(English) ICT Acceptable Use Policy

Download >> Ebbw Fawr Learning Community – Acceptable Use Policy[/prettyfilelink


ICT - abbreviation for “Information and CommunicationsTechnology”IT – abbreviation for “Information Technology”Internet - a vast computer network linking smaller computernetworks worldwide. The Internet includes commercial, educational, governmental,and other networks, all of which use the same set of communications protocols.Virus - a segment of self-replicating code planted illegally ina computer program, often to damage or shut down a system or network.Anti-Virus – Programs to detect and remove computer viruses.E-mail (“Electronic Mail”) – a system for sending messages fromone individual to another via telecommunications links between computers orterminals.

1. Privileges

The school has provided computers and other ICTequipment/peripherals for use by pupils, offering access to a vast amount ofinformation for use in studies, acting like an enormous extension to the schoollibrary and offering great potential to support the curriculum.

The computers and other ICT affiliated equipment/peripherals are provided andmaintained for the benefit of all pupils, and you are encouraged to use andenjoy these resources, and help to ensure they remain available to all. You areresponsible for good behaviour with the resources and on the Internet just asyou are in a classroom or a school corridor.

2. Privileges

2.1. The use of the School’sNetwork, Internet Access and ICT affiliated equipment is a privilege, not aright, and inappropriate use is solely determined by the Head teacher. Failureto comply with the outlined “Acceptance Use Policy” will result in revocation ofthose privileges at any given time. The Ebbw Fawr Learning Community ITdepartment staff may deny, revoke, or suspend a student if he/she is found to beabusing the privilege of using the Internet and World Wide Web. A log of allNetwork and Internet access and activity is monitored continuously by the ITdepartment so misuse of the system can be quickly identified and dealt with.

3. System Access

Pupils will be granted access to the Ebbw FawrLearning Community system as appropriate once the outlined conditions cited inclause (3) 1.1. have been met:-

1.1. Upon receipt of a“signed parent/guardian slip” (attached), which acknowledges the Acceptable UsePolicy outlined.

4. Internet Filtering (Web-sense)

4.1. All Internet access will befiltered for pupils and staff on computers with Internet access provided by theschool. To the extent practical, technology protection measures (or “Internetfilters”) shall be used to block or filter Internet access to inappropriatewebsite(s)/information. Specifically, as required by the Children’s InternetProtection Act, the categories of material considered inappropriate and to whichaccess will be blocked will include, but not be limited to: nudity/pornography;images or descriptions of sexual acts; promotion of violence, illegal use ofweapons, drug use, discrimination, or participation in hate groups; instructionsfor performing criminal acts (e.g., bomb making); and on-line gambling. Usersmust not use proxy or “anonymous” sites or other measures to circumvent thefiltering system.

4.2. Requests from users whowish to use a blocked website for bona fide research or other lawful purposesmay be considered. Please see your IT Manager or ICT Officer(s) to submit arequest.

5. Equipment

5.1. Always get permissionbefore installing, attempting to install or storing programs of any type on thecomputers.

5.2. Damaging, disabling, orotherwise harming the operation of computers, or intentionally wasting resourcesputs your work at risk, and will cut short your time with the ICT equipment.

5.3. Only use the computers foreducational purposes. Activities such as buying or selling goods areinappropriate.

5.4. Always check files broughtin on removable media (such as floppy disks, CDs, flash drives etc.) withantivirus software and only use them if they are found to be clean of viruses.

5.5. Always check mobileequipment (e.g. laptops, tablet PCs, etc.) with anti-virus software, and ensurethey have been found to be clean of viruses, before connecting them to thenetwork.

5.6. Protect the computers fromspillages by eating or drinking away from ICT equipment.

6. Security and Privacy

6.1. Protect your work bykeeping your password to yourself; never use someone else’s logon name orpassword.

6.2. Always avoid revealing yourhome address, telephone number, school name, or picture to people you meet onthe Internet.

6.3. Other computer users shouldbe respected and should not be harassed, harmed, offended or insulted.

6.4. To protect yourself and thesystems, you should respect the security on the computers; attempting to bypassor alter the settings may put you or your work at risk.

6.5. Computer storage areas andUSB pen drives will be treated like school lockers. Staff may review your filesand communications to ensure that you are using the system responsibly.

