• No results found

Protocols for 1 to 1 computers in classrooms

N/A
N/A
Protected

Academic year: 2021

Share "Protocols for 1 to 1 computers in classrooms"

Copied!
19
0
0

Loading.... (view fulltext now)

Full text

(1)

1

Preface: All students who have a notebook and their parents have signed both the Upwey

High School ICT (Information and Communication Technologies) Acceptable Use

Agreement and the 1 to 1 Notebook Program Agreement. These Agreements focus on

student responsibilities. The protocols in this document focus on teacher management of

computers in classrooms.

1. Students are required to take responsibility for the recharging of their computers at home in readiness for use in class. To avoid OHS tripping problems with wires lying across the floor, students are not allowed to recharge computers in class. Students must ensure their notebook is fully charged so that it is ready for a full days use in class.

2. All computers will come in a Belkin Honeycomb cover. Students must use this cover at all times when transporting the notebook.

3. Students will only take the computers out of the Honeycomb cover during class when given permission by the teacher.

4. If the teacher needs to have all students listen to instructions during an activity where computers are being used, the teacher has the right to ask students to close the lids of their notebooks (the

computer will go into sleep mode) and open the lids when the teacher is finished.

5. The students will be required to follow the ICT Acceptable Use Agreement at all times. A copy of this is included as an appendix in this document. If the students do not follow the Agreement and continue to not follow it when requested by the teacher, then access to the network and/or the device may be withdrawn.

6. Although Facebook and other programs and sites are blocked on the school network, some students will use a Proxy Jumper to bypass our security settings. If they do this and visit blocked sites, access to the Network will be withdrawn as per point 5 above. Although highlighted in the ICT Acceptable Use Agreement, students are not able to take still pictures or video footage of other students in class using a notebook, mobile phone or other digital device unless permission is given by the teacher. Should students take photos or videos against the direct instructions of a teacher, network access may be withdrawn.

7. All work produced by individual students and involving other students may not be published online outside of the school’s intranet and the DEECD ultranet without written permission from parents and students involved.

8. Students are not allowed to go to their lockers to get computers that have not been brought to class. If they do not bring a computer, they will not have access to a computer.

9. Teachers are encouraged to allow students to use computers when they need to during a class. This may mean that students will open and close their computers throughout a lesson at different times and that the majority of work in some classes is completed in a handwritten form.

(2)

2

Teaching and learning vision

Upwey High School endeavours to provide students with a personal computer to give students 1:1 access to information and learning tools across subject areas. The program will help students make connections with what they are learning and with the world outside of the classroom. It will help individualise learning in our classrooms. The effective use of ICT helps to engage students in their learning. It also provides tools and processes for communication, collaboration and collective meaning making between teachers, students, parents and school community. On an international level the 1-to-1 program will assist us in the creation of a global classroom and support our current work on internationalising education. Improved access to computers will provide a platform for deeper understanding of concepts and information for all students at all times. It will give teachers consistent access to tasks that are whole world, big picture, instantly. The 1-to-1 program will allow us to improve assessment and feedback processes and to continue to develop responsible and thinking global citizenship in our school community.

Upwey High School has been preparing curriculum resources and teaching and learning approaches that are tailored to cater for students of the 21st Century. We understand that the resources and skills required by our current and future students are rapidly changing with the rest of the technology rich world. In order to cater for this we have been training all staff in the integration of technology into their classrooms. The 1- 1 Program will ‘close the gap’ and ensure that our students are receiving an outstanding eLearning experience. We have prided ourselves on being leaders in eLearning and this program will further enhance our ability to deliver the most up to date, “student at the centre” curriculum possible.

This Program will offer our students the following:

 24/7 access to learning resources via our Learning Management System (Daymap)

 Access to multimedia software that will engage students in topics and provide opportunity for greater synthesis of knowledge and deeper levels of thinking

 Access to web resources on a 1-1 basis

 Provide opportunities for staff to develop more individual learning programs through the use of Daymap, Mathletics and other online resources

 Access to communication technologies that will enhance and improve interactions between staff and students

 Access to web 2.0 technologies

 Access to multimedia resources such as our online video library Clickview as well as digital study notes  Access to ‘eBooks’ containing valuable teaching resources including videos, online demonstrations,

practice tests and animations to assist with student understanding of specific curriculum concepts.

Device ownership

The device is owned by the school. Students will be given the device for 24/7 access.

