Berwick Academy Policy on E Safety
|
|
|
- Jewel Porter
- 10 years ago
- Views:
Transcription
1 Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident at Berwick Academy. Scope This Policy applies to all students and staff, or any other person who utilises ICT communication and internet provision at Berwick Academy The Policy covers the safe use and security requirements and safeguarding functions that are in place in order to protect students and staff. The Policy should be read in conjunction with Academy s ICT Information Security Policy. This document can be found on the network or from the ICT Manager. 1. See also policies on; Bullying Child protection Equal Opportunities ICT Network Security Recruitment Safeguarding Health and Safety Use of Force 2. Role of E Safety Officer The E Safety Officer Eddie Jefferson The following points outline the key aspects of the E Safety Officer s role within Berwick Academy. Act as a single point of contact for all E Safety issues. Liaise with national and international agencies such as the Child Exploitation and Online Protection Centre (CEOP). Develop policy and practice for E Safety. Be aware of potential risks from new and emerging technologies and, if appropriate, communicate these to staff and students. Provide information, training and resources. Regularly produce E-Safety reports via the e-safety monitoring system, Securus. Report any E-Safety related incidents, deemed serious, to the Head Teacher. 3. Why the internet and digital communications are important
2 The internet is an essential element in 21 st century life for education, business and social interaction. The school has a duty to provide students with high-quality internet access as part of their learning experience. Internet use is part of the statutory curriculum and a necessary learning tool for staff and pupils. 4. Internet use will enhance and extend learning The school internet access will be designed expressly for pupil use and will include filtering appropriate to the age of the pupils. Clear boundaries will be set for the appropriate use of the internet and digital communications and discussed with staff and pupils. Pupils will be educated in the effective use of the internet in research, including the skills of knowledge location, retrieval and evaluation. 5. Pupils will be taught how to evaluate Internet content The school ensures that the use of Internet derived materials by staff and pupils complies with copyright law. Pupils will be taught to be critically aware of the materials they read and shown how to validate information before accepting its accuracy. 6. Managing Internet Access ICT system security will be reviewed regularly. Virus protection is installed and updated regularly. Software must not be installed on any school device. All installs are performed by ICT Technical staff. All USB storage devices are scanned by Anti-Virus software when inserted into a PC. 7. Students may only use approved accounts on the school system. Students must immediately tell a teacher if they receive offensive . In communication, students must not reveal their personal details or those of others, or arrange to meet anyone without specific permission. Students and staff must take into account the sensitivity of any data, message or other communication before sending any . Staff facilities are provided primarily for school business use however, it is acknowledged that in some exceptional circumstances it may be permissible to respond to a private . Regardless of this, school facilities must never be used in connection with any secondary business activities. Author Eddie Jefferson ICT Manager, E-Safety Officer 2
3 User mail boxes and their contents may be examined by the school, the LEA, its auditors or any law enforcement agency. Due consideration of the provisions of the Human Rights Act and any other legislation will be made when undertaking such examinations. Any improper use of internal or external , as defined in this policy, or otherwise, may be considered by the school to be a disciplinary matter. The school prohibits the use of for purposes which may be illegal or the making or sending of messages which may be considered to be offensive in any way. must not be used : To make possibly defamatory statements about any person or corporate body. For sexual, racial or other harassment of any person. 8. Published content and the school web site Staff or student personal contact information will not generally be published. The contact details given online are for the school office. 9. Publishing Pupil s Images and Work Pupils full names will not be used anywhere on the school website or other online space, particularly in association with photographs. Written permission from parents or carers will be obtained before photographs of pupils are published on the school website. Work can only be published with the permission of the pupil and the parents/carers. Pupil image file names will not refer to the pupil by name. 10. Social networking, personal publishing and mobile phones The school will control access to social networking sites, and consider how to educate students in their safe use. Newsgroups will be blocked unless a specific use is approved. Students will be advised never to give out personal details of any kind which may identify them, their friends or their location. Students will be advised not to place personal photos on any social network space without considering how the photo could be used now or in the future. Staff members using social networking sites should ensure that all appropriate security settings are in place. Under no circumstances should staff members communicate with students via social networking sites. Staff will be advised not to use personal mobile phones to communicate with pupils. Author Eddie Jefferson ICT Manager, E-Safety Officer 3
