring Software obviously also records computer activity of staff while they are logged on to the school network. Data collected by our Schoolwide Computer Monitoring Software relating to staff will be available to KT, JP and the Head. KT will respond to the situation according to the information given to him. If the incident does warrant the intervention of the Leadership Team or Headteacher then that will occur. For example, overuse of particular sites or facilities during the timetabled day for personal use may be dealt with in a different way than a situation that has led to children being exposed to pornographic images. The Headteacher has a range of options as to how he would deal with a particular situation in accordance with the School s Disciplinary Policy, (available on the Portal).
EMERSON PARK ACADEMY
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
More informationE- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationSibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
More information1 The benefits of Internet access for education... 2. 2 Whole-Academy network security strategies... 2. 2.1 Hardware and software infrastructures...
CITY ROAD PRIMARY ACADEMY ACCEPTABLE AND RESPONSIBLE USE OF IT RESOURCES (INTERNET ACCESS AND EMAIL POLICY STAFF AND STUDENTS) Contents 1 The benefits of Internet access for education... 2 2 Whole-Academy
More informationThe Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
More informationJohn of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
More informationSt Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
More information360 degree safe e-safety Assessment E-Safety Visit Draft Schedule
360 degree safe e-safety Assessment E-Safety Visit Draft Schedule School: Date of assessment: TBC Assessor: Dr Albin Wallace Headteacher: 08:30 Dr Albin Wallace arrives at school Schedule for School Assessment
More informationSt Edward s Church of England Academy. E-Safety Policy
St Edward s Church of England Academy E-Safety Policy Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and
More informationBring Your Own Device Policy
Bring Your Own Device Policy 1. Introduction The Foundation is committed to providing a technology based learning environment that creates opportunities to support and extend learning and teaching in all
More informationBring Your Own Device Policy
Bring Your Own Device Policy 1. Introduction The Foundation is committed to providing a technology based learning environment that creates opportunities to support and extend learning and teaching in all
More informationWitton Middle School
Witton Middle School e-safety Policy This e-safety Policy has been put together using guidance from the Worcestershire Local Authority (LA) and is based on the guidance provided by Becta. Our Vision Witton
More informationBerwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
More informationSALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL
SALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL E SAFETY Policy October 2012 Page 1 Saltford C of E Primary School E-Safety Policy Oct 2012 Table of Contents BACKGROUND / RATIONALE... 3 DEVELOPMENT / MONITORING
More informationSimon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
More informationWHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES
WHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES Approved: December 2014, Full Governing Body Next review due: December 2016 The key aim of the whole school ICT team is to support
More informationAcceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
More informationRoles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
More informationGreat Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy
Great Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy November 2013 This policy was adopted on:... Date of last review:... Signed:... Great Horwood C.E. Combined School Page 1 Acceptable
More informationE-Safety Policy Last reviewed 2012 Updated October 2014
E-Safety Policy Last reviewed 2012 Updated October 2014 Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and
More informatione-safety Policy Broadclyst Community Primary School
e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy
More informationE-Safety and Acceptable Use Policy
E-Safety and Acceptable Use Policy This policy has been written in consultation with pupils and staff so that they understand that there are dangers associated with Internet use, and they know what behaviour
More informationE-SAFETY POLICY. The Kingswinford School - a science college. December 2014. Every Child a Scientist. Page 1
The Kingswinford School - a science college E-SAFETY POLICY December 2014 Page 1 E-Safety Policy - Advice and Guidance Setting This guidance applies to all members of the school community (including staff,
More informationStudents Acceptable Use Policy for Electronic Resources Rules Summary
Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must
More informationRelated Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities
Category Security Document Name e-safety Procedures Accountable Body Brantridge School Governing Body Reference SY.P2.02 Date Ratified Version 2.1 Last Update March 2015 Related Policies & Documents Document
More informationDevelopment / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
More informationPolicies & Procedures. Moat Community College E-Safety Policy
Moat Community College E-Safety Policy Vision Statement Moat Community College embraces the positive impact and educational benefits that can be achieved through appropriate use of the Internet and associated
More informationE-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school.
