Dulwich College ICT Acceptable Use Policy
|
|
|
- Marylou Lester
- 10 years ago
- Views:
Transcription
1 Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These devices include networked computers to support students' academic work. It includes guidelines for the safe and responsible use of the network and the internet and identifies those activities which constitute an abuse of our ICT facilities. For the purpose of this document electronic computing equipment will be referred to as devices and includes laptops, PCs, tablets, notepads, ipads, ipods, mobile phones, digital cameras etc. Section A - General Rules The general rules apply to pupils using devices provided by the College or devices which belong to boys and are brought onto the College campus. Pupils should not: a. access or attempt to access unauthorised areas of the College network or any other computer network. This includes logging on to another user's account; b. send or post electronic communications which are impolite, indecent, abusive, discriminatory, racist or in any way intended to make the recipient feel uncomfortable; c. Store or access inappropriate or illegal material; d. try to circumvent the College filtering systems; e. attempt to spread viruses; f. run any hacking, encryption and other system tools; g. engage in any form of activity that is prohibited under UK Law, including; h. the uploading or downloading of pirated software, music or video; i. breaching another person s copyright in any material or protected by trade secret; j. disclose to a third party the personal details of any other member of the College March 2013 Page 1 of 10
2 k. community; l. post on the Internet or Intranet (including on social networking sites, blogs, Twitter, Facebook etc) any material (e.g. text, pictures, videos) which may cause offence, be considered defamatory or bring the College into disrepute; m. attach any servers to the College network or share local drives, folders or files across the network. Section B - Use of College Devices In addition to the General Rules in Section A, pupils should not: a. physically tamper with College equipment e.g. disconnect them from the network, removing the mouse/keyboard/monitor etc. or attempt repair to the devices; b. upload, download, install or attempt to run any software that has not been approved by Computer Services; c. alter the settings of the College equipment or making other changes which render them unusable by others; d. purchase goods or services over the Internet. Section C - Use of pupils own devices In addition to the rules in section A, pupils, a. should only attach their own personal devices by using wireless networking or specially provided network ports e.g. the network points in the Boarding Houses; b. should ensure that their devices are properly protected from viruses; c. should not run file sharing devices (e.g. personal servers) on the College network; d. should not plug devices directly into any network switch, hub or router; e. should not detach from the network any equipment (e.g. computers, printers etc) to make way for a personal device; f. should not attach a device to the Dulwich College Domain unless it has been approved by March 2013 Page 2 of 10
3 the Computer Services Department; g. are responsible for the material that exists on or is accessed via their personal devices. The Computer Services Department are empowered to scrutinise, and if necessary retain for further investigation, any device which has been brought on College and which is suspected of being in breach of this policy; h. should abide by the rules governing use of the Internet as stated in section D; i. should ensure that they have a licence for all software installed on their devices; j. should not run software on a device during lessons which is not appropriate to that lesson. Boarders should read the Guidelines for Boarders (Appendix 1) Section D Use of computer areas in the College a. Pupils should conduct themselves in an orderly fashion, and must always show consideration for other users; b. No food or drink may be consumed; c. Any damage to computers, furniture or fitments or malfunctioning of computers or printers should be reported to a member of the Computer Services Department, the duty staff or duty Prefect without delay; d. Pupils using computers before school and during morning break, lunch break and private study periods must leave the computer rooms in time to arrive punctually for their next timetabled commitment; e. Only one pupil should be seated and working at a computer at any one time; f. Chairs should be placed tidily in the rooms before leaving; March 2013 Page 3 of 10
4 Guidelines, Explanations and Advice Overview At the College we allow all pupils access to our computer network, enabling them to use standard applications (word processing, spreadsheet, database etc.) as well as online facilities such as the Internet and electronic mail. Every boy is issued with a username, password and an address at the start of his College career. Access to the computer network is a considerable privilege and it is the pupils responsibility to restrict themselves to usage which is ethical and appropriate. Failure to comply with the rules which govern the use of the network may result in either (a) punishment of the pupil, for example by means of a detention, or (b) in serious cases, referral to the pupil s Head of School. Parents will be informed when serious breaches of the Acceptable Use Policy have occurred. Further action will be carried out if deemed necessary. Pupils are encouraged to make use of ICT facilities in support of their studies in all subjects, including the writing up of coursework assignments and other projects. Recreational use of the network is also permitted, though within limits which are designed to give priority to pupils wishing to use the computers for academic and other College-related work. The College provides a network environment in which pupils can assume that their legitimate use of computers and the data that they store are secure against interference by other users. Pupils should not, however, assume that their activities are completely private. Authority has been delegated to Dulwich College Computer Services to determine appropriate use and to monitor user accounts and fileserver space as judged necessary. Hence, records of usage, files that have been stored, and messages that have been sent or received may be scrutinised by the members of staff responsible for management of the network either (a) during routine system maintenance, or (b) if there is reason to suspect misuse of the network. March 2013 Page 4 of 10
