Brampton College ICT Acceptable Use Policy 1.0 Introduction 1.1 Any access to Information and Communications Technology (ICT) facilities and resources within Brampton College are subject to the compliance of the guidelines as set out in this policy and any other policy relating to the use of ICT equipment. 1.2 In the event of ICT resources being used to access networks or systems outside of Brampton College, it is expected that acceptable use policies as set out by the organisations concerned are also observed. 1.3 Access to the College ICT resources is dependent upon the signed submission of the parental acceptance form at the beginning of the autumn term. 2.0 Acceptable Use of ICT Resources 2.1 By using the ICT resources available at Brampton College, users are accepting the terms of this Policy. 2.2 ICT resources are for the purpose of supporting academic progress and other purposes necessary for the educational benefit of the user. This could include, but is not limited to, the use of the College computers to complete a UCAS form, or to research potential universities. 2.3 All use of the ICT resources will be conducted with the consideration of other users and in no way should be deemed distracting or inappropriate. 2.4 No students should install software onto any computer owned by Brampton College, whether brought in on storage media or downloaded from the internet. 2.5 All care must be taken to ensure no malware, for example a virus or spyware, is allowed to be installed onto the College s computer network. This includes through the accessing of webpages or the opening of electronic mail. 2.6 Users must not attempt to log onto the computer network using a user account belonging to another user. 2.7 Food and drink must not be consumed while using any ICT resources within the College. 2.8 All ICT resources must be treated with respect and in an appropriate manner. The deliberate misuse or damage of equipment will not be tolerated. 2.9 No student is to corrupt, alter or delete data files owned by other users. 3.0 Wireless Access
3.1 Users wishing to access the Brampton wireless network must first provide the Network administrator with the MAC address of the device to be connected. 3.2 Users of the wireless access to the College network must accept the same terms within this policy, as those accessing the college from a Brampton College owned computer. 3.3 Users are responsible for ensuring they do not introduce malware from their own devices when accessing the College wireless access points. 4.0 Copyright, Intellectual Property and Theft 4.1 Brampton College acknowledges that the holders of copyright and intellectual property must be respected and see that their rights are upheld. 4.2 The use of Brampton College ICT resources must not result in the breach of any legislation, including but not limited to: 4.2.1 Copyright, Designs and Patents Act 1988 4.2.2 Data Protection Act 1998 4.2.3 Computer Misuse Act 1990 4.2.4 Human Rights Act 1998 4.3 The ICT resources at Brampton College are not to be used for the publication, distribution or transmission of any materials produced by another person or organisation without appropriate permissions being granted. 4.4 Software installed on the College network are the property of Brampton College and must not be copied or removed. 4.5 Hardware resources are used by the permission of the College and should not be removed from the College without explicit permission being given by an authorised member of staff. 5.0 Compliance 5.1 All users must act in accordance to the policies relating to the use of ICT resources at Brampton College. 5.2 Users logging onto the Brampton College network remotely via an internet connection are bound by the same terms and conditions as those accessing the network from a terminal within the College. 5.3 No attempts should be made to circumvent the security settings as established on any ICT resource. 5.4 Users must ensure they do not willingly, or otherwise, divulge details pertaining to the logging on of their account.
5.5 Users should not attempt to gain access to restricted areas within the College network. 5.6 All users must ensure they have fully logged out of the network when leaving a computer terminal. 6.0 Cyber-Bullying 6.1 The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside college. Cyber-bullying is a different form of bullying which can happen 24/7, with a potentially bigger audience, and more accessories as people forward on content at a click. 6.2 Cyber-bullying may consist of threats, harassment, embarrassment, humiliation, defamation or impersonation. Cyber bullying may take the form of general insults, or prejudice-based bullying, for example homophobic, sexist, racist or other forms of discrimination. 6.3 By cyber-bullying we mean: 6.3.1 bullying by texts or messages or calls on mobile phones 6.3.2 use of mobile phone cameras to cause distress, fear or humiliation 6.3.3 the use of websites to post threatening, abusive, defamatory or humiliating materials 6.3.4 unauthorised access of email accounts 6.3.5 making threatening, abusive, defamatory or humiliating remarks in chatrooms/social networking sites 6.4 Activities carried out by a cyber-bully can potentially become criminal offences under various legislations such as: 6.4.1 The Protection from Harassment Act 1997 6.4.2 The Malicious Communications Act 1988, 6.4.3 Section 127 of the Communications Act 2003 6.4.4 Public Order Act 1986 6.4.5 The Defamation Acts of 1952 and 1996 7.0 Monitoring 7.1 Brampton College will monitor the usage of the ICT resources to ensure: 7.1.1 The security of the computer network and ICT resources; 7.1.2 The protection from viruses and malware; 7.1.3 Compliance with the Data Protection Act 1998; 7.1.4 The reputation of Brampton College is not jeopardised by the actions of individual users; 7.1.5 Excessive personal use of the system does not impact upon the efficiency of the network. 7.2 The College can block access to inappropriate web-sites from school equipment. 7.3 The College can monitor all ICT communications on school equipment.
7.4 The College will do its utmost to ensure that all images of staff and pupils are secure. 7.5 All monitoring of the College network is carried out in accordance to various laws and regulations concerning access and privacy within a business environment. 8.0 Safeguarding 8.1 Brampton College commits to the well-being of all persons within the organisation including students and members of staff. 8.2 The primary focus of the ICT resources is to enhance the education of the students and as such is expected to be used to this end by students and staff. 8.3 All internet access is restricted to ensure harmful or negative websites are not available through the ICT resources. 8.4 The ICT department is committed to keeping the list of forbidden websites (and website categories) updated to ensure the continuing well-being of all users. 8.5 Social network websites are not permitted to be accessed through the College ICT resources. 8.6 All allegations of offensive material being distributed, posted or transmitted by a member of Brampton College will be fully investigated. 8.7 In the event that it is found offensive material has been distributed, posted or transmitted by a member of the College, they will be subject to the terms as set out in the College s bullying policy and the disciplinary policy. This may involve the police or other external agencies as deemed necessary. 8.8 In the event that the person distributing, posting or transmitting offensive material is unable to be identified, the College will still be committed to assisting in the removal of offensive material from external websites. 8.9 The ICT department will review all ICT policies on a six month cycle to ensure all new and emerging technologies (and thus the use of any such technologies) are considered within the context of College use. College Procedures Staff should note that while we wish to encourage use of the Internet where it is of educational value to the College, access is not to be regarded as unlimited. Internet usage should be purposeful and directed to specific goals relevant to your teaching, not simply a matter of surfing the net. As much as possible, the College s chosen Filtering Software has organised information resources in ways that point students to those that have been reviewed and evaluated prior to use. While students may be able to move beyond those resources to others that have not been evaluated by staff, they shall be provided with guidelines and lists of resources particularly suited to the learning objectives. Students may pursue electronic research independent of staff supervision only if they have been granted parental permission and have submitted all required forms. Permission is not transferable and may not be shared. Protecting data: You must take appropriate steps to secure and protect sensitive and confidential data held by you in any format (whether electronic or otherwise). In the event of a failure to comply with this requirement, disciplinary action may be taken against you.
College Code of Conduct The College has developed a Code of Conduct for Internet use by students. This will be made available to all students, and kept under constant review. All members of staff are responsible for explaining the rules and their implications. All members of staff need to be aware of possible misuses of on-line access and their responsibilities towards students. Students are responsible for good behaviour on the Internet just as they are in a classroom or a College corridor.