West Sussex Schools and Academies Internet Filtering Policy

Size: px
Start display at page:

Download "West Sussex Schools and Academies Internet Filtering Policy"

Transcription

1 Schools and Academies Internet Filtering Policy Schools and Academies Internet Filtering Policy Contents Page 1.1 General Overview of Filtering WebScreen Categories School / Academy Policies Permitted Internet Protocols and Port Numbers Additional, Non-Category Based Options Cloud Technologies Contacts for Changes and Queries W.S. Schools Internet Filtering Policy Agreement WebScreen Filtering Administrator Nomination Form Schools Internet Filtering Policy Agreement for Cloud Computing General Overview of Filtering has developed the Schools Internet Services Web Filtering Policy ( this policy ) to ensure pupils safety whilst retaining the flexibility needed for effective teaching and learning. It is envisaged that it will be further refined in the future in consultation with school representatives. The filtering of a school s or Academy s Internet connection cannot guarantee the safety of its pupils and staff. Head teachers will already appreciate that supervision and education are as important as any software solutions. Filtering is however, a necessary first step to ensure the school or academy has taken all reasonable steps to protect pupils and staff. As a result schools should use this Policy in conjunction with the establishments Acceptable Use Policy to provide safe, but productive, access to the Internet. The filtering strategy incorporates the use of Atomwide WebScreen Filtering Solution. Webscreen is a software solution involving all available websites being scanned automatically for content. The sites are then classified into categories based on their content. These categories are then either allowed through for school/academy use or blocked if they are deemed inappropriate

2 1.2 WebScreen Categories The Webscreen system scans all available websites automatically for content. Each site is then classified into the categories below based on their content. These categories are then either allowed through for use or blocked if they are deemed inappropriate. Section 1.4 illustrates which categories are allowed and which are disallowed within each of the four standard filter types. Abortion - Prochoice This category covers sites that deal with abortion from a pro-choice point of view. Abortion - Prolife This category covers sites that deal with abortion from a pro-life point of view. Activist/Advocacy Groups These sites promote the views of groups and organisations. Sites in this category do not meet the criteria of other categories. Adware/Spyware/Malware Sites in this category are those that have been identified as ones that provide one of the following: adware, spyware and malware. Alcohol / Tobacco Sites that promote the use of alcohol and/or tobacco fall within this category. This includes sites sponsored by tobacco and alcohol companies. Alternative Journal The sites are generally in magazine type format and deal with the on-line publishing of general articles on a range of topics. This category is based on style rather than content. Alternative Lifestyles This category is for those sites promoting non-mainstream lifestyles and activities such as living without the aid of modern technology for example in a replica Iron Age Roundhouse using Iron Age technology and eating period food. Art / Culture Any site whose primary focus is on aspects of art and cultural activities Bad Link This category is used for sites that do not return a coherent home page. Some sites are simply resource stores. Other third party sites then link to specific files on them. Banner/Ad. Servers This category includes sites that offer advertising banners and materials for other sites. Blogging Sites in this category offer users the ability to create and maintain individual blogs such as blogger.com

3 Bullying Sites in this category contain materials that support and/or encourage the bullying of individuals and groups. Sites that give advice on dealing with bullying do not get allocated to this category. Computer Security This category covers sites that focus on the issue of computer security this includes sites promoting products relating to computer security matters such as McAfee or Adaware. Criminal Skill Any site that offers advice and methodologies for the carrying out of criminal activities would fall within this category. Directory Listing This category includes sites that display a series of directories that in turn contain files of undisclosed content. A significant number of such sites contain files offering unsuitable content. Where a directory site has been investigated and the content found to be non-controversial, that site will be placed in an alternative category. An example of a directory site is download.hipsoft.com Drugs Debate These sites deal with the debate over the legalisation of drugs and methods for dealing with the effects of drug use. Drugs - Illegal Sites in this category promote the use of illegal drugs. An example of such a site would be Drugs Prescribed These sites deal with the topic of the use of prescribed drugs as well as presenting factual information about those drugs. Entertainment Any site which offers resources for entertainment purposes but which does not fit into other specific category will be categorised as an Entertainment site. Extreme This category covers sites that support and promote political ideologies generally regarded as extreme. This will include sites supporting the terrorist activities of organisations such as al-qaeda. Extreme caution should be used by any school that chooses to permit these sites locally for any purpose. Forums These sites offer topic-based discussions and invite users to actively participate in the resulting discussions - 3 -

4 Free Download These sites offer large numbers of freeware/shareware executable files for free download. It should be noted that they often makes games available for download. Gambling Any site that offers the opportunity to gamble on-line would fall into this category clear examples of these kinds of site include: ladbrooks.com, on-line poker and online bingo sites. Extreme caution should be used by any school that chooses to permit these sites locally for any purpose. Games educational These sites contain on-line games that are specifically focussed on educational outcomes. Sites that contain large numbers of non-educational on-line games (with just a small number of scattered educational games) will normally be assigned to the on-line gaming category. Games - General These sites allow the user to participate in on-line games which have no obvious educational benefit. This would include any game that was not considered educational. Gay and Lesbian Issues Sites dealing with any issues relating to gay or lesbian relationships, including support for gay and lesbian users are placed in this category. General News Sites in this category contain items of general news. On-line versions of newspapers such as also come into this category. Hate Speech This category covers those sites that promote hatred for different ethnic and social groups. Examples of these types of sites include Neo Nazi sites promoting racial intolerance. These include sites like that describes itself as History books, museum pieces, memorabilia, collectibles, research items relating to the Ku Klux Klan. Humour The category covers sites with content designed to be humorous but are extreme in nature and likely to cause offence and / or distress to some users. Mainstream humour goes under Entertainment. Image These sites host one or more images, usually to support content on other sites that are often of great educational value. An example of this kind of site is foto.snuffelsnel.net Internet Auction Sites that host on-line auctions, for example Ebay, are placed in this category. Job Search Sites in this category offer assistance with finding employment, including on-line advertisements for jobs