4 Mobile phones will not be used during lessons or formal school time. The sending of abusive or inappropriate text messages is forbidden. 11. Managing filtering The school will work in partnership with Northumberland County Council and the Internet Service Provider to ensure that systems to protect pupils are reviewed and improved. If staff or students discover an unsuitable site, it must be reported to the E Safety Officer. Securus web monitoring software is used in school to monitor the internet and general PC usage of all students and staff. All school computers, including laptops, which leave the school premises, has the Securus monitoring software installed. Internet usage is monitored for policy and legislative compliance. For further information refer to the Monitoring of Internet Usage section of the Berwick Academy Network Security Policy. 12. Managing videoconferencing (if used) IP videoconferencing should use the educational broadband network to ensure quality of service and security rather than the Internet. Students should ask permission from the supervising teacher before making or answering a videoconferencing call. Videoconferencing will be appropriately supervised for the students age. 13. Protecting personal data Personal data will be recorded, processed, transferred and made available according to the Data Protection Act Personal data will be processed fairly and lawfully and will be obtained only for specified and lawful purposes. The information will be adequate, relevant and not excessive for its purpose. The information will be kept accurate and up to date. It will be kept for longer than is necessary and will be retained securely. 14. Code of Confidentiality Where appropriate and lawful, the sharing of information with a third party will be subject to and compliant with a Confidentiality Agreement signed by all parties. 15. Physical Security ICT equipment/paper/tapes/disks etc are disposed of in a controlled manner. Further information can be seen in sections 30, 31, 32 of the Berwick Academy ICT Network Security Policy. Author Eddie Jefferson ICT Manager, E-Safety Officer 4
5 16. Logical Access Controls All teaching staff and pupils use individual user IDs and passwords. The requirements set on the user accounts are as follows: Passwords must contain a minimum of 7 characters. Passwords must be alpha-numeric and contain at least 1 digit. Passwords must be changed every 90 days. Passwords cannot be reused within 20 password changes. If staff or students fail to login in 5 attempts the user account will be locked. Staff and students log out when finished using computers and should not leave logged in terminals unattended. 17. Policy Decisions Authorising Internet Access All staff must read and sign the Code of Conduct for ICT before using any school ICT resource. The school will maintain a current record of all staff and pupils who are granted access to school ICT systems. Students must apply for internet access individually by agreeing to comply with the Internet Use Statement. Parents/Carers will be asked to sign and return a consent form. 18. Assessing risks The school will take all reasonable precautions to prevent access to inappropriate material. However, due to the international scale and linked nature of internet content, it is not possible to guarantee that unsuitable material will never appear on a computer connected to the school network. Neither the school nor Northumberland County Council can accept liability for any material accessed, or any consequences of Internet access. The school will audit ICT use to establish if the E Safety policy is adequate and that the implementation of the E Safety policy is appropriate and effective. 19. Handling E Safety complaints Complaints of Internet misuse will be dealt with by the E-Safety Officer. Any complaint about staff misuse must be referred to the head teacher. Staff should report cases of deliberate inappropriate internet access by following the procedures in appendix A Staff should report cases of accidental inappropriate internet access by following the procedures in appendix B Author Eddie Jefferson ICT Manager, E-Safety Officer 5
6 The Northumberland County Council recommended procedures for reporting incidents are outlined in appendix C. 20. Communicating E Safety Introducing the E Safety policy to pupils E Safety rules will be posted in all rooms where computers are used. Students will be informed that network and internet use will be monitored. A programme of training in E Safety will be developed, based on the materials from CEOP. Staff and the E Safety policy All staff will be given the School E Safety policy and its importance explained. Staff will be informed that network and internet traffic can be monitored and traced to the individual user. Staff should understand that phone or online communications with pupils can lead to misunderstandings or even malicious accusations. Staff must take care always to maintain a professional relationship. Members of staff must not to use personal mobile phones to communicate with pupils and parents. Members of staff must not communicate with students via social networking sites. 21. Enlisting parents and carers support Parents and carer s attention will be drawn to the school E Safety policy in newsletters, the school brochure and on the school web site. The school will maintain a list of E Safety resources for parents/carers on the Web site. Author Eddie Jefferson ICT Manager, E-Safety Officer 6
