TRINITY COLLEGE COLAC

Size: px
Start display at page:

Download "TRINITY COLLEGE COLAC"

Transcription

1 TRINITY COLLEGE COLAC ipad PROGRAMME 2 Student User Guide CONTENTS Section 1: ipads in the Classroom Section 2: Overview of the Device Section 3: Cyber Safety Section 4: Student User Agreement

2 SECTION 1: ipads in the CLASSROOM As part of our ICT Strategic Plan, Trinity College Colac distributed ipads in 2012 to students in three year levels. Last year, we implemented the next phase of our ipad Programme by rolling out ipads to students across all year levels. This decision was based on the belief that every student should have a portable electronic computing device for educational purposes. We believe we have invested in the future of our students by having the ipad as part of the normal school equipment and have seen an improvement in the learning and engagement of our students. The ipad was chosen by the College as the best device for our purposes at this time. Currently the ipad is the most popular device on the planet and its effect has been remarkable. This lightweight, easy-to-use device allows beginners to seek information and present material in a manner that was unthinkable a few years ago. Such technologies will become more common and affordable. Current research shows that there has been a positive impact on the learners. Classes are more interactive and interesting. Students are able to show their work in an engaging manner and greater opportunities are promoted through more collaboration with both the teacher and the student. In addition, ipads provide greater creativity in regard to content, curriculum planning and pedagogy. The ipad possesses a range of features that we believe make it a great match for our classrooms: They make mobile computing easier and lighter. When one compares the cost, size and mobility to lap tops, a tablet is preferable to other devices. ipads are reasonably costed to act as a 1:1 device, which fulfils the aim of our strategic plan. ipads have the potential to become a paperless innovation. From homework to tests to digital textbooks, the ipad offers numerous was to eliminate paper, thus offering a sustainable alternative to the overuse of paper. There is an ever-growing source of resources and applications to complement the use of ipads for teaching and learning. The use of apps allows students to choose how they demonstrate knowledge and understanding. The many uses of the ipad caters for various learning styles. It uses a tactile interface and media-friendly approach that introduces fun to the learning experience. Long battery life means students and schools do not have to worry about charging during school hours. If ipads are fully charged overnight, they should not require charging during the day (depending on their use). They are an intuitive device requiring minimal technical support. Tablets suit the students lifestyle. They are thin, lightweight and spring to life without delay.

3 For teachers, the use of ipads opens up endless possibilities as students can: Create a digital graphic novel using Comic Life to tell a short story. Add audio to the images and upload. Illustrate a brainstorm using Popplet. View and discuss podcasts and videos made by universities and educational providers. Research projects, look up ideas and find answers to questions. Create presentations and lab reports. Use interactive reading in English (annotate and define). Use a photo lab or digital painting pad. Record and edit a range of sounds. Can consider how to use digital creations to complement other classwork. Students could create sound-scapes for different situations. Choose a topic and allow 60 seconds for students to read about a topic, and then use Popplet to create a Mind Map, capturing and organising what they have learnt within five minutes. Students could share their thoughts with the class. Students could use Strip Design to storyboard their response to a range of issues discussed. An example is that in Health, they can explore friendship, the importance of sleep or anti-bullying programmes. Students could provide a health-promoting response in six screens. Select an image from the gallery that depicts individuals engaging in cultural events in a responsible and active way. Can use Strip Design to create a timeline outlining the sequence of a key historical event. After researching a topic from the History Maps app, students can include all the relevant facts and information to demonstrate their understanding, in a concise manner by using Comic Life. The journey has been exciting so far and we look forward to greater student engagement in their learning through exciting and imaginative lessons.

4 SECTION 2: OVERVIEW of the DEVICE First visit the apple.com.au website to set up an itunes account to allow ipad Apps to be purchased. Your family may elect to buy gift cards which are discounted in various stores or they may choose to pay by credit card.

5

6 DOWNLOAD OUR FREE TRINITY COLLEGE COLAC APP. Keep up-to-date with events, messages, Newsletters, photos, price lists and more with our free App. Events can be automatically updated to your calendar and the App enables one touch access to contact us or to go to the College website. Downloading Instructions for iphones & ipads: In the Apps store, search for Trinity College Colac. You must select it from the iphone Apps Tab. Download from the Apple App Store. Please allow Push Notifications when requested during the download, so that you can stay updated.