5 Match Making These sites offer facilities for the user to meet other users for the purpose of forging both short and long-term romantic relationships. Medical Sites dedicated to medical matters, operations and procedures but not including the Department of Health or the NHS. It offers health advise sites such as Messaging These are sites that support or have a role to play in the on-line messaging process. Sites that fall into this category may be sources for messaging programs themselves as well as offering sign-in facilities for specific services. Examples of this category of site would be MSN and skype.com The Messaging Category is blocked on all standard school policies. Schools can however elect to use this as an additional category (or individual websites within it), using the Filtering Policy Agreement form on page 15 of this policy. The Local Authority expects any such messaging site to only be made available to staff and not to students. Miscellaneous Any site where the content is deemed to be suitable for a general audience and which does not fall naturally into any other category is categorised as miscellaneous. Music downloads These sites allow the download of music files, normally in MP3 format. Occult Sites in this category deal primarily with non-mainstream religions that are generally agreed to fall within the definition of occult. An example of this kind of site includes - which describes itself as a forum for occult practitioners of all paths, and persuasions. Online Investing This category covers sites that deal with on-line investing, including information relating to stocks and shares. Online portal Sites in this category typically provide personalized capabilities to its visitors, providing a pathway to other content. Examples of these include Protopage but also Virtual Learning Environments. Online Sales Any site that allows the user to make direct purchases of goods and services on-line would fall within this category. This would include nike.com and Amazon.co.uk

6 Open Resource Sharing Sites in this category permit the uncensored sharing of user resources, particularly photographic image files and video materials. Example sites would be youtube.com and flickr.com Political This category covers sites whose main focus is on political matters such as or Proxy Anonymizer Proxy Anonymizer sites allow the user to bypass filtering systems by offering facilities to display pages from other sites through the Proxy Anonymizer site. Redirector Web page These sites rarely contain any actual content of their own but, instead, redirect the user to another web site. An example of this type of site would be earlyyears.com Religion This category covers sites whose main focus is on religious content. This category includes sites like and Ringtones Sites in this category allow the free download of ring tones for mobile phones. Search Engines Sites that allow general searches for other websites on the Internet based upon user entered search terms would be placed in this category. This would include sites like Google Search Engines - Images/Video Sites that allow searches for images on the Internet based upon user entered search terms would be placed in this category. This would include sites like Google Images. Security Threat Sites that host facilities deemed to pose a threat to the security of a WAN or LAN would be placed in this category. Self-Help This category is for sites that promote a variety of self-help advice and contacts for users. Examples of sites that would fall within this category includes Sex Education These sites contain materials designed to educate their readership about sexual matters in a responsible manner. Sex /Adult Sites in this category contain materials of an adult sexual nature, ranging from extreme pornography to swimwear models in provocative poses

7 SMS Messaging This category is for sites that allow the user to send on-line texts to mobile phones. Social Issues and Support This category is for sites dealing with social issues and also offering support facilities. These sites include those produced for The Samaritans and Alcoholics Anonymous. There will be some overlap with this category and Self Help Sites. Social Networking These sites offer facilities for a variety of dynamic social interactions. Examples of such sites would include myspace.co.uk and Sport - Hunting and Gun Clubs This is a more specific sports category that covers sites that support or represent hunting and gun clubs. Sports This category is for sites that deal with all aspects of sport such as the Amateur Athletic Association website. Tasteless/Illegal/Questionable This category covers a wide range of sites that do not fall easily within other categories and yet still contain materials and resources that would normally be considered unsuitable for a school audience. Technology Information Any site dealing with technical products and other aspects of technology both hardware and software is assigned to this category. These sites principally though not exclusively relate to IT. Travel This category covers sites that deal with information relating to all aspects of travel and holidays. An example of this type of site is Expedia.co.uk or thomascook.com. Under Construction Site / Domain Holding This category covers both those sites which are clearly still being created as well as those sites which are simply holding pages for domains that are not otherwise owned. In the case of the latter, these sites often consist of commercial links to specific types of sites and masquerade as legitimate sites in their own right. Holding page sites often generate large numbers of commercial pop-ups, which display unsuitable materials as well as being sources for spyware and malware. URL Translation These sites provide a service whereby long, complicated URLs are converted into shorter, more user-friendly URLs. These sites would include tinyurl.com Violence Sites that contain materials depicting and promoting violence are included in this category. Examples of these would be The American Nazi Party, Stormfront or the Ku Klux Klan