7 Appendix A Deliberate Inappropriate Internet Access Whilst using the Internet during school hours, a pupil deliberately breaches the Internet Acceptable Use Policy. What should you do? Use this step-by-step guide to help you follow the correct procedure for dealing with pupils who deliberately breaches the Internet Acceptable Use Policy. Explain to the pupil that they have broken the rules of your school s Acceptable User Policy (AUP) and Internet Acceptable Use Policy and that their behaviour is unacceptable E.g. searching or accessing pornographic material Take the pupil off the computer for the duration of the lesson. At a convenient time, ask the pupil to explain what happened and tell them that by doing so they may lessen the seriousness of the incident Draw the pupil s attention to the Internet Acceptable Use Policy that they agreed with their parents on starting at the school, which is summarized on the poster displayed in your ICT area Report the incident to the Head of Department who will ensure that it is reported to the E-Safety Officer so that a student restriction and/or system/filtering can be improved accordingly The Head of Department to report the incident to Head of Year to discuss and decide the sanctions as per the school Care and Management policy for breaking rules (e.g. informing the pupil s parents, determining length of time for Internet restriction) Author Eddie Jefferson ICT Manager, E-Safety Officer 7
8 Appendix B Accidental Inappropriate Internet Access Whilst using the Internet during school hours, a pupil accidentally breaches the Internet Acceptable Use Policy. What should you do? Use this step-by-step guide to help you follow the correct procedure for reporting a pupil who accidentally breaches the Internet Acceptable Use Policy. Praise the pupil for reporting the incident or explain they should have reported it in line with the school s Network Security Policy and Internet Acceptable Use Policy (AUP) Explain to the pupil that in order to prevent it occurring again, you need to ascertain how the pupil gained access to the inappropriate material or accidentally breached the Internet Acceptable Use Policy (AUP) Ask the pupil to explain what happened and remind them of the Internet Acceptable Use Policy, which is summarized on the poster displayed in the ICT area Report the incident to the Head of Department who will ensure that it is reported to the E- Safety Officer so that the system/filtering can be improved accordingly The Head of Department will report the incident to Head of Year to discuss and decide whether it is appropriate inform the pupil s parents to explain the preventative action taken Author Eddie Jefferson ICT Manager, E-Safety Officer 8
9 Version History Author Eddie Jefferson ICT Manager, E-Safety Officer 9
10 Record of issued versions Author Approved date Committee Version Status Eddie Jefferson 09/11/2010 Full Governing Body Eddie Jefferson 14/04/2010 Full Governing Body Eddie Jefferson 18/08/2012 Full Governing Body Eddie Jefferson 25/06/2014 Full Governing Body 1.0 Final Version 2.0 Social networking section added. 3.0 Emended due to the change to academy status 4.0 Reviewed Review Summer 2017 Author Eddie Jefferson ICT Manager, E-Safety Officer 10
St Vincent s Catholic Primary School e-safety Policy
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
Wilsthorpe Community School
Wilsthorpe Community School Online Safety Policy REVIEWED March 2016 Introduction This Online Safety Policy has been written by the school, building on LA policy and government guidance. It has been agreed
How To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
EMERSON PARK ACADEMY
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
John of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
4. The Importance of Internet Use in the Primary Curriculum
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
Simon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
Related Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities
Category Security Document Name e-safety Procedures Accountable Body Brantridge School Governing Body Reference SY.P2.02 Date Ratified Version 2.1 Last Update March 2015 Related Policies & Documents Document
1. Introduction. 2. Roles & Responsibilities. Governing Body. Headteacher
Category Security Document Name E-safety Procedures Accountable Body Grafham Grange School Governing Body Reference SY.P2.01 Date Ratified 27 th August 2015 Version 1.0 Last Update August 2015 Related
E- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the
St Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
Witton Middle School
Witton Middle School e-safety Policy This e-safety Policy has been put together using guidance from the Worcestershire Local Authority (LA) and is based on the guidance provided by Becta. Our Vision Witton
Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
ICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
Acceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
Acceptable Use Policy - Staff
Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education
[Name of School] E-safety policy
[Name of School] E-safety policy Adopted: Review date: Note: Blue boxes contain advisory notes which should be read and deleted. These indicate where schools need to make decisions or choices. This policy
Social Networking Policy
Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies
School Information Security Policy
School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...