7 SECTION 3: CYBERSAFETY 1. INTRODUCTION Trinity College recognises how crucial it is for students to capably and confidently learn through Information and Communication Technology (ICT) resources and systems. The College will provide ICT support systems for the safe and appropriate access and management of digital learning and teaching resources. The College's ipad programme is no exception. Although the nature of the College s ipad programme will evolve over time, our commitment to providing students with a safe ICT environment will not change. The Student User Agreement as explained in Section 4 of this brochure forms the foundation of this commitment. The agreement outlines conditions for acceptable use of ICT at the College. Both students and parents/guardians are to read and sign this agreement as acknowledgement of an understanding and acceptance of the terms by which this technology is to be used. The sections pertaining to Cybersafety in the User Agreement include sections two, three and four. Below is an outline of some of the serious risks potentially associated with students using ICT at home. Parents and teenagers should read the following carefully, and consider adopting some of the tips suggested for avoiding or dealing with problems. 2. KEEPING SAFE Cyber-safety is about the protection of students whilst using ipads and other ICT, especially while connected to the internet. The information in this section comes from the Commonwealth Cybersmart website ( Parents are encouraged to visit this and other websites to familiarise themselves with its contents. 2.1 Cyberbullying The use of ICT devices to deliberately and repeatedly engage in behaviour calculated to harm another is known as cyber bullying. Cyberbullying can cause serious negative social, psychological and academic consequences. Such cyberbullying can take many forms, including: sending abusive texts, s or messages posting unkind messages or inappropriate images on Facebook imitating others online excluding others online Students can also be affected by hostile behaviour that is not cyberbullying. One-off insensitive or negative remarks or jokes may not be considered cyberbullying; however, they can still have a negative impact on students. 2.2 Tips to help teenage children deal with cyberbullying Talk to your teen about cyber bullying before it happens. Do not wait until there is a problem. Work together with teens to develop strategies you are both comfortable with, so your child knows what to expect if they report concerns to you.

8 Reassure teens that you support them and will not disconnect them from the online world. Encourage them to tell you or another trusted adult if they receive or hear of negative messages or are excluded by others. Help teens stay connected to friends and family both online and offline. This will protect against the negative outcomes of bullying. Advise teens not to respond to any negative messages but to save the messages and details of the senders. You may want to save the messages for them so that they do not keep reading them and feel worse. You can help your teen report concerns to service administrators, including the mobile phone provider (if SMS is involved), website administrator (if social networking or chat services are involved) or internet service provider. Encourage your teen to support friends and report concerns about friends who may be involved in cyber bullying. Advise your teen never to share their password with friends. Friendships may be short-lived at this age and former friends can misuse passwords to cyber bully previous friends. If your child has been involved in cyber bullying and seems distressed or shows changes in behaviour or mood consider, seeking professional support, including through the Cybersmart Online Helpline at Students can also seek guidance from their Homeroom Teacher / Year Level Coordinator or make an appointment with the Student Wellbeing Coordinator. 2.3 Sexting Sexting refers to the sending of provocative or sexual photos, messages, or videos, generally using a mobile phone. It can also include posting this type of material online. While sharing suggestive images or text messages may seem like innocent flirting or may be considered as funny to young people, sexting can have serious social and legal consequences. To help protect their image both online and offline, young people need to consider how they manage their own and others messages and images. 2.4 Tips to help teenage children deal with sexting Talk with your teen about sexting and its social and legal consequences. Even if all participants are willing, teens may be breaking the law if they take and share naked or sexual images of themselves or others who are minors because sexting images may be considered child pornography. Sexting can have social consequences. If, for example, images are forwarded on from the intended recipient, say following relationship break-ups, the social ramifications can be devastating. Images may end up being viewed by many people through mobiles and posting online. Remind your teen to delete all sexual content received and not to forward this type of content. Remind them to consider the feelings of others when taking photos and distributing content by mobile phone or online. If you are concerned that a sexting incident may be a criminal matter, contact your local police. If your teen is exposed to inappropriate content or involved in creating it, talk with them about it.