5 Use of the Network When logging on to the network, a pupil must always use his own user identification and password. Any attempt to impersonate another user will be treated as a serious offence, as will any attempt to interfere with data stored on the network by another user. These activities are in fact illegal under UK law. Never, under any circumstances, use another person s account or attempt to log on as a system administrator. Vandalism is defined as any malicious attempt to harm, modify, or destroy data of another user. The Dulwich network or other networks connected to the Internet must not be vandalised. This includes the uploading or creating of computer viruses. Harassment is defined as the persistent annoyance of another user, or interference with another user s work. Harassment must never occur; this includes, but is not limited to, the sending of unwanted . If you feel you can identify a security problem on the Dulwich system you must notify Computer Services immediately. You must not demonstrate the problem to other users. Pupils must never divulge their passwords to other boys or to users of computers outside the College. Any pupil who suspects that this has happened accidentally should change his password without delay. Before leaving a computer, pupils must always log off the network and check that the logging out procedure is complete. Pupils must not attempt to gain access to the local drive of any machine or to create local accounts (administrative or otherwise). It is strictly forbidden to attempt to share drives, folders or files across the network. Only software that has been provided on the network may be run on the computers. Pupils are not permitted to import or download applications or games. In many cases it is illegal to do so. You are reminded that it is a breach of the College Plagiarism Policy (and of the rules of examination boards) to pass off another s work as your own. This prohibition extends to March 2013 Page 5 of 10
6 information accessed electronically as it does to that gained in other ways. Pupils must be aware of, and comply with, the restrictions placed on certain kinds of usage; notably the playing of games on particular machines and at particular times of the day, where others wish to do academic work. The College cannot accept responsibility for any damage, howsoever caused, to devices or their contents. Internet and The College s Internet access is via the Equinox (London Grid for Learning) service provided by Research Machines PLC, a company that has been involved with IT in education for many years. The advantage of IFL is that it seeks to deny access to web sites known to contain offensive or inappropriate material. The IFL filter is continually updated, though there can be no absolute guarantee that unsuitable material is never available to users. Pupils are given training in effective use of the Internet as a research tool at various stages throughout their College career. The College regards the use of the Internet to search for and use information related to a school subject or to a hobby as acceptable. Every pupil in the College has access to the Internet and has a College account. Personal Safety Pupils need to be aware that thoughtless use of , Twitter, social networking sites and the Internet may jeopardise their personal safety either at school or outside school. Pupils should therefore: Never arrange a meeting in person with anyone they have met or only communicated with by computer, without prior parental approval; Not respond to messages, tweets, social networking posts or bulletin board items that are indecent, suggestive, belligerent, discriminatory, threatening, or which make the student feel uncomfortable or unsafe in any way. If such a message is encountered the pupil should report it to his form tutor and parents; Be aware that any person they meet or communicate with online may pretend to be March 2013 Page 6 of 10
7 someone else; Remember that anything they read online may not be accurate; Ignore offers that involve either financial transactions or personal meetings; Not disclose any personal details, such as their home address or telephone number, across the Internet; Personal Devices Pupils bring devices such as mobile phones, MP3 players, ipods etc. into the College at their own risk. These should not be used in lessons without approval of the teacher. Boarding Houses See Appendix 1 College ICT commitments Where possible the school will block access to inappropriate web-sites from school equipment. The school will monitor ICT communications on school equipment. The school will endeavour to ensure that all images of staff and pupils are secure. The school will train its staff to respond to reports of cyber-bullying or harassment and have systems in place to respond to it. Cyber-bullying The term cyber-bullying means: Bullying by texts or messages or calls on mobile phones; Use of mobile phone cameras to cause distress, fear or humiliation; Posting threatening, abusive, defamatory, or humiliating material on websites; Hi-jacking accounts (using someone else s identity); Making threatening, abusive, defamatory or humiliating remarks in chatrooms; Posting threatening, abusive, defamatory or humiliating material on reunion or networking sites. March 2013 Page 7 of 10
8 Advice to Pupils with regard to Cyber-bullying All the essential anti-bullying messages apply e.g. tell someone in addition; Do not answer abusive messages but log them and report them; Do not give out personal details; Never reply to abusive s; Never reply to someone you do not know; Stay in the public areas of chat rooms. Advice to parents It is essential that parents make their children aware of the serious nature of cyberbullying and discuss with them the advice given above about how to respond if they experience cyber-bullying. Parents should be proactive in monitoring their son s use of ICT and in particular their use of the internet, MSN and social networking sites such as Facebook, Twitter, Myspace, YouTube or Bebo. March 2013 Page 8 of 10
