Brampton College ICT Acceptable Use Policy

Similar documents
Information Systems Acceptable Use Policy for Learners

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

E Safety Policy. 6 th March Annually. 26 th February 2014

How To Behave At A School

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Acceptable Use Policy Internet and - Students

John of Rolleston Primary School

TECHNOLOGY USAGE POLICY

Acceptable Use Policy Holy Spirit Catholic School

King David Primary School Staff Social Networking Policy

Sibford School Student Computer Acceptable Use Policy

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

Networking and Social Media Policy

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

Policy No: 2-B8. Originally Released: Date for Review: 2016

ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS

INTERNET, AND COMPUTER USE POLICY.

Acceptable Use of ICT Policy. Staff Policy

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement

Dene Community School of Technology Staff Acceptable Use Policy

Internet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014

ICT Acceptable Use Policy. August 2015

Conditions of Use. Communications and IT Facilities

Internet Use Policy and Code of Conduct

Rules for the use of the IT facilities. Effective August 2015 Present

HUMAN RESOURCES POLICIES & PROCEDURES

ICT Student Usage Policy

Dulwich College ICT Acceptable Use Policy

Acceptable Use of ICT Policy. Learner School Policy

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Social Networking Policy

DIGITAL TECHNOLOGY POLICY St Example s School

Sydney Technical High School

Digital Device LOAN CHARTER

Acceptable Use of Information Technology

TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+

Responsible Computer Use Policy for Students

INTERNET AND POLICY

How To Deal With Social Media At Larks Hill J & I School

Acceptable Use Policy

Information Management and Security Policy

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Social Media Policy. Policies and Procedures. Social Media Policy

UNIVERSITY OF ST ANDREWS. POLICY November 2005

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

School Policy Regarding Computer Use, Technology and Internet Access

Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy

Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)

CARRAMAR PUBLIC SCHOOL

Bring Your Own Device Program: User Charter

SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY DATE: MARCH 2015 REVISION DATE: MARCH 2017

Simon Langton Grammar School for Boys E-Safety Policy

Electronic Communications Guidance for School Staff 2013/2014

Mobile Phones Acceptable Use Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

E-Safety Policy. Reviewed and Adopted: July Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy

St Vincent s Catholic Primary School e-safety Policy

Social Network Protocol & Policy

Internet, E-Safety & Acceptable Use Policy

How To Use The School Network Safely

Using Public Computer Services in Somerset Libraries

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:

ICT Acceptable use Policy. Coláiste Mhuirlinne/ Merlin College Doughiska, Galway City.

Social Networking Policy

Acceptable Use of ICT Policy For Staff

Internet, Social Media and Policy

Strathfield Girls High School Bring your Own Device User Charter

ICT Security Policy for Schools

HAZELDENE LOWER SCHOOL

INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY

Bring Your Own Device Program: 2015 User Agreement

BLACKROCK COLLEGE /INTERNET USER POLICY

Kenmore State High School Student Laptop Charter

1. Name of Document: IT Acceptable Use Policy. 2. Originator: Deputy Principal

Acceptable Use Policy

INTERNET, USE AND

USE OF INFORMATION TECHNOLOGY FACILITIES

Social Networking Procedure

ICT POLICY AND PROCEDURE

Student BYOD Charter. North Lakes State College

Acceptable Use Policy (AUP) School Computing

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & POLICY AND CODE

POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES)

Hull Teaching Primary Care Trust INTERNET USE POLICY

Student Laptop User Charter

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Saint Martin s Catholic Academy

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division.

E-SAFETY POLICY 2014/15 Including:

Charles Williams Church in Wales Primary School. Bullying Prevention Policy. June 2014 Review date June A Definition Of Bullying

Services Policy

How To Use Social Media At St James Anglican School

COMPUTER USE IN INSTRUCTION

Transcription:

Brampton College ICT Acceptable Use Policy 1.0 Introduction 1.1 Any access to Information and Communications Technology (ICT) facilities and resources within Brampton College are subject to the compliance of the guidelines as set out in this policy and any other policy relating to the use of ICT equipment. 1.2 In the event of ICT resources being used to access networks or systems outside of Brampton College, it is expected that acceptable use policies as set out by the organisations concerned are also observed. 1.3 Access to the College ICT resources is dependent upon the signed submission of the parental acceptance form at the beginning of the autumn term. 2.0 Acceptable Use of ICT Resources 2.1 By using the ICT resources available at Brampton College, users are accepting the terms of this Policy. 2.2 ICT resources are for the purpose of supporting academic progress and other purposes necessary for the educational benefit of the user. This could include, but is not limited to, the use of the College computers to complete a UCAS form, or to research potential universities. 2.3 All use of the ICT resources will be conducted with the consideration of other users and in no way should be deemed distracting or inappropriate. 2.4 No students should install software onto any computer owned by Brampton College, whether brought in on storage media or downloaded from the internet. 2.5 All care must be taken to ensure no malware, for example a virus or spyware, is allowed to be installed onto the College s computer network. This includes through the accessing of webpages or the opening of electronic mail. 2.6 Users must not attempt to log onto the computer network using a user account belonging to another user. 2.7 Food and drink must not be consumed while using any ICT resources within the College. 2.8 All ICT resources must be treated with respect and in an appropriate manner. The deliberate misuse or damage of equipment will not be tolerated. 2.9 No student is to corrupt, alter or delete data files owned by other users. 3.0 Wireless Access