9 If necessary, seek professional support, including support through the Cybersmart Online Helpline at Students can seek guidance from their Homeroom Teacher, Year Level Coordinator, Director of Students or make an appointment (through the Student Reception Office) to meet with the Student Wellbeing Coordinator. 2.5 Online grooming Teens might communicate online with people they do not know, or have not met, in real life. The anonymity offered by the internet can allow people to disguise their true identity. For example, someone claiming to be a 12 year-old girl might really be a 40 year old man. This anonymity means that online sexual solicitation and online grooming can present serious risks. Sexual solicitation involves seeking sexual conversations or activity or sending sexually explicit images. Online grooming and procuring of minors is illegal. It happens when adults seek a sexual relationship through online contact children under 16. Grooming can be a gradual process and often seems innocent at first. Further information can be obtained from the Australian Federal Police which investigates suspected online grooming. 2.6 Tips to help teenage children deal with online grooming Be involved in your teen s use of ICT: keep up-to-date with websites they visit and explore them with your teen if possible. Consider whether you feel comfortable with the site content and the potential for interaction with others, including adults. Remind your teen to create user-names or IDs that are gender neutral and which exclude details of their age, name and location. Advise them to avoid using sexually provocative names. Guide your teen to use strict privacy settings so only friends can see information about them. If they want to meet an online friend that they have not met in person, encourage them to ask a parent or other trusted adult to go with them and always meet during the day in public places. Encourage your teen to block people online who make them feel uncomfortable. They should report inappropriate contact to site administrators. Some teens worry about parents reaction to online behaviour, especially about online sexual exchanges. This can stop teens reporting concerns about online contact. Sexual predators play on worry and shame to isolate teens from their family and friends. Such predators attempt to encourage teens to trust and confide in them, rather than in the teen s family/friends. To overcome this, reassure your teen of your unconditional support for them and do not block their internet access if they tell you they feel uncomfortable or worried about online conversations. Look for concerning changes in your teen s behaviour or mood. These can include changes in sexualised behaviours or confidence, clinginess or withdrawal, anxiety or sadness. Explore your concerns with them and, if necessary, seek professional

10 support including that available through the Cybersmart Online Helpline at Students can seek guidance from their Homeroom Teacher, Year Level Coordinator, Director of Students or make an appointment (through the Student Reception Office) to meet with the Student Wellbeing Coordinator. 2.7 Protecting personal information Personal information identifies an individual. Personal information includes full name, address, date of birth, phone numbers, addresses, usernames and passwords, bank details, student identity card details or passport details. Online, this information is used by legitimate businesses to verify a user s identity. It can be safe to disclose personal information to legitimate businesses. However, personal information can also be misused by marketers for spam or criminals for fraud. Misused personal information can also harm our digital reputation : the opinions held about us based on what we do and say online. 2.8 Tips to help teenage children protect personal information Remind your teen that not everyone is who they say they are. Teens often seek to have many online friends. Advise them that adding people that they do not know on friends lists allows those people to learn all about them. This information could be misused for scams, to steal their identity or worse. Discuss managing their personal information on Facebook and other social networking sites. Encourage them to withhold personal information from their profiles. This includes phone numbers, addresses, home or school addresses, even the name of their school. Encourage caution when teens post photos: they do not want to accidentally provide clues to personal information such as a photo of the teen in school uniform. Encourage teens to use a separate account when signing up to games or websites. This account can disabled if misused. It should exclude names or other identifiers in the address. Teens could also establish separate social networking accounts for self-promotion or special interests. They should ensure the site does not display their personal information. Encourage teens to read user agreements and privacy policies to see how their personal information may be used. Many organisations use information for marketing and some sell it to other marketing firms. Remind your teen that they should only disclose financial information on trusted websites that have secure payment facilities. Remind them that banks never individuals asking for their user name or password. Such s they should be reported to the bank and the Government s SCAM watch website at or their local consumer affairs agency. 2.9 Excessive internet use Sometimes it seems that teens are constantly online. Often they seem to be multi-tasking: downloading and listening to music while studying and chatting with friends or sending messages on mobile phones. The number of hours teens spend online varies significantly. There is no right amount of time for them to spend online; however, if their online

11 behaviour impacts negatively on their wellbeing, or on that of the family, it may be appropriate to discuss expectations and to establish time limits Tips to help teens deal with excessive internet usage Look for signs that your teen may be spending too much time online. Signs include declining interest in other activities, talking constantly about online activity, dropping school grades or irritability when they are away from a game. You might suspect they are getting up after bed time to play games or chat to others. Teens may seem tired during the day or even skip meals to avoid leaving the computer. In these cases, consider establishing rules about when teens can play games or use the internet and how long they can play each day. You might establish an agreement with your teen on a set balance of online and offline activities. You may need to establish consequences for rule breaches. For example, if your teens do not complete assigned chores, they may have their access to online games restricted. Try to put computers and ipads, even mobile phones, in a shared or visible place at home so you are aware of when your teen is online. If you are concerned about your teen s online behaviour, explore your concerns with them. If necessary, seek professional support, including support through the Cybersmart Online Helpline at The Cybersmart Online Helpline provides free, confidential online counselling for children and young people. Students can seek guidance from their Homeroom Teacher or Year Level Coordinator or make an appointment, via the Front Office, with the Student Wellbeing Coordinator. References Australian Communications and Media Authority, 2012, CyberSmart. Catholic College Sale, 2012, Student ipad Manual.