9 Appendix 1 Guidelines for the use of personal laptops and mobile equipment in the Senior Boarding Houses In the boarding houses we take seriously the importance of responsible use of technology. Each study room has an Ethernet connection and boys are allowed laptops in their rooms. Boys can also access a public wireless network in the common rooms. Printing facilities are also made accessible to the boys. We do expect boys to adhere to the following guidelines with respect to use of electronic equipment: 1. The College s ICT Acceptable Use Policy (enclosed) will be observed, in particular Section C Mobile Devices; 2. All software installed will be legally licensed for use on that machine; 3. No offensive or unsuitable material will be stored on the machine(s) or on removable media of any kind (eg data sticks) brought into School; 4. The College cannot accept any responsibility for the security of the equipment and parents must ensure that they have made satisfactory insurance arrangements; 5. Maintenance or repairs are entirely the responsibility of the parents and adequate provision for technical support should be made; 6. Personal laptops and other mobile computing devices should only be connected to the internet via the College s public wireless network and LAN connections in study rooms; to do so they should have up to date anti-virus software; 7. Permission is given to the College to ensure that these conditions are being met. This includes permission to carry out physical inspection of the equipment and examination of the contents of the hard disk and other storage media; 8. The College s internet connection is filtered, and access to inappropriate sites will be denied. Between 5pm and midnight access to approved recreational sites is permitted, March 2013 Page 9 of 10
10 and requests for particular sites to be made available should be directed in the first instance to housemasters; 9. Boys are expected to stop using all forms of electronic equipment when it is time for lights-out ; 10. Colour printing facilities are available within the House. Excess use of the colour printer may result in an additional cost being added to the School bill. We encourage boys to use laptops responsibly and aim to do so through a policy of education. Using machines for non-academic purposes must not interfere with the routine of the House, most importantly lights out. The College internet access is disabled between midnight and 6am. Housemasters are conscious of their duty of care towards the boys with regard to adequate sleep, and excessive use of laptops can be a cause for concern. Housemasters will exercise their duty of care when necessary in this regard. March 2013 Page 10 of 10
Sibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
Acceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
Students Acceptable Use Policy for Electronic Resources Rules Summary
Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must
Acceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
St Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement
111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET
INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET ACCEPTABLE USE POLICY As part of the College IT programme we offer pupils filtered access to the Internet. Before being allowed to use
Acceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
Computer Facilities and External Networks Acceptable Use by Students
Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
Simon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
Marion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
Acceptable Network Usage Policy
Acceptable Network Usage Policy Purpose: The Lumen Christi Catholic College computer network is provided for staff and students to facilitate resource sharing, innovation and communication. All students
John of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
Administrative Procedures Memorandum A1300
Page 1 of 8 Date of Issue October 2013 Original Date of Issue June 2012 Subject INFORMATION AND COMPUTING TECHNOLOGY - APPROPRIATE USE GUIDELINES FOR STUDENTS References This APM replaces A1160 Computing
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
DIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
We have opted to implement a modified Bring Your Own Device (BYOD) program at the high school level.
Attention 7-12 parents and students: Last year we had the opportunity to pilot a 1:1 Chromebook program in grades 7-8. During this program, we were able to assess the impact providing each student with
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ BYOD (Bring Your Own Device) Technology Acceptable Use Washington District Schools provides all students access to technology, the district
Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn
Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn 1. Purpose: Throughout the years, the Catholic Schools within the Diocese of Brooklyn have maintained a steadfast dedication
School Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT
JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.
ICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the
ICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
EMERSON PARK ACADEMY
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
Technology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
E- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY
HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY This policy applies whenever you are using Heathfield High School information technology equipment or services. It should be read in
CARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
Hyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
4. The Importance of Internet Use in the Primary Curriculum
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
Archbishop Beck Catholic Sports College
Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety
Students KS2-3 Acceptable Use Policy
Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions
Descriptor Code: EFE-P
ADMINISTRATIVE PROCEDURE Descriptor Term: ACCEPTABLE USE OF ELECTRONIC TRANSMISSION CAPABILITIES Descriptor Code: EFE-P Date Issued: October 30, 2003 Date Changed June 26, 2008 September 30, 2009 1. Network
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
Sydney Technical High School
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
Iowa Park CISD BYOD Policy 2013-2014
Iowa Park CISD BYOD Policy 2013-2014 Table of Contents Table of Contents Table of Contents... 2 Purpose... 3 What is the D in BYOD.... 3 Guidelines... 3 Wireless Information...5 Responsible Use Policy...6
How To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
St Vincent s Catholic Primary School e-safety Policy
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
Quincy Public Schools Information Technology. Acceptable Use Policy for Staff, Students, and Guests
Quincy Public Schools Information Technology Acceptable Use Policy for Staff, Students, and Guests Revised May 6, 2013 Introduction This Acceptable Use Policy is enacted as of May 2013 by the Quincy School
Lighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15)
Lighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15) Student Name Date Responsible Use Agreement (in four parts) Part 1: Responsible Internet and Network Use Part 2: Responsible
Policies Concerning the use of Computers
Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers
BOARD OF EDUCATION POLICY
BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
Acceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