If students exit the school for any reason they will, as a part of the exit process, return the device to the school in full working order, including all accessories and components. Failure to return the notebook prior to exiting the school will be deemed as theft and the matter passed on to the police for investigation.

If a device is lost or stolen, parents are asked to contact the Principal and report the matter to the police. In exceptional circumstances a loan device may be provided to students.

Privately owned devices

To ensure quality of service to all students, privately owned devices will not be connected to the school network.

(3)

3

Optional peripherals

The school will not provide or specifically recommend any additional peripherals as part of the 1-to-1 program. However, parents or students may purchase these outside of the program. Program support and warranty will not apply to peripherals.

Peripherals may include:  USB backup devices  Additional batteries  External DVD drives

Guidelines for Participation

Prior to devices being issued to students:

 Each device will be imaged with the permitted school image for each year level and registered in the school database with a unique identifier against the student’s ID

 Parents and students are required to agree in writing to the terms and conditions of the program  Students will participate in a ‘boot camp program’ to ensure they are familiar with their roles and

responsibilities and are aware of safe and ethical use of the device.

Role of parents

Parents should be aware of their child’s rights and responsibilities in regards to:  Educational benefits of 1-to-1 learning

 Care and maintenance of the device

 Policies and procedures for participating in the school’s 1-to-1 program  Liabilities

 Acceptable use agreements  1 to 1 notebook program protocols.

Limited Warranty

All warranty repairs will be managed by Technical Support. The notebook is covered by a three year limited warranty. In the event that the notebook is lost or stolen the replacement cost of the unit will be charged. This limited warranty does not cover the following:

 Uninterrupted or error-free operation of a product  Loss of, or damage to, your data

 Any software programs, whether provided with the product or installed subsequently

 Failure or damage resulting from misuse, accident, modification, unsuitable physical or operating environment, natural disasters, power surges, or improper maintenance by you

 Damage caused by a non-authorised service provider

 Failure of, or damage caused by, any third party products, including those that Lenovo may provide or integrate into the Lenovo product at your request and

 Any technical or other support, such as assistance with “how-to” questions and those regarding product set-up and installation.

(4)

4

Caring for 1 to 1 devices

The following conditions must be adhered to in order to maintain warranty:

 Students are to store their notebooks in their lockers during recess and lunch times unless they are using the device in a designated study area (eg library)

 Always store the devices in the protective cover provided

 Take your device home overnight to recharge and do not leave in locker out of school time

 Do not store anything additional to the devices in the device’s cover (eg cords or papers), as this may damage the screen

 Carry your device within its protective cover inside your normal school backpack. Do not overfill your school backpack. (Pressure on the device can cause permanent damage to the screen and other components)

 Do not grab or squeeze the device. (This can also damage the screen and other components)  Never leave your device in a car or in an exposed area where it can be stolen

 Never leave the device in direct sunlight or allow it to get wet

 Never leave your device in unsupervised areas during the school day. They are to be securely locked in a classroom or in a school locker. Devices left unsecured may be confiscated to avoid exposure to theft

See Appendix 2 for more guidelines for students caring for their 1-to-1 device.

Appearance and personalisation

Devices are the property of the school. They are not to be altered or personalised in any way that is

irreversible. It is the student’s responsibility to ensure the device is cleaned and returned in its original state and the parents’ responsibility to pay for any damage to the notebook and/or its peripherals.

Loan/replacement

Whenever possible, loan devices will be available to students if their device has been submitted for repair under warranty conditions.

The school will provide a bank of ‘swap units’ for cases where the unit is required to be returned for repairs. When students bring their notebook to our service desk and it is deemed appropriate to return it for service, they will receive a ‘swap unit’ to borrow while their own unit is repaired. This will incur no extra cost and will ensure that student’s school work will not be interrupted by breakdowns.

Support and service provision

To maintain and service the increased number of devices that this program will bring to our school, we have designed a process that will provide the best possible outcomes for all students. The following explains the process as it will occur from the beginning of the 2012 school year:

Training

When receiving their notebooks, all students will be required to attend some training sessions that will assist in the care and basic use of their notebook. By spending this time to familiarise students with the particular product, we would expect to minimise the number of disruptions that may occur during the school year. The training sessions will cover topics such as:

 Backing up files/file management  Caring for your notebook

(5)

5

 How to log in at home

 Setting up for your home network (basic guide)

 Basic programs that we will use for teaching and learning  Cyberbullying

 ICT ticket system

Service malfunctions

The first port of call will be classroom “techxpert” who is a nominated student in the class who has undergone training and is capable of troubleshooting basic notebook problems.