6.6. Students may not useanother individual‘s account without written permission from that individual.

6.7. Students may not accessresources for which they do not have expressed permission.

7. Internet

7.1. You should access theInternet only for study or for school authorised/supervised activities.

7.2. Only access suitablematerial – Using the Internet to obtain, download, send, print, display orotherwise transmit or gain access to materials which are unlawful, obscene orabusive is not permitted.

7.3. Respect the work andownership rights of people outside the school, as well as other pupils or staff.This includes abiding by “copyright laws” (Refer to section 6).

7.4. ‘Chat’ activities take upvaluable resources which could be used by others to benefit their studies, andyou can never be sure who you are really talking to. For these reasons ‘chat’features of any sort are strictly prohibited.

8. E-Mail

8.1. Be polite and appreciatethat other users might have different views from your own. The use of stronglanguage, swearing or aggressive behaviour is as anti-social on the Internet asit is on the street.

8.2. Only open attachments toe-mails if they come from someone you already know and trust. Attachments cancontain viruses or other programs that could destroy all the files and softwareon your computer.

8.3. If you receive an e-mailcontaining material of a violent, dangerous, racist, or inappropriate content,always report such messages to a classroom teacher or to an ICT Officer, i.e. MrShort, Mr Williams. The sending or receiving of an e-mail containing contentlikely to be unsuitable for children or schools is strictly forbidden.

8.4. Note that electronic mail(e-mail) is not private. System operators have access to all mail. Messagesrelating to or in support of illegal activities may be reported to theauthorities.

9. Network

9.1. Do not use the network insuch a way that you would disrupt the use of the network by other users.

9.2. All communications andinformation accessible via the network should be assumed to be private property.

9.3. Do not reveal the personaladdress or phone number of ANY pupil, sibling or colleague.

9.4. All communications andinformation accessible via the network should be assumed to be private property.

9.5. Do not go looking forsecurity problems, as this may be construed as an illegal attempt to gainunauthorised access to the system(s). If a potential security issue has beenidentified, you must report the issue immediately to a classroom teacher or ICTnetwork officer(s) immediately.

10. Plagiarism & Copyright Infringement

10.1. Pupils will not plagiarisework(s) that they find on the Internet. Plagiarism is taking the idea(s) orwriting(s) of others and presenting them as if they were original to the userinfringing the said content.

10.2. Pupils will respect therights of copyright owners. Copyright infringement occurs when an individualinappropriately reproduces a work that is protected by a copyright. If a workcontains language that specifies acceptable use of that work, the user shouldfollow the expressed requirements. If the user is unsure whether or not they canuse a work of another, he/she should request permission from the copyright ownerin written letter. Upon written authorisation approving the use of their contentmay your child(ren) then use the work of the copyright holder

11. Quality of Service (QoS)

11.1. The school cannot be heldresponsible for any loss of data as a result of technical difficulties. Thequality and reliability of any information used to complete schoolwork as aresult of research using the Internet, must also be checked with a member ofstaff. All communications and information accessible via the network should beassumed to be private property.

11.2. Ebbw Fawr LearningCommunity cannot be held responsible for any interruption in service(s) due tounforeseen circumstances, this includes but is no limited too “power outage,short-circuit, hardware fault, software bug or human-error”.

11.3. IT Department pridesitself by ensuring that all service(s) are maintained on a daily basis to ensuremaximum uptime of its service(s).

12. Monitoring & Surveillance

12.1. As with all other schoolpolicies and guidelines, all staff share the responsibility of monitoring andguiding pupils in the appropriate use of technology. Failure to follow theseguidelines may result in suspension or termination of privileges and otherdisciplinary action consistent with the Student Code of Conduct and Localauthority policy. Violations of law may result in criminal prosecution.

13. Disclaimer

13.1. The Ebbw Fawr LearningCommunities “IT Ststem(s)” is provided on an “as is, as available” basis. Theschool does not make any warranties, whether express or implied, including,without limitation, those of merchantability and fitness for a particularpurpose with respect to any services provided by the system and any informationor software contained therein. The school does not warrant that the functions orservices performed by, or that the information or software contained on thesystem will meet the pupil’s requirements, or that the system will beuninterrupted or error free, or that defects will be corrected.