1
Preface: All students who have a notebook and their parents have signed both the Upwey
High School ICT (Information and Communication Technologies) Acceptable Use
Agreement and the 1 to 1 Notebook Program Agreement. These Agreements focus on
student responsibilities. The protocols in this document focus on teacher management of
computers in classrooms.
1. Students are required to take responsibility for the recharging of their computers at home in readiness for use in class. To avoid OHS tripping problems with wires lying across the floor, students are not allowed to recharge computers in class. Students must ensure their notebook is fully charged so that it is ready for a full days use in class.
2. All computers will come in a Belkin Honeycomb cover. Students must use this cover at all times when transporting the notebook.
3. Students will only take the computers out of the Honeycomb cover during class when given permission by the teacher.
4. If the teacher needs to have all students listen to instructions during an activity where computers are being used, the teacher has the right to ask students to close the lids of their notebooks (the
computer will go into sleep mode) and open the lids when the teacher is finished.
5. The students will be required to follow the ICT Acceptable Use Agreement at all times. A copy of this is included as an appendix in this document. If the students do not follow the Agreement and continue to not follow it when requested by the teacher, then access to the network and/or the device may be withdrawn.
6. Although Facebook and other programs and sites are blocked on the school network, some students will use a Proxy Jumper to bypass our security settings. If they do this and visit blocked sites, access to the Network will be withdrawn as per point 5 above. Although highlighted in the ICT Acceptable Use Agreement, students are not able to take still pictures or video footage of other students in class using a notebook, mobile phone or other digital device unless permission is given by the teacher. Should students take photos or videos against the direct instructions of a teacher, network access may be withdrawn.
7. All work produced by individual students and involving other students may not be published online outside of the school’s intranet and the DEECD ultranet without written permission from parents and students involved.
8. Students are not allowed to go to their lockers to get computers that have not been brought to class. If they do not bring a computer, they will not have access to a computer.
9. Teachers are encouraged to allow students to use computers when they need to during a class. This may mean that students will open and close their computers throughout a lesson at different times and that the majority of work in some classes is completed in a handwritten form.
2
Teaching and learning vision
Upwey High School endeavours to provide students with a personal computer to give students 1:1 access to information and learning tools across subject areas. The program will help students make connections with what they are learning and with the world outside of the classroom. It will help individualise learning in our classrooms. The effective use of ICT helps to engage students in their learning. It also provides tools and processes for communication, collaboration and collective meaning making between teachers, students, parents and school community. On an international level the 1-to-1 program will assist us in the creation of a global classroom and support our current work on internationalising education. Improved access to computers will provide a platform for deeper understanding of concepts and information for all students at all times. It will give teachers consistent access to tasks that are whole world, big picture, instantly. The 1-to-1 program will allow us to improve assessment and feedback processes and to continue to develop responsible and thinking global citizenship in our school community.
Upwey High School has been preparing curriculum resources and teaching and learning approaches that are tailored to cater for students of the 21st Century. We understand that the resources and skills required by our current and future students are rapidly changing with the rest of the technology rich world. In order to cater for this we have been training all staff in the integration of technology into their classrooms. The 1- 1 Program will ‘close the gap’ and ensure that our students are receiving an outstanding eLearning experience. We have prided ourselves on being leaders in eLearning and this program will further enhance our ability to deliver the most up to date, “student at the centre” curriculum possible.
This Program will offer our students the following:
24/7 access to learning resources via our Learning Management System (Daymap)
Access to multimedia software that will engage students in topics and provide opportunity for greater synthesis of knowledge and deeper levels of thinking
Access to web resources on a 1-1 basis
Provide opportunities for staff to develop more individual learning programs through the use of Daymap, Mathletics and other online resources
Access to communication technologies that will enhance and improve interactions between staff and students
Access to web 2.0 technologies
Access to multimedia resources such as our online video library Clickview as well as digital study notes Access to ‘eBooks’ containing valuable teaching resources including videos, online demonstrations,
practice tests and animations to assist with student understanding of specific curriculum concepts.
Device ownership
The device is owned by the school. Students will be given the device for 24/7 access.
If students exit the school for any reason they will, as a part of the exit process, return the device to the school in full working order, including all accessories and components. Failure to return the notebook prior to exiting the school will be deemed as theft and the matter passed on to the police for investigation.
If a device is lost or stolen, parents are asked to contact the Principal and report the matter to the police. In exceptional circumstances a loan device may be provided to students.
Privately owned devices
To ensure quality of service to all students, privately owned devices will not be connected to the school network.
3
Optional peripherals
The school will not provide or specifically recommend any additional peripherals as part of the 1-to-1 program. However, parents or students may purchase these outside of the program. Program support and warranty will not apply to peripherals.
Peripherals may include: USB backup devices Additional batteries External DVD drives
Guidelines for Participation
Prior to devices being issued to students:
Each device will be imaged with the permitted school image for each year level and registered in the school database with a unique identifier against the student’s ID
Parents and students are required to agree in writing to the terms and conditions of the program Students will participate in a ‘boot camp program’ to ensure they are familiar with their roles and
responsibilities and are aware of safe and ethical use of the device.
Role of parents
Parents should be aware of their child’s rights and responsibilities in regards to: Educational benefits of 1-to-1 learning
Care and maintenance of the device
Policies and procedures for participating in the school’s 1-to-1 program Liabilities
Acceptable use agreements 1 to 1 notebook program protocols.