12 SECTION 4: STUDENT USER AGREEMENT TRINITY COLLEGE COLAC ipad PROGRAMME STUDENT USER AGREEMENT Contents 1. INTRODUCTION ACCEPTABLE USES Respect the aims of the College ipad programme Respect others Keep safe online UNACCEPTABLE USES Personal safety Illegal activities Jail-Break Network security Respect for privacy Respect for others Plagiarism and copyright Access to inappropriate material Games in class NOTIFICATION CONSEQUENCES OF IMPROPER USE USER APPLICATIONS FAULT & DAMAGE LIABILITY INSURANCE SECURITY RETURNING THE IPAD... 15

13 1. INTRODUCTION Trinity College recognises its responsibility to provide and maintain an effective and efficient contemporary learning environment. This shared responsibility extends to all staff, students and parents accessing the College Information and Communication Technology (ICT) resources and systems. The College endeavours to continue to provide ICT which: personalises and extends student learning; through College planning for professional learning, improves the educational skills of teachers; supports connected learning beyond the school; supports systems for the safe and appropriate access and management of digital learning and teaching resources. The College is committed to achieving positive change through the introduction and implementation of an ipad programme. The ipad, made available for students, will be funded by the College. In 2013, and upon the completion and submission of this user agreement, all students will be allocated an ipad for use in all classes. This agreement describes the conditions for acceptable use of Information and Communication Technologies at the College for the 2014 ipad programme. Both students and parents/guardians are to read and sign this agreement as acknowledgement of an understanding and acceptance of the terms by which this technology is to be used. The ipad remains the property of Trinity College. While students have access to the device, any staff member may inspect the device and remove any material which is not considered appropriate and related to the educational purpose of the device. 2. ACCEPTABLE USES Digital Citizenship refers to appropriate behaviour and conduct within an online community. Students will be expected to demonstrate appropriate digital citizenship by adhering to the acceptable uses outlined below. This section is coloured green to indicate that students are expected to: 2.1. Respect the aims of the College ipad Programme Bring a charged ipad to school every day. Students are to leave the charger at home in a safe place. Use ICT equipment and resources for educational purposes only, under supervision Respect others Follow the same standards of behaviour online as you are expected to follow in real life. Observe copyright rules by respecting the information, ideas and artistic works of others. Acknowledge the author or publisher of information from the Internet and do not claim the work as your own. Use the device in a responsible manner and comply with teacher instructions regarding the ipad, particularly closing the ipad when instructed to do so Keep safe online Keep passwords, personal details and work secure. Always get teacher permission before taking images, publishing any personal information, photos or video online.

14 3. UNACCEPTABLE USES The following uses of ICT are unacceptable. This red section indicates that students must NOT: 3.1. Personal safety NOT send or post detailed personal information, images or audio about yourself or other people. (Personal contact information includes home address, telephone or mobile number, school address, work address, addresses, etc) Illegal activities NOT make deliberate attempts to destroy data by hacking/spreading computer viruses NOT engage in any illegal act, such as threatening the personal safety of others. NOT install or use software which is not licensed or approved by the College Jail-Break Jail-break removes the limitations imposed by Apple on the ipad. The ipad is the property of the College and any attempt to Jail-break the ipad is a direct breach of the agreement between students and the College Network security NOT attempt to gain access to any computer system or service to which you do not have authorised access. This includes attempting to log in through another person's account or accessing another person's files or s. NOT provide your password to another person. NOT post information that, if acted upon, could cause damage to or disrupt the network Respect for privacy NOT re-post a message that was sent to you privately without the permission of the person who sent the message. NOT take or distribute photos, sound or video recordings of people, including background figures and voices, without their permission Respect for others NOT make deliberate attempts to disrupt other people s use of ICT. NOT use obscene, profane, rude, threatening, sexist, racist, disrespectful or inappropriate language. NOT make personal attacks on another person. NOT harass another person. If someone tells you to stop sending them messages, you must comply with their request Plagiarism and copyright NOT plagiarise works found on the Internet. Plagiarism is taking the work of others and presenting them as if they were original to the user. NOT use material from the Internet in a manner which is a breach of copyright laws. NOT use material from the Internet which relates to exam or assignment cheating Access to inappropriate material NOT use ICT to access material that: is profane or obscene (pornography) advocates illegal acts advocates violence or discrimination towards other people 3.9. Games, imessaging and Snapchat in class NOT use the ipad to play games in the classroom, or use imessaging or Snapchat (or any other social media) unless under specific instruction from a staff member for curriculum purposes only.