8 Weapons This category is used for sites that promote the use of weapons such as that actively promote and weapons including automatic weapons. Web Hosting This category is for sites offering users the ability to create their own personalised web sites and pages through the direct auspices of the web hosting service itself. Web-based chat These sites offer only web-based chat. Web-Based chat & These sites offer both web-based chat and web-based facilities. Web-based These sites offer web-based facilities for example hotmail.com or gmail,com - 8 -

9 1.4 School / Academy Policies 1. Default Policies The Local Authority by default provides two filter policies to schools and academies. These are the primary and the secondary policies. Unless establishments actively choose otherwise, one of these policies will be applied to each of them. Primary schools or academies will have the primary filter applied to its curriculum network and the secondary filter to its admin network (where they are separated). Secondary schools or academies will have the secondary filter applied to both curriculum and admin networks. 2. Optional Policies In addition there are three further policies, which can be adopted only for specific machines on an establishment network. These policies are: The Staff Policy, The Staff With Webmail Policy, The technician Policies. Establishments may wish to adopt these policies for specific machines to provide a wider range of access to the Internet for members of staff. These policies can only be used providing the following requirements are met: The computers must not be accessible by pupils at any time The computers must have static IP addresses The computers must fall within a strictly limited, continuous block of sequential IP addresses agreed by Atomwide. The Staff and Technician policies can be applied to specific IP ranges by raising a case with Atomwide via their support case. To apply the Staff With Webmail policy schools must first complete the W.S. Schools and Academies Internet Filtering Policy Agreement (found on page 18 of this document) and tick the boxes as appropriate. The policy will not be applied without this agreement. This policy will only be applied to a maximum of eight machines per establishment. 3. Category or URL Options Head teachers may also elect to make use of one or more of the Whole category Options or the Specific URL Options. These options allow access to either whole categories or specific website addresses (URLs) that are not considered suitable for being allowed under the standard filter options. They do however; have educational merit in certain circumstances

10 Head teachers choosing to take up this option, through their Filter Administrator, will realise that the risks of exposure to inappropriate content or abuse of the establishment s network are higher when accessing these sites and any services they might offer. As a result those Head teachers will need to ensure that correspondingly higher levels of supervision are used when and where these websites are being accessed. Establishments may decide to only allow the Whole Category Options or Specific URL Options to be only made available in certain areas on the site based on a specific IP range, for example in a sixth form area. Where this is the case these policies can only be used providing the following requirements are met: The computers must only be accessible to the appropriate pupils/students. The computers must have static IP addresses/ a specific range limited by DHCP from within the WS WAN IP range allocated to the establishment. The computers are best allocated within a continuous block of sequential IP addresses. Which categories are available through each filter type are shown in the table below. Categories marked NOT ALLOWED in the LA Blocked Sites column are those that are always blocked and are not available under any circumstances. Some of these categories allow specific URLs as an option under exceptional circumstances. The local Authority must approve these specific URLs before access can be granted. Nominations for URLs to be made an exception should be sent to ictinschools@westsussex.gov.uk Key - Category Always Blocked Category Allowed Category Blocked Y N Default Policies Optional Fixed IP Policies Category LA Blocked Sites Primary Secondary Staff Staff with Webmail Technicians Abortion - prochoice N Y Y Y Y Abortion - prolife N Y Y Y Y Activist/Advocacy Groups Y Y Y Y Y Adware, Spyware, Malware NOT ALLOWED Alcohol and Tobacco N N Y Y Y Alternative Journal Site Y Y Y Y Y Alternative Lifestyles N Y Y Y Y Art & Culture Y Y Y Y Y

11 Default Policies Optional Fixed IP Policies Category LA Blocked Sites Primary Secondary Staff Staff with Webmail Technicians Bad Link Y Y Y Y Y Banner/Ad Servers Y Y Y Y Y Blogging N N Y Y Y Bullying NOT ALLOWED Computer Security N Y Y Y Y Criminal Skill Directory Listing NOT ALLOWED NOT ALLOWED Drugs - Debate N Y Y Y Y Drugs Illegal N N Y Y Y Drugs - Prescribed N Y Y Y Y Entertainment Y Y Y Y Y Extreme Site N N N N N Forums N N Y Y Y Free Downloads N N Y Y Y Gambling N N N N N Games - educational Y Y Y Y Y Games - General N N N N Y Gay & Lesbian Issues N Y Y Y Y General News Y Y Y Y Y Hate Speech N N N N N Humour N N N N N Image Y Y Y Y Y Internet Auction N N N N N

12 Default Policies Optional Fixed IP Policies Categories LA Blocked Sites Primary Secondary Staff Staff with Webmail Technicians Job Search Y Y Y Y Y Match Making NOT ALLOWED Medical Y Y Y Y Y Messaging N N N N N Miscellaneous Y Y Y Y Y Music downloads N N N N N MP3 Downloads N N N N N Occult N N N N N Online Investing Y Y Y Y Y On-line portal Y Y Y Y Y On-line Sale Y Y Y Y Y Open Resource Sharing N N N N N Political Y Y Y Y Y Proxy Anonymizer NOT ALLOWED Redirector Web page Y Y Y Y Y Religion Y Y Y Y Y Ringtones NOT ALLOWED Search Engines Y Y Y Y Y Search Engines - Images / Video N N Y Y Y Security Threat NOT ALLOWED Self-Help Y Y Y Y Y Sex Education Y Y Y Y Y