3.1 Users wishing to access the Brampton wireless network must first provide the Network administrator with the MAC address of the device to be connected. 3.2 Users of the wireless access to the College network must accept the same terms within this policy, as those accessing the college from a Brampton College owned computer. 3.3 Users are responsible for ensuring they do not introduce malware from their own devices when accessing the College wireless access points. 4.0 Copyright, Intellectual Property and Theft 4.1 Brampton College acknowledges that the holders of copyright and intellectual property must be respected and see that their rights are upheld. 4.2 The use of Brampton College ICT resources must not result in the breach of any legislation, including but not limited to: 4.2.1 Copyright, Designs and Patents Act 1988 4.2.2 Data Protection Act 1998 4.2.3 Computer Misuse Act 1990 4.2.4 Human Rights Act 1998 4.3 The ICT resources at Brampton College are not to be used for the publication, distribution or transmission of any materials produced by another person or organisation without appropriate permissions being granted. 4.4 Software installed on the College network are the property of Brampton College and must not be copied or removed. 4.5 Hardware resources are used by the permission of the College and should not be removed from the College without explicit permission being given by an authorised member of staff. 5.0 Compliance 5.1 All users must act in accordance to the policies relating to the use of ICT resources at Brampton College. 5.2 Users logging onto the Brampton College network remotely via an internet connection are bound by the same terms and conditions as those accessing the network from a terminal within the College. 5.3 No attempts should be made to circumvent the security settings as established on any ICT resource. 5.4 Users must ensure they do not willingly, or otherwise, divulge details pertaining to the logging on of their account.

5.5 Users should not attempt to gain access to restricted areas within the College network. 5.6 All users must ensure they have fully logged out of the network when leaving a computer terminal. 6.0 Cyber-Bullying 6.1 The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside college. Cyber-bullying is a different form of bullying which can happen 24/7, with a potentially bigger audience, and more accessories as people forward on content at a click. 6.2 Cyber-bullying may consist of threats, harassment, embarrassment, humiliation, defamation or impersonation. Cyber bullying may take the form of general insults, or prejudice-based bullying, for example homophobic, sexist, racist or other forms of discrimination. 6.3 By cyber-bullying we mean: 6.3.1 bullying by texts or messages or calls on mobile phones 6.3.2 use of mobile phone cameras to cause distress, fear or humiliation 6.3.3 the use of websites to post threatening, abusive, defamatory or humiliating materials 6.3.4 unauthorised access of email accounts 6.3.5 making threatening, abusive, defamatory or humiliating remarks in chatrooms/social networking sites 6.4 Activities carried out by a cyber-bully can potentially become criminal offences under various legislations such as: 6.4.1 The Protection from Harassment Act 1997 6.4.2 The Malicious Communications Act 1988, 6.4.3 Section 127 of the Communications Act 2003 6.4.4 Public Order Act 1986 6.4.5 The Defamation Acts of 1952 and 1996 7.0 Monitoring 7.1 Brampton College will monitor the usage of the ICT resources to ensure: 7.1.1 The security of the computer network and ICT resources; 7.1.2 The protection from viruses and malware; 7.1.3 Compliance with the Data Protection Act 1998; 7.1.4 The reputation of Brampton College is not jeopardised by the actions of individual users; 7.1.5 Excessive personal use of the system does not impact upon the efficiency of the network. 7.2 The College can block access to inappropriate web-sites from school equipment. 7.3 The College can monitor all ICT communications on school equipment.

7.4 The College will do its utmost to ensure that all images of staff and pupils are secure. 7.5 All monitoring of the College network is carried out in accordance to various laws and regulations concerning access and privacy within a business environment. 8.0 Safeguarding 8.1 Brampton College commits to the well-being of all persons within the organisation including students and members of staff. 8.2 The primary focus of the ICT resources is to enhance the education of the students and as such is expected to be used to this end by students and staff. 8.3 All internet access is restricted to ensure harmful or negative websites are not available through the ICT resources. 8.4 The ICT department is committed to keeping the list of forbidden websites (and website categories) updated to ensure the continuing well-being of all users. 8.5 Social network websites are not permitted to be accessed through the College ICT resources. 8.6 All allegations of offensive material being distributed, posted or transmitted by a member of Brampton College will be fully investigated. 8.7 In the event that it is found offensive material has been distributed, posted or transmitted by a member of the College, they will be subject to the terms as set out in the College s bullying policy and the disciplinary policy. This may involve the police or other external agencies as deemed necessary. 8.8 In the event that the person distributing, posting or transmitting offensive material is unable to be identified, the College will still be committed to assisting in the removal of offensive material from external websites. 8.9 The ICT department will review all ICT policies on a six month cycle to ensure all new and emerging technologies (and thus the use of any such technologies) are considered within the context of College use. College Procedures Staff should note that while we wish to encourage use of the Internet where it is of educational value to the College, access is not to be regarded as unlimited. Internet usage should be purposeful and directed to specific goals relevant to your teaching, not simply a matter of surfing the net. As much as possible, the College s chosen Filtering Software has organised information resources in ways that point students to those that have been reviewed and evaluated prior to use. While students may be able to move beyond those resources to others that have not been evaluated by staff, they shall be provided with guidelines and lists of resources particularly suited to the learning objectives. Students may pursue electronic research independent of staff supervision only if they have been granted parental permission and have submitted all required forms. Permission is not transferable and may not be shared. Protecting data: You must take appropriate steps to secure and protect sensitive and confidential data held by you in any format (whether electronic or otherwise). In the event of a failure to comply with this requirement, disciplinary action may be taken against you.

College Code of Conduct The College has developed a Code of Conduct for Internet use by students. This will be made available to all students, and kept under constant review. All members of staff are responsible for explaining the rules and their implications. All members of staff need to be aware of possible misuses of on-line access and their responsibilities towards students. Students are responsible for good behaviour on the Internet just as they are in a classroom or a College corridor.