If the class “techxpert” cannot resolve the problem, Upwey High School will offer a ‘Notebook Service Desk’. This ‘Desk’ will act as the central point for all enquiries and service requests in regards to the school’s notebook program and will be located in the current ICT offices. The desk will be staffed between 8:30-8:50am, 12.45-1.15pm and 3:10-3:30pm by our technicians who are trained to deal with the notebook 1-1 program. Students should report to the ‘Notebook Service Desk’ with all malfunctions. The machine will be logged with the desk and a swap unit may be issued for the day. It is important to note that whilst the school will endeavour to have all notebooks returned within a 3 day period, there will be times where, due to sourcing of parts and service demand, this may not be possible. In these cases students will still retain their ‘swap unit’ until their own notebook is returned. See Appendix 1 for the procedure for faults and repairs process.

All enquiries regarding notebook services, swap units, repairs and software issues should be logged using the ICT ticket system on the school’s intranet.

Internet Usage

All units will be capable of using N wireless channel. This enables the school to expand the use of available bandwidth when providing network/internet access to wireless devices. It will assist the school in providing constant, speedy connection to the increased number of devices that will be in use from the beginning of 2012. This move comes in line the Education Department’s wireless upgrades.

Use of devices by students is governed by the ICT Acceptable Use Policy that students and parents agree to for use of ICT within the school. Parents are also to familiarise themselves with the ICT Acceptable Use Policy to further support their adherence outside of the school environment. Any inappropriate use of the internet is unacceptable and is subject to disciplinary action and exclusion from the school networks and resources. See Appendix 4 for Upwey High School’s ICT Acceptable Use Policy.

Users and security

Students are recommended to use a username and password to access their device to protect information in incidents of loss or theft.

No notebooks are to be used in the school grounds outside of class time and notebooks are to be locked in student lockers when not in use.

(6)

6

Power supply management

Students will be responsible for ensuring that all devices are to be fully charged at home before the

commencement of every day. Partial charging or notebooks that are not charged will be deemed as not being prepared for class and will incur consequences equivalent to not bringing books to class.

Software licensing

Software installed by the school is subject to licence conditions and must not be distributed or deleted without written permission from the school. Students are not permitted to tamper with school software installed on the notebooks. No other software is to be installed on the device.

Students must abide by the school’s Agreements whenever the school equipment or services are involved. This includes the device regardless of location.

The ICT Acceptable Use Agreement Policy contains specific responsibilities to ensure student safety:  Students must keep themselves and friends safe by not giving out personal details, including full

names, telephone numbers, addresses, images and passwords

 Students should be respectful in how they talk to and work with others online, and never participate in online bullying

 Using the technology at school for learning, using the equipment properly and not interfering with the work or data of another student.

Virus protection

Viruses have the potential to severely damage and disrupt operations within the school and DEECD’s computer networks. The devices have Symantec antivirus software installed on them. This software will scan the hard drive for known viruses on start-up. The virus software will be upgraded from the school network and at home. Students are recommended to:

 Protect their devices from virus attacks by scanning for viruses at least weekly. Symantec virus definitions updates are managed automatically when connected to the internet

 Consider running virus scans regularly after accessing the internet or personal mail or opening a file from a removable media source. Carry out the scan before returning to the school and connecting to the school network

 Not to open any files attached to suspicious or unknown emails

 Exercise caution when downloading files from the internet. Save the files to the device hard disk and run the virus scanner on the file before opening them

 Delete chain and junk emails. Do not forward or reply to any of these

 Never reply to spam. Spam email messages can contain viruses that notify a third party of the legitimacy of an email address and then add the recipients to the spammer’s database. They can also consume a large amount of disk space on the server, which slows computer networks.

(7)

7

Images and reimaging

The school will be responsible for the software image used on all 1-to-1 devices. If a student experiences difficulties with software or device operation, then the computer will be reimaged. All data stored on the computer will be deleted in the process and students will be responsible for reloading necessary files from backup drives maintained at home.