13 Default Policies Optional, Fixed IP Policies Categories LA Blocked Sites Primary Secondary Staff Staff with Webmail Technicians Sex / Adult NOT ALLOWED SMS Messaging NOT ALLOWED Social Issues and Support Y Y Y Y Y Social Networking N N N N N Sport - Hunting & Gun Clubs N N N N N Sports Y Y Y Y Y Tasteless/ Illegal/ Questionable NOT ALLOWED Technology Information Y Y Y Y Y Travel Y Y Y Y Y Under Construction / Domain Holding NOT ALLOWED URL Translation Y Y Y Y Y Violence Weapons NOT ALLOWED NOT ALLOWED Web Hosting Y Y Y Y Y Web-based chat NOT ALLOWED Web-Based chat & NOT ALLOWED Web-based Only allowed on specific IPs under the Staff with Webmail policy Specific IPs Only Specific IPs Only Specific IPs Only Specific IPs Only Specific IPs Only Uncategorized sites NOT ALLOWED

14 Default Policies Optional, Fixed IP Policies Categories LA Blocked Sites Primary Secondary Staff Staff with Webmail Technicians LA Allowed Y Y Y Y Y LA Blocked NOT ALLOWED 1.4 Permitted Internet Protocols and Port numbers ICMP Currently all ICMP types are permitted in the outgoing direction, although this is only intended during the installation and migration phases of the network implementation. TCP FTP (Port 20/21) allowed for outbound connections for file transfer. HTTP (Port 80) allowed for outbound connections to facilitate general HTTP browsing. HTTP (Port 8080 Alt HTTP) allowed for certain sites using this IANA reserved port. SSL Port 443 (Secure Sockets Layer) is allowed to facilitate SHTTP for encrypted browsing, this may be achieved by configuring your browser to make requests to proxy.wsgfl.org.uk. UDP Currently no UDP encapsulated data transfer is permitted with the Internet. Mail delivery and reception is provided by SMTP, HTTP and POP3/IMAP4 connections as appropriate by connection to/from the mail server (mail.wsgfl.org.uk). A time server is available at time.wsgfl.org.uk for NTP queries. HTTPS In order to access secure sites (such as online forms on the Grid for Learning) computer Internet Explorer settings need to be set to use the wsgfl proxy server to access the Internet. These settings can be found in Internet Explorer under: Tools, Internet Options, Connections and then LAN Settings. The proxy server address is proxy.wsgfl.org.uk and the port number to use is The LAN Settings for machines that need to access secure sites should look like this

15 1.5 Additional, Non-Category Based Options Cloud Technologies. Cloud technologies involve a range of services offered by major international suppliers including Google and Microsoft as well as UK based suppliers including Capita and Babcock. For the purposes of this document the term Cloud Technologies does not apply to services hosted within the schools WAN by schools or to services provided by the LA and it s partners. The services offered through Cloud Technologies are based in data centres usually in offshore locations such as the USA or mainland Europe. The services include: , instant messenger, online data storage online applications to supplement or replace locally installed and licensed applications such as Word or Excel. In order to make use of the full range of services available through cloud technologies alterations need to be made to school Internet connectivity beyond the standard categories. These include updates to the MX records for establishments. There are some advantages to using these technologies but they do expose establishments to some additional risks and responsibilities that they might not otherwise have to consider. The Local Authority (LA) requires any establishment wanting to make use of such technologies to sign up for the agreement in section 1.9 in much the same way as they did to adopt Local Filtering in the past. Benefits of Cloud Technologies Some of the benefits include, but are not limited to the following: Very low annual costs (at time of going to print) The ability to access data and services anywhere with Internet access. The ability to share and collaborate on work stored on the Internet (in the cloud). Much larger inbox sizes typically 10 Gb or more. The ability to fully access communications, applications and data from mobile devices through WiFi and, with devices equipped with a SIM card, using 3G. The ability to access and share calendars on fixed and mobile devices such as, for example ipad s Access to online Applications that have no licence overheads either as a one off payment or as a yearly agreement for applications such as MS Office

16 Access to significant online storage, typically 25GB, for work and shared materials. Things to Consider with Cloud Technologies Some of the potential disbenefits to the use of Cloud Technologies include: The total dependence on high performance Internet access for access to cloud applications, data and communications. That the terms of conditions of an initially free service may change over time and any such change may have serious consequences once fully committed to using the service. That investigations into e-safety incidents may be significantly more difficult That the level of support on offer from the LA will be significantly less than that offered with the system based within the WAN. That a cloud based system may leave a school network more liable to attack and managing that increased risk. Very carefully considering how Cloud storage is used. Especially the sharing of personal information (subject to the DPA) in that Cloud. Responsibilities Responding to requests from the police or other authorised government agencies for information relating to e-safety incidents. Headteachers as the Data Controller under the terms of the Data Protection Act 1998 (DPA) must ensure that all such systems used are fully compliant with the requirements of this act for their school. Establishing a robust Acceptable Use Policy, that is strictly adhered to, especially concerning data security. Responsibility of Headteachers to respond to all requests under the Freedom of Information Act 2000 as the LA will not have access to data. Responsibility of Headteachers to ensure compliance with any future legislation