E-Safety Policy Development / Monitoring / Review of the policy This policy applies to all members of the school (including staff, students / pupils, volunteers, parents / carers, visitors, community users)
More informationSocial Media Acceptable Use Policy
SAMPLE SOCIAL MEDIA POLICY RESPONSES To obtain a sense of how schools can address the use of social media in their policies, this fact sheet will examine sample policy responses. Below, we provide an outline
More informationRoskear Primary & Nursery School. E-Safety Policy
E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed
More informationAcceptable Use Policy - Staff
Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education
More informationProtocol for Acceptable Use of Internet and Email by Staff E-Safety Procedures Safeguarding & Child Protection Policy
Category Document Name Accountable Body Security E-Safety Policy RADIUS Trust Reference SY.P2 Date Ratified 11 th December 2014 Version 3.1 Last Update 31 st March 2015 Related Documents Document Protocol
More informationCYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL
CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important
More informationE-Safety and Computer Security Rules
E-Safety and Computer Security Rules Process / Signatures Portfolio Team Portfolio Team Lead Principal Chair of Governors Behaviour Safety & Ethos Mrs K Mitford Dr J V Edwards Mrs K Mitford Presented 2
More informationE Safety Policy. 1.0 Background
E Safety Policy 1.0 Background New technologies have become integral to the lives of children and young people in today s society, both within the UTC and in their lives outside the UTC. The internet and
More informationE-Safety Policy & Procedures
E-Safety Policy & Procedures Version Policy Originator: Equality Impact Assessed: Approved by: SMT Date Approved: April 2015 Review Interval: Annually Last Review Date: - Next Review Date: April 2016 Audience:
More information1. Introduction. 2. Roles & Responsibilities. Governing Body. Headteacher
Category Security Document Name E-safety Procedures Accountable Body Grafham Grange School Governing Body Reference SY.P2.01 Date Ratified 27 th August 2015 Version 1.0 Last Update August 2015 Related
More informationNetSupport School Technician Console
NetSupport School Technician Console A classroom management solution is not simply about providing the right tools for each teacher. Equally important are tools to ensure all computers in the school can
More informationFREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
More informationSCHOOL E-SAFETY SELF REVIEW TOOL
SCHOOL E-SAFETY SELF REVIEW TOOL The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, Devon, UK, EX2 5WS. Tel: 0845 601 3203 Fax: 01392 366 494 Email: esafety@swgfl.org.uk
More informationNorth Ealing Primary School. Internet Safety Policy 2015-16. 1 P a g e
North Ealing Primary School Internet Safety Policy 2015-16 1 P a g e Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher
More informationNetSupport School Teacher s Assistant
NetSupport School Teacher s Assistant NetSupport School Mobile Teacher s Assistant NetSupport School version 11 introduces a new component available for free from the Apple App store and the Google Play
More informationSt. Gregory s Catholic Primary School Behaviour Policy
St. Gregory s Catholic Primary School Behaviour Policy We believe in Jesus Christ, through him, with him, in him, anything is possible Date approved: 01/11/2015 Frequency of review: HT free to determine
More informatione-safety Policy for Hertsmere Jewish Primary School
e-safety Policy for Hertsmere Jewish Primary School Reviewed by: Mrs R Wolman, Miss C Stephens and Miss G Geffin Reviewed on: February 2015 Date of Next Review: February 2016 Policy Review This policy
More informationSchools ICT Centre & Lancashire Grid for Learning
Schools ICT Centre & Lancashire Grid for Learning Services The Lancashire Grid for Learning (LGfL) is a managed service from the Schools ICT Centre, providing schools with a wide variety of educational
More informationA Policy for E-Safety in School
Damers First School A Policy for E-Safety in School November 2013 Page 1 of 18 Rationale New technologies have become integral to the lives of children and young people in today s society, both within
More informationBANK VIEW HIGH SCHOOL
BANK VIEW HIGH SCHOOL POLICY & PROCEDURES FOR E-SAFETY Chair of Governors Date./ / 20. Review Date./ / 20. Bank View High School E-Safety Policy INTRODUCTION Our policy applies to all students, staff,
More informationSt Vincent s Catholic Primary School e-safety Policy
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
More informationAdvice for Schools. School reporting routes: a safeguarding perspective
This document outlines policy and practice considerations when implementing SWGfL Whisper anonymous reporting tool to ensure that it is used most effectively, covering School reporting routes: a safeguarding
More informationThe Fulham Boys School ipad Acceptable Use Policy, Procedures and Information
The Fulham Boys School ipad Acceptable Use Policy, Procedures and Information Except where specifically stated otherwise, the policies, procedures and information within this document apply to all ipads
More informationSCHOOL ONLINE SAFETY SELF REVIEW TOOL
SCHOOL ONLINE SAFETY SELF REVIEW TOOL UPDATED February 2016 The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0844 381 4772 Email: esafety@swgfl.org.uk
More informationNetSupport School Support for Google Chrome OS
NetSupport School Support for Google Chrome OS Recognised as the number one choice for IT educators worldwide, NetSupport School delivers the tools you need to help maximise the effectiveness of computer-led
More informationSUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY DATE: MARCH 2015 REVISION DATE: MARCH 2017
SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY 1 DATE: MARCH 2015 REVISION DATE: MARCH 2017 Background / rationale New technologies have become integral to the lives of children
More informationAcceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
More informationNetworking and Social Media Policy
Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools
More informationSchool Information Security Policy
School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...