The school will periodicaly reimage all student notebooks. The purpose of this will be to ensure all software is updated and to remove any unwanted / unnecessary software. This will generally take place in Term 4 on a class by class basis and will result in notebooks for those students being unavailable for a short time. (We would hope the process would take less than 3 days). Reimaging may also take place if a student abuses the privilege of having a notebook at their disposal by hacking, malicious damage, download of pirated software or inappropriate programs.

Before this process occurs it is essential that students make backups of any files they wish to keep that are located on their notebooks. The school takes no responsibility for lost data during this reimaging, but will provide support and assistance to students wishing to make backup copies of existing files.

Non school applications and files

Software, including music, movies and games will be allowed for academic and recreational reasons, provided copyright obligations are met. Personal MP3 and other music files may be stored on the device. Downloading music, games and videos from the internet during school hours is prohibited except when directed by a staff member. Students are permitted to listen to digital music and/or participate in games on their device while at school where given express permission by a teacher for an educational purpose. It is the student’s

responsibility to ensure that there is enough hard drive space and memory available to engage in all educational requirements.

Reimaging may take place if students abuse the privilege of having a notebook at their disposal by hacking, malicious damage, download of pirated software or inappropriate programs.

Backup/recovery

Students will be responsible for their own backup of critical data at all times. This may be through a USB, external drive, the school network or internet-based backup to regularly backup important work.

(8)

8

Appendix 1: Faults and Repairs Procedure

Malfunction is software related Malfunction is hardware related

Under Warranty

Not covered by

Warranty

Unit is returned to student and swap unit returned to School

“Faulty” notebook is handed to

Upwey HS technician

Student will be issued with a receipt

and depending on the issue and

likely time of repair, may be issued

with a “swap unit”

Is the malfunction

hardware or

software related?

Unit is reimaged

Whilst every effort is made to

retain data, backup is always

the responsibility of students

Covered by

Warranty?

Unit is repaired by Lenovo

technician and the parent

is billed for repair.

Notebook returned to

student on receipt of

payment

Unit is fixed by Lenovo

technician under

warranty agreement

(9)

9

Appendix 2: Caring for your 1 to 1 device

Packing away your device

Store your device bottom down

Do not wrap the cord too tightly around the power adaptor because this might damage the cord.

Handling your device

 Try to avoid moving your device around when it is on. Before switching on, gently place your device on a stable surface and then switch on

 You still need to be careful with your device while it is in the bag. Always place protective cover gently down

 Be careful when putting the device in the car that no other items are on top of it and nothing will roll onto the device

 Devices should be switched off before being put into the protective cover.

Operating conditions

 Do not place objects on top of your device and never carry it around while it is turned on  Avoid exposing your device to direct sunlight or sources of heat such as desk lamps  Avoid exposing your device to dust, dirt, rain, liquids or moisture

 Avoid exposing your device to heavy shock or vibration.

LCD screen

 LCD screens are delicate – they don’t like being poked, prodded, pushed or slammed  Never pick up your device by its screen

 Do not slam the screen closed

 Be gentle when putting your device down.

To clean your LCD screen

 Switch off your device

 Lightly dampen a non-abrasive cloth with water and gently wipe screen in a circular motion  Do not directly apply water or cleaner to the screen

 Avoid applying pressure to the screen.

AC adaptor

 Connect your adaptor only to your device

 Do not step on your power cord or place heavy objects on top of it. Keep your cord away from heavy traffic areas

 When unplugging the power cord, pull on the plug itself rather than the cord  Do not wrap your cord tightly around the adaptor box

 Be aware of the power savings that come from running your device effectively from battery after being fully charged. This can amount to a significant amount per year.

Keyboard

 Gently brush your keyboard with a clean soft bristled paint brush or similar to remove dirt

 If any key tops are missing or keys are in a damaged state, take your device to technicians to be repaired immediately. A single key top can easily be replaced but continuing to use the keyboard with a missing key top can result in having to replace the entire keyboard.

(10)

10

Appendix 3: Safe notebook use practice

Take breaks

 Incorporate breaks every 20–30 minutes to rest eyes, stretch hands, muscles and joints; and to break up repetition and static postures.