17 1.6 Contacts for Changes and Queries Please any general questions or requests you have relating to this policy, in the first instance, to: or telephone If, through your general use of the Internet in school, you find a website which you believe should be blocked. Please do the following: Firstly identify the blocked category that you believe it should be in. Then please ask your schools Nominated Contact to use the Atomwide support site to request reclassification of the site into that category. Likewise, if you find a useful website at home that you later find is blocked in school but you believe it is incorrectly classified, then a very similar process is required. Firstly identify the allowed category that you believe it should be in. Then please ask your schools Nominated Contact to use the Atomwide support site to request reclassification of the site into that category. The support site can be found here - Reclassification requests are created under the Webscreen tab and under URL Categorisation. If you have queries regarding the use of the support site then please call the Atomwide helpdesk on Please have your school DCSF Number ready as you will asked to enter this before the call will be accepted. Please Note - Correctly classified sites will not be moved into other categories simply to permit their use

18 1.7 Schools and Academies Internet Filtering Policy Agreement. To be signed by the Headteacher and scanned. It then must be ed back to the ICT in Schools team at 1. I confirm that I have fully read and understand the Schools and Academies Internet Filtering Policy ( the policy ) 2. I confirm that the policy should be used in conjunction with the schools Acceptable Use Policy. 3. I confirm that I agree to adopt the terms of the policy in terms of my schools Internet use. 4. I would like to make use of the one or more of the category options available through the policy. 5. I would like to make use of the Staff with Webmail option available through the policy. 6. I would not like to make use of the one or more of the category options or the Staff with Webmail policy available through the policy and would like to continue using the standard filtering package. 7. If I have chosen to make use of the Staff with Webmail policy or any of the category options I accept that the school is responsible for the increased level of supervision required by allowing access to these sites. Please tick the boxes above as appropriate (chose 4 or 6 not both) Headteachers Name School Name DfE Number Address Daytime telephone number Signed Dated

19 1.8 Filtering Administrator Nomination Form Please nominate the member of staff who will act as the Filtering Manager for your school. This may be the person who is responsible for running your school network and should be one of the people already identified as a nominated contact for your school. Please scan the completed form and attach to a case raised on the Atomwide Support Site (or Fax it to the Atomwide Support Services Help Desk: ). The person s details will be entered in Atomwide s support database and he/she will then be able to change the WebScreen settings for your school. If you choose to take up this option you must understand that the risks of exposure to inappropriate content or abuse of the schools network are higher than when accessing web sites normally filtered by the standard filter policy and you must be willing to accept responsibility and liability for any inappropriate use by staff or students. Please replace with the below person named below as the Filtering Administrator. Name: Position within school: address: Daytime telephone number: Evening / mobile telephone number: I authorise the above named person to act on behalf of the school in all matters pertaining to the Schools WebScreen filtering Service and I accept responsibility and liability for the consequences of any inappropriate use of the Internet or abuse of the school network by school staff, pupils or visitors. Headteachers Name School Name DfE Number Address Daytime telephone number Signed Dated

20 1.9 Schools and Academies Internet Filtering Policy Agreement for Cloud Computing. If you choose to take up the option of using a non WSGfL Cloud based system throughout your school you must understand that the risks of exposure to inappropriate content or abuse are higher than when accessing normally provided by WSGfL and you must be willing to accept responsibility and all liability (financial, legal or otherwise) for any and all use (inappropriate or otherwise). In addition, it will be your responsibility as the Data Controller under the terms of the Data Protection Act 1998 (DPA) to ensure that all such systems you use or subscribe to are fully compliant with the requirements of the DPA and the Freedom of Information Act 2000 (FOI) together with any future applicable legislation. Please visit for further information. It will also be your responsibility under the terms of the Copyright, Designs and Patents Act 1998 to ensure that all such systems are not used to host material in a way that results in a copyright infringement. Schools must understand that there are risks of releasing sensitive and/or confidential information about both students and staff on Cloud based systems. Information that is shared must be done so securely and only between individuals who have a right and need to access it. Child protection concerns must be at the forefront when deciding what should be put into the Cloud as well as what should be shared and who with, once it is there. Participating schools must have strict and enforced policies to ensure the privacy and safety of both children and staff is protected. As s will only transit the WSGfL network we will not be able to retain any record or archive of such messages centrally nor will we be able to filter it for inappropriate content, viruses etc. It will therefore be your responsibility to provide these services and to respond to requests from the police or other authorised government agencies for information about content originating within your school system or from any system account provided by you to any user. If you implement such as system, we require that the personal home and mobile phone details of the Headteacher be made available on this form and that it is understood that this will constitute an agreement that these contact numbers can be made available by us to the police or any other authorised government agencies in the course of any investigation they may make. You must also understand that by using such a Cloud based system your local network may also be more liable to attack by outside agencies and/or viruses. If these are detected within your local network as a result of this or any other security lapse we reserve the right to remove internet access from your site until such viruses have been removed

21 You must agree to indemnify County Council for your use of the cloud based system. Note Indemnify - To promise to make good any financial loss or liability to County Council resulting from the school s use of any Cloud Technology/service you choose to use. Please complete the form on page 22 and then: 1. Send a copy to Atomwide by attaching a copy to a case on the support site, 2. a scanned copy to ictinschools@westsussex.gov.uk (Please Note: additional specific technical details of the requested system may be required by Atomwide to enable the system to be used)