15 4. NOTIFICATION You should: Disclose to your Homeroom teacher or Year Level Coordinator any messages you receive that are inappropriate or which disturb you. Notify the Year Level Coordinator if you identify a possible security problem. Immediately disclose accidental access to inappropriate material to the Subject Teacher or Year Level Coordinator. This will protect you against an allegation that you have intentionally violated College policy. 5. CONSEQUENCES OF IMPROPER USE Whilst attached to the network, the College will filter and monitor , web traffic and content accessed by students to ensure appropriate usage. Any breach will be recorded and may be subject to the following consequences: warning informing parents/guardians detention user denied the privilege of taking the ipad off campus suspension from the College network confiscation of ipad from the user suspension from the College incurring the cost of replacement of equipment expulsion from the College legal action any further action deemed appropriate by Trinity College 6. USER APPLICATIONS In 2014, each student will be required to purchase approximately $40 worth of applications (also known as apps) from the Apple App Store for use in the classroom at the College. This is easily achieved through purchasing itunes gift cards from itunes. An initial list of these apps will be provided by the College at the start of this booklet. Additional free apps will be recommended throughout the year and these will be published on the College newsletter. Parents and/or students may purchase other apps at their own expense. Individual subjects may also request students to download additional apps. These will be free apps and will be regulated by Domain Heads and the Director of Learning. Families will be notified via the newsletter throughout the year of the need for these apps. Parents with several students at the College should consider whether they can achieve cost savings by synchronising several ipads to one itunes account at home. 7. FAULT & DAMAGE Any fault, damage or loss of an ipad is to be reported immediately to the Library. The student will be required to complete a report detailing the circumstances around the damage or loss of the device.

16 Damage/Loss In the event that the ipad has been lost or damaged beyond repair, the family will be liable for the full cost of replacing the device. In such instances, the family will be advised as soon as possible. If it is ascertained that the damage or loss is as a result of the actions of another student, then that student will be required to meet with their Year Level Co-ordinator who will interview both students. The family of the offending student(s) will become liable for the replacement value of the device. It is therefore important not to touch another student s ipad. Replacement devices will be ordered through the College s preferred supplier. A separate invoice will be raised to cover the full replacement cost of the ipad and the family will be required to make payment of this within 30 days of the loss/damage of the device. As the ipad is the property of Trinity College, the device will be repaired through the College s preferred supplier. 8. LIABILITY The College will not be liable for any loss or damage caused by students, to a third party, as a result of use of the ipad. The College reserves the right to add policy as experience of the ipad programme unfolds. 9. INSURANCE The College has opted to self-insure the ipads. If the ipad can be repaired, there is a minimum cost for damage of $ to be paid by the parent/guardian of the student(s) involved. 10. SECURITY The ipad must be kept safe at all times and students must ensure that their allocated ipad is not: left unattended; left in a motor vehicle; left in an unlocked locker; loaned to another person. Should the ipad be stolen as a result of any of the above it will be the responsibility of the parent/guardian to replace the ipad at their own expense. A police report will be required if the ipad is reported as stolen or lost. 11. RETURNING THE ipad The ipad remains the property of Trinity College. The ipad must be returned to the Library prior to the student exiting the College. The College may request the return of the ipad to the Library at any time and at the end of the academic year prior to the last day of classes for the student. If the ipad is not returned, the family will be invoiced for the full replacement cost of a new ipad.