Spinal health

 To ensure you are able to take part in the things you enjoy, it is important to take care of your back. Tips to help keep your back healthy:

 A backpack carried over both shoulders is the best choice for carrying a load to ensure the weight is evenly distributed

 Pack your backpack so that the heavier objects are placed nearer to your back, with the lighter objects towards the outside

 Make sure your backpack fits properly. When you sit down with your pack on, it should not extend higher than your shoulders

 When lifting your backpack, face it, bend at the knees and lift the pack with both hands while straightening your legs. Place the straps over your shoulders one at a time

 Only carry items that are necessary. If you have a locker, use this to help lighten the load you have to carry during the day

 When carrying a heavy load over a long distance, take regular breaks to avoid fatigue. Fatigue increases the risk of injury

 If you sit for long periods of time, ensure that your bottom touches the back of the seat

 Take regular breaks when you've been sitting for a long time, briefly move around and/or stretch every hour or so

 Try to do as much physical activity as possible. When you participate in vigorous activities such as swimming, jogging etc. ensure that you warm up and stretch before and after

 If you participate in contact sports, it is important that your neck and spinal muscles are in good condition to help prevent injuries. Regular fitness and skill training are essential in reducing the incidence of injury.

(11)

11

Appendix 4: Upwey High School ICT (Information and

Communication Technologies) Acceptable Use Policy

Policy Statement

The internet offers huge potential benefits for teaching and learning. It offers wonderful opportunities for students and teachers to contribute to the world community on the web. Blogs, social networking spaces and instant messaging tools are now part of students' 'life on the web'. Students can:

 explore the world online

 visit museums and libraries around the world

 access rich information resources to support research and investigations

 communicate and collaborate with people all over the world

 publish to the web.

Upwey High School has an important role in preparing students for these 'online communities', even though students may not access some online communities at school (eg Facebook).

Before our students start to explore the Internet, it's crucial to make sure everyone understands what they should and shouldn't be doing online.

Behaving safely online means:

 protecting their own privacy and personal information (we used to call it 'stranger danger')

 selecting appropriate spaces to work and contribute

 protecting the privacy of others (this can be sharing personal information or images)

 being proactive in letting someone know if there is something that is 'not quite right'. At home this

would be a parent or carer, at school a teacher.

These principles of safety and responsibility are not specific for the web but certainly apply to the use of internet at school. Just as in the real world, the virtual world of the internet involves some risks. Upwey High School has developed proactive strategies that help to minimise these risks to our students.

Guidelines Program

1.1 Use of the school’s network to access the Internet and Internet services, including electronic mail and the World Wide Web, will be governed by an Acceptable Use Procedures (AUP) for the Internet.

2.1.1 The use of the school's network is subject to the Acceptable Use Procedures (see appendix-a). Briefly this means that the school’s network can be used only by staff, students and associated individuals (eg visiting teachers) and only for or in connection with the educational or administrative functions of the school. 2.1.2 The Acceptable Use Procedures (AUP) is intended to

operate within and be consistent with existing school policies and procedures in areas such as:

bullying (including cyber-bullying) and Anti-harassment

Student Wellbeing 1.2 The Acceptable Use Procedures (AUP) is

intended to encourage responsible action and to reflect a respect for the ability of its adherents to exercise good judgement.

2.2.1 Responsibility and accountability for network security is the shared responsibility of all network users. It is the responsibility of the student to protect his/her password and not divulge it to another person. If a student knows or suspects his/her account has been used by another person, the account holder must notify a teacher immediately.

(12)

12

Guidelines Program

2.2.2 All messages created, sent or retrieved on the school’s network are the property of the school, and should be considered public information. The school reserves the right to access and monitor all messages and files on the computer system as deemed necessary and appropriate. Internet messages are public communication and are not private. All communications including text and images can be disclosed to law enforcement and other third parties without prior consent from the sender.

1.3 Independent student use of the internet will only be permitted where students and their parents/carers provide written acknowledgement that students agree to act in accordance with the standards of conduct established in the Acceptable Use Procedures (see appendix-a).

2.3.1 Independent student use of the internet on the school’s network will only be permitted where students and their parents/carers provide written acknowledgement that students agree to act in accordance with the standards of conduct established in this policy document and as set-out in the Acceptable Use Procedures (AUP).

1.4 Students can expect sanctions if they act irresponsibly and disregard their

obligations to other users and the school as the provider of their Internet access.

2.4.1 For breaches of the Acceptable Use Procedures students can face a number of consequences depending on the severity of the breach and the context of the situation. More than one consequence may apply for a given offence. Serious or repeated offences will result in stronger penalties.