22 Schools and Academies Internet Filtering Policy Agreement for Cloud Computing. School / Academy Name DfE Number 938 Name of Cloud Computing Solution / system requested: Please list the specific URLs that need to be enabled in the establishment s web filtering to permit access to the above: To be signed by the Head Teacher, an alternative contact and the Chair of Governors By signing this document we confirm that we have read and understood the information contained therein and request that the above named Cloud Computing Solution be enabled for use within our school. Users of the system will be: Staff Pupils Staff and Pupils We accept full responsibility and liability for any and all consequences of the use of the system and agree to indemnify County Council against any actions, charges, claims, costs, damages, demands, expenses or proceedings howsoever caused arising from the use of the above named Cloud Computing Solution. HEADTEACHER ALTERNATIVE CONTACT Name Address Daytime phone Number Evening number Mobile Number Signed Dated Name Address Daytime phone Number Evening number: Mobile number Signed Dated Name of the Chair of Governors - Signed Dated

Bucksgfl Internet Web Filtering Policy

Bucksgfl Internet Web Filtering Policy Bucksgfl Internet Web Filtering Introduction The requirement to ensure that children and young people are able to use the internet and related communications technologies appropriately and safely is addressed

More information

Stoke-on-Trent Grid for Learning Internet Web Filtering Policy

Stoke-on-Trent Grid for Learning Internet Web Filtering Policy Stoke-on-Trent Grid for Learning Internet Web Filtering Policy Definitions Policy a policy is a collection of allowed categories of web site and groups of keywords that is applied to one or more workstations

More information

SecurePoP Web Content Screening

SecurePoP Web Content Screening Seite 1 von 5 Introduction The following is a brief description of all Control List categories, including the subcategories. 1. Abortion Advocacy Sites with neutral or balanced discussion of the issues

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

John of Rolleston Primary School

John of Rolleston Primary School John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership

More information

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within

More information

BANK VIEW HIGH SCHOOL

BANK VIEW HIGH SCHOOL BANK VIEW HIGH SCHOOL POLICY & PROCEDURES FOR E-SAFETY Chair of Governors Date./ / 20. Review Date./ / 20. Bank View High School E-Safety Policy INTRODUCTION Our policy applies to all students, staff,

More information

CyberPatrol SiteSURV Web Filtering User Manual

CyberPatrol SiteSURV Web Filtering User Manual CyberPatrol SiteSURV Web Filtering User Manual Page 1 Table of Contents Table of Contents Overview... 3 Product Diagram... 3 How it Works... 3 Managing Internet Access... 4 Activating Your Account... 5

More information

F-Secure Mobile Security. Android

F-Secure Mobile Security. Android F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

DriveLock Websecurity

DriveLock Websecurity Whitepaper DriveLock Websecurity Cloud-based internet security CenterTools Software GmbH 2015 Contents 1 DRIVELOCK WEBSECURITY... 2 1.1 WEBSECURITY CLOUDBASIERTE INTERNETSICHERHEIT... 2 1.2 KONFIGURATION

More information

e-safety Policy Broadclyst Community Primary School

e-safety Policy Broadclyst Community Primary School e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy

More information

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

EMERSON PARK ACADEMY

EMERSON PARK ACADEMY 1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents

More information

Internet Content Filter Exemption Request Form

Internet Content Filter Exemption Request Form Internet Content Filter Exemption Request Form Version 2.0 This form maybe updated at anytime (without notice) to ensure changes to the HSE Internet Content Filter Standard and/or business practices are

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy 1. Introduction The Foundation is committed to providing a technology based learning environment that creates opportunities to support and extend learning and teaching in all

More information

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School: Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership

More information

Subject: Circular Number: 2011/22 INTERNET SAFETY. Date of Issue: 27 September 2011. Governor Awareness: Essential.

Subject: Circular Number: 2011/22 INTERNET SAFETY. Date of Issue: 27 September 2011. Governor Awareness: Essential. Subject: INTERNET SAFETY Target Audience: Principals and Boards of Governors of all grant-aided schools; Education and Library Boards; Council for Catholic Maintained Schools; Council for the Curriculum,

More information

Primrose Hill School Internet Access Policy

Primrose Hill School Internet Access Policy Date: September 2014 Date of next review: September 2015 Primrose Hill School Internet Access Policy INTERNET ACCESS POLICY Euxton Primrose Hill s Internet Policy has been written by the Computing coordinator

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

Roskear Primary & Nursery School. E-Safety Policy

Roskear Primary & Nursery School. E-Safety Policy E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed

More information

Cyngor Sir Ceredigion Ceredigion County Council. Internet Filtering in Schools

Cyngor Sir Ceredigion Ceredigion County Council. Internet Filtering in Schools Cyngor Sir Ceredigion Ceredigion County Council Internet Filtering in Schools C O N T E N T S Page Background... 1 Internet Filtering... 1 Smoothwall How does Ceredigion web filtering work?... 2 Internet...

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate.