17 TRINITY COLLEGE ipad USER AGREEMENT It is expected that one parent/legal guardian of every new student will attend an ipad Programme Information Session. Student I understand and will abide by the terms described in the ipad Programme User Agreement contained in the ipad Programme Guide. I further understand that any breach of the agreement may constitute a criminal offence. Should I commit any breach, my access privileges may be suspended and disciplinary and/or legal action may be taken. First name Surname Date Signature Parent or Guardian As the parent or guardian of this student, I have read the ipad Programme User Agreement contained in the ipad Programme Guide. I understand that the ipads provided by the College for the use of students are for educational purposes. I support the College s measures in ensuring the safe and appropriate use of these resources. In signing this document, I understand and agree to the Student User Agreement Terms outlined in the Trinity College ipad Programme guide. First Name Surname Date Signature Please note that your son/daughter will not have access to an ipad as part of the programme until this agreement has been signed and submitted to the College and you have attended an ipad Programme Information Night with them.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

Computer Facilities and External Networks Acceptable Use by Students

Computer Facilities and External Networks Acceptable Use by Students Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic

More information

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage. Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+

TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ BYOD (Bring Your Own Device) Technology Acceptable Use Washington District Schools provides all students access to technology, the district

More information

Responsible Computer Use Policy for Students

Responsible Computer Use Policy for Students Responsible Computer Use Policy for Students Introduction By using the Sheldon College Network and ICT Services students agree to accept the terms and conditions outlined in this document. This policy

More information

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,

More information

Parent / Guardian Consent for Technology Use in Schools

Parent / Guardian Consent for Technology Use in Schools Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

Students Acceptable Use Policy for Electronic Resources Rules Summary

Students Acceptable Use Policy for Electronic Resources Rules Summary Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must

More information

Tablet Agreement. Sir Charles KAO UTC Tablet Usage Policy Amended: 20/8/15

Tablet Agreement. Sir Charles KAO UTC Tablet Usage Policy Amended: 20/8/15 ` Tablet Agreement 1 Tablet Agreement The focus of the Sir Charles Kao UTC is to support the learning and progress of our students through the use of technology and information. Excellence in education

More information

Passwords Students should not share their assigned password, or attempt to discover the school Apple Id.

Passwords Students should not share their assigned password, or attempt to discover the school Apple Id. Alta Loma Christian School Acceptable Use Policy 1:1 ipad Program Revised January 20, 2014 Alta Loma Christian (ALCS) recognizes that access to technology in school gives students greater opportunities

More information

Administrative Procedures Memorandum A1300

Administrative Procedures Memorandum A1300 Page 1 of 8 Date of Issue October 2013 Original Date of Issue June 2012 Subject INFORMATION AND COMPUTING TECHNOLOGY - APPROPRIATE USE GUIDELINES FOR STUDENTS References This APM replaces A1160 Computing

More information

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2 Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...

More information

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3

More information

POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6

POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.

More information

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized

More information

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY Acceptable Use Policy Educational Purpose The computer system in Blackrock College has been established for a limited educational purpose. The term "educational purpose" includes classroom activities,

More information

Bright Local Schools BYOD Acceptable Use Policy

Bright Local Schools BYOD Acceptable Use Policy Bright Local Schools BYOD Acceptable Use Policy Why Bring Your Own Device at Bright Local Schools? Bright Local is dedicated to providing 21st Century instruction to all its students. We feel we must provide

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

How To Use Your Cell Phone At Renaissance Academy Charter School

How To Use Your Cell Phone At Renaissance Academy Charter School Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance

More information

John of Rolleston Primary School

John of Rolleston Primary School John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership

More information

Ceres Unified School District

Ceres Unified School District Ceres Unified School District TECHNOLOGY USE POLICY Grades K-12 Please read this policy below carefully to be instructed in proper behavior and use regarding the Internet. This policy covers technology

More information

Christ Church Grammar School ipad Programme. Guidelines, Policy and Expectations

Christ Church Grammar School ipad Programme. Guidelines, Policy and Expectations Christ Church Grammar School ipad Programme Guidelines, Policy and Expectations Revised January 2014 Deployment within the School The ipad programme at CCGS is intended to be a one device per boy system

More information

School Policy Regarding Computer Use, Technology and Internet Access

School Policy Regarding Computer Use, Technology and Internet Access School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school

More information

COMPUTER, NETWORK AND INTERNET USE POLICY

COMPUTER, NETWORK AND INTERNET USE POLICY 4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate

More information

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut Policy E-040 Effective Learning Environment GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut Procedure E-040.4 - Acceptable Use and Internet Safety Agreement Acceptable Technology Use Regulations/Internet

More information

Technology Acceptable Use Policy

Technology Acceptable Use Policy Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop

More information

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students

More information

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is

More information

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement 111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy

Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of

More information

The Fulham Boys School ipad Acceptable Use Policy, Procedures and Information

The Fulham Boys School ipad Acceptable Use Policy, Procedures and Information The Fulham Boys School ipad Acceptable Use Policy, Procedures and Information Except where specifically stated otherwise, the policies, procedures and information within this document apply to all ipads

More information

System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February 2014. Purpose.