 Removal of network access privileges  Removal of email privileges

 Removal of internet access privileges  Removal of printing privileges

 Paying to replace damaged equipment  Confiscation of device/s

Other consequences as outlined in the school’s student engagement discipline policy.

2.4.2 Bullying and harassment of any kind is prohibited. No messages with derogatory or inflammatory remarks about an individual or group’s race’ religion, national origin, physical attributes, or sexual preference will be

transmitted. Violations of any guidelines listed above may result in disciplinary action.

1.5 Students must not use the school network in breach of a law or to commit an offence.

2.5.1 While the Internet may be largely a self-regulated environment, the general principles of law and community standards still apply to communication and publishing via the Internet. In addition to school penalties, there are legal sanctions for improper use of the Internet.

Links

 Upwey High School’s Anti-bullying (including cyber-bullying) and Anti-harassment Policy  Appendix-A: Acceptable Use Procedures (AUP) for the Internet

(13)

13

 http://www.education.vic.gov.au/management/elearningsupportservices/www/classroom/default.ht m  http://www.education.vic.gov.au/management/elearningsupportservices/www/classroom/technolog ies.htm  http://www.education.vic.gov.au/management/elearningsupportservices/www/management.htm

Evaluation

This policy will be reviewed as part of the school’s 3 year cycle or as required by developments in relevant legislation.

Policy drafted by: Education Committee September 2012 Date ratified by school council: 21 November 2012

(14)

14

Appendix-A: Guidelines and Conditions ICT (Information and Communication

Technologies) Acceptable Use Procedures

Upwey High School’s computing facilities are provided primarily for the educational benefit of students and the professional development of staff. Any behaviour that interferes with these primary objectives will be considered an infringement of Acceptable Use.

1. General Policies

Use of computer/internet resources is for educational purposes only  Access to the Internet must be supervised by a staff member  Appropriate language must be used in all communications

 Internet and printing services are both charged against a student’s account

 Consideration must be given to avoiding inconvenience to other computer users. e.g. use headphones to listen to sound or music; leave computers ready for the next user to log in; do not leave programs running on computers when you leave; do not leave rubbish or paper lying around computers; replace furniture to normal positions when you leave.

Students must not:

 Use abusive or obscene language in any communications

 Steal, or deliberately or carelessly cause damage to any equipment  Interfere with or change any software settings or other user’s files  Attempt to get around or reduce network security

 Logon using another user’s account

 Store unauthorised types of files in their own home directories (games or other executables)  Send "spam" (bulk and/or unsolicited e-mail)

 Reveal personal information in any communications

 Deliberately enter, or remain in, web sites containing objectionable material  Knowingly infringe copyright.

2. Computer hardware

Computer facilities are expensive and must be treated carefully. Students must not:

 Do anything likely to cause damage to any equipment, whether deliberately or carelessly  Interfere with networking equipment

 Eat or drink near any School owned computer resources.

Students must not, without permission:

 Attempt to repair equipment without permission  Unplug cables or equipment

 Move equipment to another place  Remove any covers or panels  Disassemble any equipment

 Disable the operation of any equipment

Students must also report other people breaking these rules.

Regardless of the real or supposed levels of understanding, students are NOT authorised to attempt the repair or adjustment of any school hardware or software. Any such attempt will be regarded as a violation of network security. Any problem with equipment or software must be referred to an authorised person.

(15)

15

3. Software and operating systems

Computer operating systems and other software are set up properly for computers to be successfully used in the School.

Students will not:

 Change any computer settings (including screen savers, wallpapers, desktops, menus standard document settings etc)

 Bring or download unauthorised programs, including games, to the school or run them on school computers. Online Internet games are banned

 Delete, add or alter any configuration files

 Copy any copyrighted software to or from any computer, or duplicate such software  Deliberately introduce any virus or program that reduces system security or effectiveness.

4. Networks

Network accounts are to be used only by the authorised owner of the account.

It is the responsibility of students to ensure their user account details remain secure and that unauthorised use of their account does not take place.

Students must not:

 Attempt to log into the network with any user name or password that is not their own  Reveal their password to anyone. Students are responsible for everything done using their

accounts, and everything in their home directories. Since passwords must be kept secret, no user may claim that another person entered their home directory and did anything to cause school rules to be broken

 Use or possess any program designed to reduce network security

 Enter any other person’s home directory or do anything whatsoever to any other person’s files  Be logged on to the network on different computers at the same time

 Store the following types of files in their home directory: - Program files (EXE, COM)

- Compressed files (ZIP, ARJ, LHZ, ARJ, TAR etc)

- Picture files, video files, music files etc unless they are required for a school task - Obscene material – pictures or text

- Obscene filenames - Insulting material - Copyrighted material

 Intentionally seek information on, obtain copies of, or modify files, other data or passwords belonging to other users.