The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Quick Start Guide 2 The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Going online for youngsters is fun, creative and exciting but it

More information

Internet Content Filter Standard Version 2.0

Internet Content Filter Standard Version 2.0 Version 2.0 Please check the HSE intranet for the most up to date version of this standard http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/ 1.0 Purpose

More information

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

SCHOOL ONLINE SAFETY SELF REVIEW TOOL

SCHOOL ONLINE SAFETY SELF REVIEW TOOL SCHOOL ONLINE SAFETY SELF REVIEW TOOL UPDATED February 2016 The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0844 381 4772 Email: esafety@swgfl.org.uk

More information

How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business)

How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business) Hosted Exchange +SharePoint: Communication and Collaboration This is the next generation of affordable, reliable messaging and portal solutions with Microsoft Exchange 2010 and Microsoft SharePoint 2010.

More information

Sample Employee Network and Internet Usage and Monitoring Policy

Sample Employee Network and Internet Usage and Monitoring Policy CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members

More information

Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009

Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009 Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy

More information

How To Ensure Your School Is Safe Online

How To Ensure Your School Is Safe Online Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Protecting Your Network Against Risky SSL Traffic ABSTRACT Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure

More information

RM Internet Filtering Policy

RM Internet Filtering Policy RM Internet Filtering Policy Introduction RM connects more schools to the Internet than any other provider in the UK. A key reason for the popularity of the service is the attention paid to filtering.

More information

INFORMATION AND COMMUNICATION TECHNOLOGY REGULATIONS (Acceptable Use and Internet Safety)

INFORMATION AND COMMUNICATION TECHNOLOGY REGULATIONS (Acceptable Use and Internet Safety) INFORMATION AND COMMUNICATION TECHNOLOGY REGULATIONS (Acceptable Use and Internet Safety) Purpose The Information and Communication Technology (ICT) systems of the District are limited to an educational

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

Employee Internet Usage February 15, 2007

Employee Internet Usage February 15, 2007 Employee Internet Usage February 15, 2007 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing Office

More information

ACCEPTABLE USAGE PLOICY

ACCEPTABLE USAGE PLOICY ACCEPTABLE USAGE PLOICY Business Terms - February 2012 ACCEPTABLE USAGE POLICY Business Terms Version February 2012 Acceptable Usage Policy Feb12.Docx 1 Contents 1. INTRODUCTION... 3 2. PURPOSE... 3 3.

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

BOARD OF EDUCATION POLICY

BOARD OF EDUCATION POLICY BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate

More information

Creating a managed service using the SWGfL Filtering software

Creating a managed service using the SWGfL Filtering software Creating a managed service using the SWGfL Filtering software Contents Overview... 2 How the filtering software works... 3 Logging on... 4 Web Access Policy... 5 Editing your school list... 6 Creating

More information

Internet Filtering in Secondary Schools

Internet Filtering in Secondary Schools Internet Filtering in Secondary Schools Education, Leisure & Lifelong Learning Baglan Information Technology Centre C O N T E N T S Page Background... 1 Teaching e-safety... 1 Internet Filtering... 2 Assigning

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Internet and Online Security Policy

Internet and Online Security Policy Internet and Online Security Policy Policy Updated: Spring 2015 Adopted by Staff and Governors: Spring 2015 Date for Review: Spring 2016 1 Internet and Online Security Policy Contents 1 Aims and Objectives...

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

Simon Langton Grammar School for Boys E-Safety Policy

Simon Langton Grammar School for Boys E-Safety Policy Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,

More information

Internet Use Monitoring

Internet Use Monitoring Internet Use Monitoring Discussion with Commonwealth of Virginia Information Security Council Cameron Caffee, VDOT IT Audit Manager Jim Austin, VDOT Deputy ISO June 16, 2008 VDOT Internet Monitoring Background

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement 111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use

More information

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these

More information

Parental Control Single Product Test

Parental Control Single Product Test Parental Control Single Product Test ESET Smart Security 8.0 Parental Control Test August 2015 Language: English August 2015 Last Revision: 14 th September 2015 Content Introduction: parental control software

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

1 The benefits of Internet access for education... 2. 2 Whole-Academy network security strategies... 2. 2.1 Hardware and software infrastructures...

1 The benefits of Internet access for education... 2. 2 Whole-Academy network security strategies... 2. 2.1 Hardware and software infrastructures... CITY ROAD PRIMARY ACADEMY ACCEPTABLE AND RESPONSIBLE USE OF IT RESOURCES (INTERNET ACCESS AND EMAIL POLICY STAFF AND STUDENTS) Contents 1 The benefits of Internet access for education... 2 2 Whole-Academy

More information

ICT Safe and Acceptable Use Policy for Students

ICT Safe and Acceptable Use Policy for Students ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Date created: November 2015 Date for review: July 2016 Created by: Mark Vanstone,

More information

St Bernadette s Catholic Primary School. E-Safety Policy

St Bernadette s Catholic Primary School. E-Safety Policy St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational

More information

Managing e-mail at Winton Primary School

Managing e-mail at Winton Primary School Managing e-mail at Winton Primary School This school: Does not publish personal e-mail addresses of pupils or staff on the school website. We use anonymous or group e-mail addresses, for example info@schoolname.la.sch.uk

More information

Guidance on the Use of Social Networking

Guidance on the Use of Social Networking Guidance on the Use of Social Networking Version 1 - January 2012 Reviewed: September 2013 Version 2 Approved by SM: November 2013 Version 2 modified and approved by the PCC Board: April 2014 Overview

More information

St Vincent s Catholic Primary School e-safety Policy

St Vincent s Catholic Primary School e-safety Policy St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety

More information

Domains belonging to a domain name registration service or a holder of domain names of unused websites.