Protocol for Acceptable Use of Internet and Email by Staff E-Safety Procedures Safeguarding & Child Protection Policy
Category Document Name Accountable Body Security E-Safety Policy RADIUS Trust Reference SY.P2 Date Ratified 11 th December 2014 Version 3.1 Last Update 31 st March 2015 Related Documents Document Protocol
Archbishop Beck Catholic Sports College
Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety
CARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
Deputy Head Acting Head of Care ICT Manager Director of Social Care Estates Manager. Richard Green Lyn Henwood Tyrone da Silva Denise Banks Rob Taylor
Chailey Heritage Foundation encompasses; Chailey Heritage School Chailey Heritage Residential Futures@Chailey Heritage Simon Yates Richard Green Lyn Henwood Tyrone da Silva Denise Banks Rob Taylor Headteacher
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
ICT, INTERNET AND EMAIL GOOD PRACTICE POLICY
Mossbourne Community Academy ICT, INTERNET AND EMAIL GOOD PRACTICE POLICY This policy document sets out the school's aims, principles and strategies for the cross curricular delivery and use of Information
Networking and Social Media Policy
Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools
Sydney Technical High School
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
Sibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
Internet Use and E-safety Policy
Internet Use and E-safety Policy Date Policy due to be reviewed: July 2016 Committee Responsible for Policy: Full Governing Body Committee Internet use and E-safety Policy 2015-16 Page 1 of 11 Internet
Social Networking Policy
Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful
SCHOOL ONLINE SAFETY SELF REVIEW TOOL
SCHOOL ONLINE SAFETY SELF REVIEW TOOL UPDATED February 2016 The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0844 381 4772 Email: [email protected]
360 Degree Safe Cymru SELF REVIEW TOOL
360 Degree Safe Cymru SELF REVIEW TOOL UPDATED OCTOBER 2014 The South West Grid for Learning Trust, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0845 601 3203 Email: [email protected]
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
Strathfield Girls High School Bring your Own Device User Charter
Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.
E-Safety Policy for Childcare Settings 1
E-Safety Policy for Childcare Settings 1 Reviewed October 2012 Introduction ICT, digital and mobile technology resources are now regarded as essential to support learning, teaching and personal and social
Great Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy
Great Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy November 2013 This policy was adopted on:... Date of last review:... Signed:... Great Horwood C.E. Combined School Page 1 Acceptable
Acceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
How To Use The School Network Safely
Policy Document Information and Communication Technology and E-Safety Acceptable Use Policy Mission Statement The school is committed to the use of ICT across the curriculum and to providing all students
Student Laptop User Charter
Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both
SCHOOL E-SAFETY SELF REVIEW TOOL
SCHOOL E-SAFETY SELF REVIEW TOOL The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, Devon, UK, EX2 5WS. Tel: 0845 601 3203 Fax: 01392 366 494 Email: [email protected]
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