More informationManaging e-mail at Winton Primary School
Managing e-mail at Winton Primary School This school: Does not publish personal e-mail addresses of pupils or staff on the school website. We use anonymous or group e-mail addresses, for example info@schoolname.la.sch.uk
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationThe Internet Acceptable Use Policy (for parents and children)
Contact: Susan Seale The Internet Acceptable Use Policy (for parents and children) This policy is made available via the school website, is provided to all parents (current and prospective) in the office,
More informationStoke-on-Trent Grid for Learning Internet Web Filtering Policy
Stoke-on-Trent Grid for Learning Internet Web Filtering Policy Definitions Policy a policy is a collection of allowed categories of web site and groups of keywords that is applied to one or more workstations
More informationICT Acceptable use Policy. Coláiste Mhuirlinne/ Merlin College Doughiska, Galway City.
ICT Acceptable use Policy. Coláiste Mhuirlinne/ Doughiska, Galway City. Ratified by the Board of Management on 27 th May, 2015 Table of Contents Introduction... 2 General... 2 Internet Use... 3 Email...
More information360 Degree Safe Cymru SELF REVIEW TOOL
360 Degree Safe Cymru SELF REVIEW TOOL UPDATED OCTOBER 2014 The South West Grid for Learning Trust, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0845 601 3203 Email: enquiries@swgfl.org.uk
More informationUpper primary unit. Cybersafety. www.cybersmart.gov.au
www.cybersmart.gov.au Creative Commons These teaching resources on the Cybersmart website s Schools Gateway are now available to schools under Creative Commons licences. The new licensing conditions are
More informationE-safety Developing whole-school policies to support effective practice
E-safety Developing whole-school policies to support effective practice The internet, and other digital and information tools, are fast moving technologies with new opportunities emerging daily, along
More informationSafeguard Your Learners Online
Schools January 2009 Safeguard learners online How are you safeguarding next generation learners? Safeguarding learners online is all about schools: taking action on responsible, safe online use by putting
More informationE-Safety Policy. Please read this policy in conjunction with the policies listed below:
E-Safety Policy Policy Code: ICT2 Policy Start Date: July 2015 Policy Review Date: September 2015 Please read this policy in conjunction with the policies listed below: SW5 Safeguarding and Child Protection
More informationCyber-bullying is covered by this policy: all members of the community need to be aware that
DUKE OF KENT SCHOOL A8 ANTI-BULLYING POLICY Aims and Objectives: Duke of Kent School values every individual in the community and believes each deserves to be treated with respect. Sensitivity to the feelings
More informationPunctuality The child must be responsible for collecting his laptop promptly and arriving in the classroom on time for each lesson.
LAPTOP POLICY Priory Preparatory School is committed to providing best access to the curriculum for all its pupils. The use of laptops has been shown to be beneficial for children with specific learning
More informationSWGfL E-Safety School Template Policies
Ravensmead School Technical Security Policy Introduction Effective technical security depends not only on technical measures, but also on appropriate policies and procedures and on good user education
More informationSt. John the Baptist Catholic Primary School
St. John the Baptist Catholic Primary School E-Safety Policy Prepared by: Tom Ferguson Created: February 2012 Date of next intended review: February 2013 Approved by Full Governing Body on: MISSION STATEMENT
More informationTablet Agreement. Sir Charles KAO UTC Tablet Usage Policy Amended: 20/8/15
` Tablet Agreement 1 Tablet Agreement The focus of the Sir Charles Kao UTC is to support the learning and progress of our students through the use of technology and information. Excellence in education
More informationPOLICY SERVICE CHILDREN S EDUCATION. E-Safety. Issued November 2011. An Agency of the Ministry of Defence
SERVICE CHILDREN S EDUCATION POLICY E-Safety Issued November 2011 New technologies have become integral to the lives of children and young people in today s society, both within schools and in their lives
More information4. The Importance of Internet Use in the Primary Curriculum
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
More information[Name of School] E-safety policy
[Name of School] E-safety policy Adopted: Review date: Note: Blue boxes contain advisory notes which should be read and deleted. These indicate where schools need to make decisions or choices. This policy
More informationHavelock Academy Broadening Horizons
Havelock Academy Broadening Horizons Acceptable use of IT, e-safety and BYOD September 2014 M Trussell Director of IT September 2014 Purpose The purpose of this Acceptable Use of IT Policy (referred to
More informationEndon High School. e-safety policy