System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February 2014. Purpose. System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February 2014 1 2 3 4 5 6 7 8 9 Purpose The purpose of this policy is to define expectations

More information

Student Laptop User Charter

Student Laptop User Charter Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both

More information

Front Range Christian School ipad Acceptable Use Policy

Front Range Christian School ipad Acceptable Use Policy Introduction Front Range Christian School ipad Acceptable Use Policy Front Range Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate,

More information

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and

More information

Sydney Technical High School

Sydney Technical High School Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

Student Tablet Guide

Student Tablet Guide Student Tablet Guide Contents 1. School Day 2. A list of Do s 3. A list of Do Not s 4. Support Model 5. FAQ 6. File management 7. Backing up 8. Online citizenship 9. Parents 10. Tablet Keys and Ports Front

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Minor, for the purposes of this policy, is an individual who has not attained the age of 17.

Minor, for the purposes of this policy, is an individual who has not attained the age of 17. POLICY TITLE: Computer and Network Services: Acceptable Internet Use Policy POLICY NO: 698 PAGE 1 of 9 GENERAL Internet access is a service provided for students and staff members by this school district.

More information

IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT

IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT Revised 2011 IRON MOUNTAIN PUBLIC SCHOOLS ACCEPTABLE USE POLICY FOR ELECTRONIC RESOURCES All Iron Mountain Public

More information

One-to-One Technology Initiative Table of Contents

One-to-One Technology Initiative Table of Contents One-to-One Technology Initiative Table of Contents 1. Acceptable Use... 2-4 General Staff Responsibilities Parent and Guardian Responsibilities User Responsibilities Consequences 2. ipad Identification

More information

Dauphin County Technical School

Dauphin County Technical School Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,

More information

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School: Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership

More information

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 (Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

6141.9. Internet and Computers. Acceptable Use and Internet Safety

6141.9. Internet and Computers. Acceptable Use and Internet Safety 6141.9 Acceptable Use and Internet Safety The Board of Education provides computers, a computer network, including Internet access and an email system, as well as electronic devices such as cellular telephones

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois 6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014

Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014 Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014 Why Bring Your Own Device? Technology is now an essential part of education. To be able to live,

More information

Public Schools of CLK Acceptable Use Policy for Electronic Resources iclk Learning Initiative

Public Schools of CLK Acceptable Use Policy for Electronic Resources iclk Learning Initiative Public Schools of CLK Acceptable Use Policy for Electronic Resources iclk Learning Initiative All Public Schools of Calumet, Laurium and Keweenaw (CLK) students and staff are responsible for their actions

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

MOBILE PHONE & COMPUTER USE POLICY

MOBILE PHONE & COMPUTER USE POLICY MOBILE PHONE & COMPUTER USE POLICY epal epal is the online learning hub for the Australian Performing Arts Grammar School. It is a main form of communication between parents, students, staff and administration.

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology

More information

Student Laptop Program

Student Laptop Program Student Laptop Program Student Name: Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 3 2. Overview of Student and Parent Responsibilities... 4

More information

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes

More information

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students. POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive

More information

Bring Your Own Device (BYOD) Handbook. Smackover-Norphlet School District

Bring Your Own Device (BYOD) Handbook. Smackover-Norphlet School District Bring Your Own Device (BYOD) Handbook Smackover-Norphlet School District August, 2014 For the purposes of BYOD, devices means personally owned, wireless portable electronic equipment used for instructional

More information

SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081

SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081 SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081 POLICY: COMPUTER/INTERNET ACCEPTABLE USE POLICY AGREEMENT Overview Access to information is fundamental to citizenship and the foundation for further

More information

Parker School s ipad Reference Manual

Parker School s ipad Reference Manual Parker School s ipad Reference Manual Introduction Contents Acceptable Use Policy Overview Parker School s Network Guidelines Introduction User Requirements ipad and ipad Accessory Requirements How to

More information

Lowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy

Lowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy BYOD Program 2015 BYOD Student Agreement/Acceptable Use Policy/Online Services Policy The student and parent/guardian must carefully read the above contract before signing it. Any questions should be addressed

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Portage Township Schools

Portage Township Schools Portage Township Schools Student/Parent BYOD Technology Handbook 1.1 BYOD Description: BYOD stands for Bring Your Own Device. Students will be encouraged to bring a recommended device to school to be used