5. Printing

Students must minimise printing at all times by print previewing, editing on screen rather than on hard copies and spell-checking before printing.

Students are allocated printing credit as part of their ICT Parent Payment. Once this allocation has been completely used, further allocations may be purchased. Students are not to use another student’s allocation. Students who deliberately waste another student’s allocation will be liable for all costs incurred. Students are charged a fee to print A4 pages of black printing.

(16)

16

6. Internet usage

Internet access is expensive and has been provided to assist students' education. Students must use it only with permission and not in any unauthorised way. Students are to be supervised by a staff member when using the Internet at all times.

Students are allocated a download credit as part of their ICT Parent Payments. Once this allocation has been completely used, further allocations may be purchased. Students are currently charged for each Mb of download.

The Internet is not intended for entertainment.

Because the Internet is an unsupervised environment, the school has a responsibility to ensure that, as far as possible, material obtained from the Internet is not offensive or inappropriate. To this end, filtering software has been placed on the Internet links. In the end, however, it is the responsibility of individual students to ensure their behaviour does not contravene school rules or rules imposed by parents/carers.

The school is aware that definitions of "offensive" and "inappropriate" will vary considerably between cultures and individuals. The school is also aware that no security system is perfect and that there is always the possibility of inappropriate material, intentionally and unintentionally, being obtained and displayed.

6.2 Email

Electronic mail is a valuable tool for personal and official communication both within the school network and on the Internet. Students and staff are encouraged to use it and take advantage of its special features. As with all privileges its use involves responsibilities.

Throughout the Internet, there are accepted practices known as Netiquette, which should be followed. The following points should be noted:

 Use appropriate language and be polite in your messages. Do not be insulting, abusive, swear or use vulgarities

 Never write hate mail, chain letters, harassment, discriminatory remarks and other antisocial behaviours. Therefore no messages should contain obscene comments, threats, sexually explicit material or expressions of bigotry or hate

 Do not reveal your personal address or the phone numbers of students or colleagues

Note that email is not guaranteed to be private. All school emails are filtered for inappropriate content. Messages containing inappropriate content are automatically reported to the ICT Manager  Teachers will set their own guidelines for use of email in class time.

Students will not:

 Send offensive mail

 Send unsolicited mail to multiple recipients ("spam")  Use email for any illegal, immoral or unethical purpose.

6.3 Chat lines (Messenger, Facebook, Twitter, MySpace)

Real-time chat programs (Messenger, Facebook, Twitter, MySpace etc) are not to be used by students.

6.4 World Wide Web

The World Wide Web is a vast source of material of all sorts of quality and content. The school will exercise all care in protecting students from offensive material, but the final responsibility must lie with students in not actively seeking out such material. It is conceivable that, especially for senior students, information is required for curriculum purposes that may appear to contravene the following conditions. In such cases, it is the responsibility of students and teachers to negotiate the need to access such sites.

Students will not deliberately enter or remain in any site that has any of the following content:  Nudity, obscene language or sexual discussion intended to provoke a sexual response  Violence

(17)

17

 Racism

 Information on making or using weapons, booby traps, dangerous practical jokes or "revenge" methods

 Any other material that the student's parents or guardians have forbidden them to see

If students encounter any such site, they must immediately turn off the computer monitor (not the computer itself) and notify a teacher. Do not show your friends the site first

 The Internet must not be used for commercial purposes or for profit

 The Internet must not be used for illegal purposes such as spreading computer viruses or distributing/receiving software that is not in the public domain

 It is inappropriate to act as though you intend to break the law e.g. by attempting to guess a password or trying to gain unauthorised access to remote computers. Even if such attempts are not seriously intended to succeed, they will be considered serious offences

 Interactive use of the Internet should ensure that there is no possibility of the transmission of viruses or programs, which are harmful to another user's data or equipment

 Copyright is a complex issue that is not fully resolved as far as the Internet is concerned. It is customary to acknowledge sources of any material quoted directly and it is a breach of copyright to transmit another user's document without their prior knowledge and permission. This includes the use of images and text. It is safest to assume all content on web sites is the legal property of the creator of the page unless otherwise noted by the creator.