Endon High School e-safety policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a Endon High School s esafety Group Mr A. Skelding, Assistant Headteacher,
More informationBennerley Fields School. Technical Security Policy
Bennerley Fields School Technical Security Policy (including filtering and passwords) Agreed by Computing and e-safety Committee on: 11 th Dec 2014 Approved by Governors on:16 th December 2014 Introduction
More informationAdding White Lists to your Internet Protection Arsenal
Adding White Lists to your Internet Protection Arsenal Eliminating the use of Anonymous Proxies and other Internet Surfing Threats Introduction Schools today have numerous tools at their disposal to help
More informationIssue Number: 3. What Every Teacher Needs to Know About Social Media
What Every Teacher Needs to Know About Social Media What every teacher needs to know about social media Social media interacting with other people online to exchange comments, ideas and innovations is
More informationAcceptable Use of Internet and Digital Technology
Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB on: Reviewed policy shared with staff on: Policy to be reviewed again on: Committee responsible for review: Acceptable Use
More informationCheadle Primary School Computing and ICT Policy
Introduction The use of information and communication technology is an integral part of the national curriculum and is a key skill for everyday life. computers, tablets, programmable robots, digital and
More informationNHEHS E-Safety Policy (Whole School including EYFS) Key Points
NHEHS E-Safety Policy (Whole School including EYFS) Key Points All staff have a responsibility actively to promote e-safety through their teaching and other activities in school. All members of the school
More informationWilmington Public Schools. Acceptable Use Policy
Wilmington Public Schools IJNDB Acceptable Use Policy 1. Purpose The purpose of the Acceptable Use Policy (AUP) is to establish the acceptable use of information technologies in the Wilmington Public Schools
More informationGENERATION SAFE 360 SELF ASSESSMENT: PRINTABLE VERSION. Page 1
Page 1 Contents 1. Introduction 2. How to use the 360 Self Assessment 3. Links to documents and resources 4. Acknowledgements 5. 360 Self Assessment 6. Report Sheet Introduction The development and expansion
More informationSeptember 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
More informationStopping secure Web traffic from bypassing your content filter. BLACK BOX
Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationStudent use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
More informationTake a tour of the technology that can help you understand what your children are seeing online.
Helping Keep Children Safe Online INSIDE Take a tour of the technology that can help you understand what your children are seeing online. 3 tips for keeping your children safe online from the UK Safer
More informationKing David Primary School Staff Social Networking Policy
King David Primary School Staff Social Networking Policy This policy should be read in conjunction with other relevant policies e.g. school ICT Policy including acceptable or unacceptable usage, Disciplinary
More informationSPRING VALLEY MIDDLE-HIGH SCHOOL. Bring Your Own Device (BYOD) Guidelines
SPRING VALLEY MIDDLE-HIGH SCHOOL Bring Your Own Device (BYOD) Guidelines Last updated: 9/5/2012 Gretchen Cipriano Principal If you have questions, please email ciprianog@springvalley.k12.wi.us. PURPOSE/PLAN
More informationSafeguarding children online
Schools January 2008 Safeguarding children online A guide for school leaders www.becta.org.uk/schools/safety Using technology safely Safeguarding children online 01 In the physical world it s relatively
More informationHow To Understand How Computer Use Affects Children
The Impact of Computer Technology on the Development of Children In Ghana Henry Osborn Quarshie MBA (MIS) PG. Cyber Law Lecturer Regent University College of Science & Technology, Accra, Ghana. hquarshie@yahoo.com,
More informationMOBILE PHONE & COMPUTER USE POLICY
MOBILE PHONE & COMPUTER USE POLICY epal epal is the online learning hub for the Australian Performing Arts Grammar School. It is a main form of communication between parents, students, staff and administration.
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationSchool Technical Security Policy
Approved by Governing Body School Technical Security Policy January 2015 Signed (Chair) E-Safety Governor Dave Black Mark Staker Next Review January 2016 1 School Technical Security Policy Template (including
More information3-3 (a) POLICY ADMINISTRATION IN GENERAL. 3-3 Acceptable Use Policy (AUP) A. Philosophy
(a) Acceptable Use Policy (AUP) A. Philosophy Loudoun County Public Schools (LCPS) Department of Technology Services (DTS) provides access to an extensive array of Local Area Network/Wide Area Network
More informationElectronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)
Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to
More informationArchbishop Beck Catholic Sports College
Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety
More information