More information

ipad Program Information for Parents/Caregivers and Students

ipad Program Information for Parents/Caregivers and Students Next Review Date: September 2016 Page Number: 1 of 11 ipad Program Information for Parents/Caregivers and Students Next Review Date: September 2016 Page Number: 2 of 11 1 Introduction...3 2 Supplying the

More information

Digital Device LOAN CHARTER

Digital Device LOAN CHARTER Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to

More information

COMMUNICATION AND NETWORK POLICY

COMMUNICATION AND NETWORK POLICY COMMUNICATION AND NETWORK POLICY Always within REACH MOUNT BAKER SOUTH PRIMARY SCHOOL IPAD LOAN AGREEMENT Purpose To facilitate participation in all aspects of Mount Barker South Primary School curriculum.

More information

ST MARY S COLLEGE, AUCKLAND POLICY ON USE OF INFORMATION & COMMUNICATION TECHNOLOGY (ICT)

ST MARY S COLLEGE, AUCKLAND POLICY ON USE OF INFORMATION & COMMUNICATION TECHNOLOGY (ICT) ST MARY S COLLEGE, AUCKLAND POLICY ON USE OF INFORMATION & COMMUNICATION TECHNOLOGY (ICT) Rationale: 1. As information that can be accessed on the ICTs is uncensored, this policy will ensure that material

More information

e-safety Policy Broadclyst Community Primary School

e-safety Policy Broadclyst Community Primary School e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy

More information

I. PERSONAL RESPONSIBILITY

I. PERSONAL RESPONSIBILITY ACCEPTABLE USE AND INTERNET SAFETY POLICY FOR STUDENTS USING THE COMPUTER SYSTEMS OF THE BUTLER TECHNOLOGY AND CAREER DEVELOPMENT SCHOOLS The Butler Technology and Career Development Schools is pleased

More information

Responsible Use Agreement

Responsible Use Agreement BYOD is an acronym for Bring your Own Device. For BYOD, a "device" is a privately owned laptop, tablet computing device, netbook, notebook, e-reader, ipod touch (or similar), or cell/smart phone. For the

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Technology Acceptable Use Policy. Introduction

Technology Acceptable Use Policy. Introduction Technology Acceptable Use Policy Introduction Shiloh Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop skills

More information

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.

More information

FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:

FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review: FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer

More information

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

Maypearl ISD. Bring Your Own Device (B.Y.O.D.)

Maypearl ISD. Bring Your Own Device (B.Y.O.D.) Maypearl ISD Bring Your Own Device (B.Y.O.D.) 1 Purpose Providing students and staff with a 21 st century digital learning environment is part of the Maypearl ISD core values. Maypearl Independent School

More information

HP Laptop & Apple ipads

HP Laptop & Apple ipads Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview

More information

ONE TO ONE LAPTOP PROGRAMME POLICY

ONE TO ONE LAPTOP PROGRAMME POLICY ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...

More information

RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET

RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET Administrative Procedure 140 Background RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET This Administrative Procedure is to guide users in the proper use of technology within the Division. The goal of the

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

Virginia Primary School Learning Together, Learning for our Future

Virginia Primary School Learning Together, Learning for our Future Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of

More information

MINNETONKA PUBLIC SCHOOLS

MINNETONKA PUBLIC SCHOOLS MINNETONKA PUBLIC SCHOOLS POLICY #524: ELECTRONIC TECHNOLOGIES ACCEPTABLE USE POLICY I. PURPOSE The purpose of this policy is to set forth guidelines for access to acceptable and safe use of the District

More information

NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS

NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS Code No. 605.6E1(B) I am the parent or guardian of the student named

More information

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including

More information

Archbishop Beck Catholic Sports College

Archbishop Beck Catholic Sports College Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety

More information

Kingsley Park Primary School. 1-1 ipad Program BYOD

Kingsley Park Primary School. 1-1 ipad Program BYOD Kingsley Park Primary School 1-1 ipad Program BYOD 2016 Kingsley Park Primary School ipad 1-1 BYOD Program In 2015 KPPS implemented a 1-1 BYOD [bring your own device] Program for Grades 4-6. We will be

More information

Acceptable Use and Internet Safety Policy. Bloom Vernon Local School District

Acceptable Use and Internet Safety Policy. Bloom Vernon Local School District Acceptable Use and Internet Safety Policy FOR THE COMPUTER NETWORK OF THE Bloom Vernon Local School District (Read and retain this document for future reference. Sign and return page 7 ONLY.) The Bloom

More information