Domains belonging to a domain name registration service or a holder of domain names of unused websites. Olfeo s list of categories International database Secure / Optimize / Analyze Internet usage Legal Risk Theme Category Description Security Risk Child/Teenage Pornography Counterfeiting and Copyright Infringement

More information

2. Provide the name and annual cost of the content filtering software. Smoothwall Web Filter c. 2,100 pa

2. Provide the name and annual cost of the content filtering software. Smoothwall Web Filter c. 2,100 pa 1. Do you employ the use of content filtering software on the PCs based in your libraries which are connected to the internet and intended for use by the users of your library? Yes If answer to 1. is yes,

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

E-Safety Policy & Procedures

E-Safety Policy & Procedures E-Safety Policy & Procedures Version Policy Originator: Equality Impact Assessed: Approved by: SMT Date Approved: April 2015 Review Interval: Annually Last Review Date: - Next Review Date: April 2016 Audience:

More information

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

E-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school.

E-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school. E-Safety Policy Development / Monitoring / Review of the policy This policy applies to all members of the school (including staff, students / pupils, volunteers, parents / carers, visitors, community users)

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

ACSI Advertising Guidelines Advertising Philosophy

ACSI Advertising Guidelines Advertising Philosophy ACSI Advertising Guidelines Advertising Philosophy Thank you for helping fund the work of the Association of Christian Schools International (ACSI) by advertising with us. Please be aware that ACSI will

More information

LGfL Managed Exchange Staff Service (StaffMail) Service Description

LGfL Managed Exchange Staff Service (StaffMail) Service Description LGfL Managed Exchange Staff Service (StaffMail) Service Description London Grid for Learning Document Version 1.6 Dated January 27 th 2011 Copyright The copyright in this work is vested in London Grid

More information

E- Safety and Digital Photography - College ICT

E- Safety and Digital Photography - College ICT Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,

More information

EHLANZENI DISTRICT MUNICIPALITY PROXY FILTERING AND INTERNET ACCESS POLICY FOR 2012

EHLANZENI DISTRICT MUNICIPALITY PROXY FILTERING AND INTERNET ACCESS POLICY FOR 2012 EHLANZENI DISTRICT MUNICIPALITY PROXY FILTERING AND INTERNET ACCESS POLICY FOR 2012 1. OBJECT OF THE POLICY The purpose of this policy is to define standards for systems that monitor and limit web use

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

Proxies. Chapter 4. Network & Security Gildas Avoine

Proxies. Chapter 4. Network & Security Gildas Avoine Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open

More information

Wilsthorpe Community School

Wilsthorpe Community School Wilsthorpe Community School Online Safety Policy REVIEWED March 2016 Introduction This Online Safety Policy has been written by the school, building on LA policy and government guidance. It has been agreed

More information

e-safety Policy for Hertsmere Jewish Primary School

e-safety Policy for Hertsmere Jewish Primary School e-safety Policy for Hertsmere Jewish Primary School Reviewed by: Mrs R Wolman, Miss C Stephens and Miss G Geffin Reviewed on: February 2015 Date of Next Review: February 2016 Policy Review This policy

More information

How To Behave At A School

How To Behave At A School THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

P319 Internet (including social networking) and email usage in schools and academies Model policy

P319 Internet (including social networking) and email usage in schools and academies Model policy Contents (If you are viewing this document online, click on the headings below to jump to the relevant section) 1. Introduction... 1 2. Internet use... 2 3. Email use... 2 4. Data protection, freedom of

More information

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things. Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?

More information

Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy)

Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy) Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy) What is E-Safety? E-Safety encompasses Internet technologies and electronic communications such as mobile

More information

[Example] Social Media Acceptable Use Policy

[Example] Social Media Acceptable Use Policy [Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.

More information

ICT Security Policy for Schools

ICT Security Policy for Schools WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of

More information

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

ELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1

ELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1 ELECTRONIC MAIL (E-MAIL) September 2014 Version 3.1 Western Health and Social Care Trust Page 0 of 6 E-mail Policy V3.1 Policy Title ELECTRONIC MAIL (E-MAIL) POLICY Policy Reference Number CORP09/006 Original

More information

Acceptable Use of ICT Policy. Learner School Policy

Acceptable Use of ICT Policy. Learner School Policy Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL

More information

HTTPS Inspection with Cisco CWS

HTTPS Inspection with Cisco CWS White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a

More information

Great Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy

Great Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy Great Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy November 2013 This policy was adopted on:... Date of last review:... Signed:... Great Horwood C.E. Combined School Page 1 Acceptable

More information

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

E-Safety and Acceptable Use Policy

E-Safety and Acceptable Use Policy E-Safety and Acceptable Use Policy This policy has been written in consultation with pupils and staff so that they understand that there are dangers associated with Internet use, and they know what behaviour

More information

St Edward s Church of England Academy. E-Safety Policy

St Edward s Church of England Academy. E-Safety Policy St Edward s Church of England Academy E-Safety Policy Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information