6.5 The School Web site (including the Intranet (Daymap) and the Ultranet)

Material placed onto any of the above:

 Be checked for appropriateness and (as far as possible) accuracy  Not violate copyright

 Have the written permission of a parent/guardian if the parent or guardian has requested such a veto  Not contain the home address or home phone number of an individual

 Not contain the e-mail or web address of a student unless specifically required and requested. Links to sites beyond the school site must be checked for appropriate content. It must be recognised that the content of external sites may change after links have been made, and the school cannot be held responsible for the contents of linked sites, but the school must exercise all due care to ensure no objectionable material is directly accessible via links on our site.

7.

Consequences

More than one may apply for a given offence. Serious or repeated offences will result in stronger penalties.  Removal of network access privileges

 Removal of email privileges

 Removal of internet access privileges  Removal of printing privileges

 Paying to replace or repair damaged equipment  Confiscation of device/s

(18)

18

Return Slip

ICT Acceptable Use Agreement

for the use of school’s internet, intranet and ultranet

Before you may use computer facilities at the school, you must sign this contract, which

binds you to the following conditions. If you break any of the conditions, appropriate

penalties will be applied. This agreement is valid for the duration of your enrolment at

Upwey High School.

Student name: ___________________________________Homegroup: ______

I have read the Guidelines and Conditions for Acceptable Use Procedures for the School’s

Internet document and agree to obey the guidelines and conditions in it.

Signed: _____________________________________________ Date: _____________

The parent or legal guardian of the student must complete this section

I, the parent or guardian of ________________________________ have read and

understand the Guidelines and Conditions for Acceptable Use Procedures for the School’s

Internet I agree that my child shall observe these guidelines and conditions.

Name of parent or legal guardian: _________________________

Signature of parent or legal guardian:

_________________________

Date: _________________________

When this Acceptable Use Agreement for the use of the school’s internet has been

completed and signed please return it to the school.

On receipt of the completed and signed Acceptable Use Agreement you will receive your

network and internet account details.

The following section needs to be filled in by the

student and his/her parents or legal guardian before

(19)

19

Return Slip

1 to 1 Notebook Program Agreement

for the use of Upwey High School’s ICT devices

Before you receive a notebook, you must sign this contract, which binds you to the

following conditions. If you break any of the conditions, appropriate penalties will be

applied. This agreement is valid for the duration of your enrolment at Upwey High School.

Student name: ____________________________________ Homegroup: ______

I have read the 1 to 1 Notebook Program Protocols document and agree to obey the

guidelines and conditions in it.

Signed: ______________________________________________Date: ________________

The parent or legal guardian of the student must complete this section

I, the parent or guardian of ________________________________ have read and

understand the 1 to 1 Notebook Program Protocols. I agree that my child shall observe these

guidelines and conditions. I also agree to pay for any loss or damage incurred to the device

where it is determined that the damage is not covered by the limited warranty.

Name of parent or legal guardian: _________________________

Signature of parent or legal guardian: _________________________

Date: _________________________

When this 1 to 1 Notebook Program Agreement for the use of Upwey High School’s ICT

devices has been completed and signed please return it to the school for processing.

The following section needs to be filled in by the

student and his/her parents or legal guardian prior to

References

Related documents

Printed by ARC-ISCW on semi-transparent matt film without topo-cadastral background; relevant topo- cadastral 1:50 000 map (obtainable from Government Printer) should be used as

Included in the review because the study was conducted in acute settings involving patients with older people Ericksson and Saveman 2002 Nurse’s experiences of

The aims of this study were: (i) To determine the antimicrobial susceptibility of all isolates; (ii) To characterize all isolates using antibiograms, plasmid profiling,

A path model of second language (L2; English) oral language and reading comprehension variables was tested on a sample of 100 Spanish-speaking English- language learners enrolled in

(2017) 'The selection of potential undergraduate students who lack customary academic qualications : is a toolkit possible?', Widening participation and lifelong learning., 19

The findings suggest that occupation-based models of practice such as CMOP-E and MOHO that focus intervention outcomes on improving occupational performance,

A este nível acrescentou-se a insatisfação com a aparência, pois segundo Adulyanon, esta é uma dimensão importante dos resultados em saúde oral (Adulyanon et al.,