Limited Warranty
All warranty repairs will be managed by Technical Support. The notebook is covered by a three year limited warranty. In the event that the notebook is lost or stolen the replacement cost of the unit will be charged. This limited warranty does not cover the following:
Uninterrupted or error-free operation of a product Loss of, or damage to, your data
Any software programs, whether provided with the product or installed subsequently
Failure or damage resulting from misuse, accident, modification, unsuitable physical or operating environment, natural disasters, power surges, or improper maintenance by you
Damage caused by a non-authorised service provider
Failure of, or damage caused by, any third party products, including those that Lenovo may provide or integrate into the Lenovo product at your request and
Any technical or other support, such as assistance with “how-to” questions and those regarding product set-up and installation.
4
Caring for 1 to 1 devices
The following conditions must be adhered to in order to maintain warranty:
Students are to store their notebooks in their lockers during recess and lunch times unless they are using the device in a designated study area (eg library)
Always store the devices in the protective cover provided
Take your device home overnight to recharge and do not leave in locker out of school time
Do not store anything additional to the devices in the device’s cover (eg cords or papers), as this may damage the screen
Carry your device within its protective cover inside your normal school backpack. Do not overfill your school backpack. (Pressure on the device can cause permanent damage to the screen and other components)
Do not grab or squeeze the device. (This can also damage the screen and other components) Never leave your device in a car or in an exposed area where it can be stolen
Never leave the device in direct sunlight or allow it to get wet
Never leave your device in unsupervised areas during the school day. They are to be securely locked in a classroom or in a school locker. Devices left unsecured may be confiscated to avoid exposure to theft
See Appendix 2 for more guidelines for students caring for their 1-to-1 device.
Appearance and personalisation
Devices are the property of the school. They are not to be altered or personalised in any way that is
irreversible. It is the student’s responsibility to ensure the device is cleaned and returned in its original state and the parents’ responsibility to pay for any damage to the notebook and/or its peripherals.
Loan/replacement
Whenever possible, loan devices will be available to students if their device has been submitted for repair under warranty conditions.
The school will provide a bank of ‘swap units’ for cases where the unit is required to be returned for repairs. When students bring their notebook to our service desk and it is deemed appropriate to return it for service, they will receive a ‘swap unit’ to borrow while their own unit is repaired. This will incur no extra cost and will ensure that student’s school work will not be interrupted by breakdowns.
Support and service provision
To maintain and service the increased number of devices that this program will bring to our school, we have designed a process that will provide the best possible outcomes for all students. The following explains the process as it will occur from the beginning of the 2012 school year:
Training
When receiving their notebooks, all students will be required to attend some training sessions that will assist in the care and basic use of their notebook. By spending this time to familiarise students with the particular product, we would expect to minimise the number of disruptions that may occur during the school year. The training sessions will cover topics such as:
Backing up files/file management Caring for your notebook
5
How to log in at home Setting up for your home network (basic guide)
Basic programs that we will use for teaching and learning Cyberbullying
ICT ticket system
Service malfunctions
The first port of call will be classroom “techxpert” who is a nominated student in the class who has undergone training and is capable of troubleshooting basic notebook problems.
If the class “techxpert” cannot resolve the problem, Upwey High School will offer a ‘Notebook Service Desk’. This ‘Desk’ will act as the central point for all enquiries and service requests in regards to the school’s notebook program and will be located in the current ICT offices. The desk will be staffed between 8:30-8:50am, 12.45-1.15pm and 3:10-3:30pm by our technicians who are trained to deal with the notebook 1-1 program. Students should report to the ‘Notebook Service Desk’ with all malfunctions. The machine will be logged with the desk and a swap unit may be issued for the day. It is important to note that whilst the school will endeavour to have all notebooks returned within a 3 day period, there will be times where, due to sourcing of parts and service demand, this may not be possible. In these cases students will still retain their ‘swap unit’ until their own notebook is returned. See Appendix 1 for the procedure for faults and repairs process.
All enquiries regarding notebook services, swap units, repairs and software issues should be logged using the ICT ticket system on the school’s intranet.
Internet Usage
All units will be capable of using N wireless channel. This enables the school to expand the use of available bandwidth when providing network/internet access to wireless devices. It will assist the school in providing constant, speedy connection to the increased number of devices that will be in use from the beginning of 2012. This move comes in line the Education Department’s wireless upgrades.
Use of devices by students is governed by the ICT Acceptable Use Policy that students and parents agree to for use of ICT within the school. Parents are also to familiarise themselves with the ICT Acceptable Use Policy to further support their adherence outside of the school environment. Any inappropriate use of the internet is unacceptable and is subject to disciplinary action and exclusion from the school networks and resources. See Appendix 4 for Upwey High School’s ICT Acceptable Use Policy.
Users and security
Students are recommended to use a username and password to access their device to protect information in incidents of loss or theft.
No notebooks are to be used in the school grounds outside of class time and notebooks are to be locked in student lockers when not in use.
6
Power supply management
Students will be responsible for ensuring that all devices are to be fully charged at home before the
commencement of every day. Partial charging or notebooks that are not charged will be deemed as not being prepared for class and will incur consequences equivalent to not bringing books to class.
Software licensing
Software installed by the school is subject to licence conditions and must not be distributed or deleted without written permission from the school. Students are not permitted to tamper with school software installed on the notebooks. No other software is to be installed on the device.
Students must abide by the school’s Agreements whenever the school equipment or services are involved. This includes the device regardless of location.
The ICT Acceptable Use Agreement Policy contains specific responsibilities to ensure student safety: Students must keep themselves and friends safe by not giving out personal details, including full
names, telephone numbers, addresses, images and passwords
Students should be respectful in how they talk to and work with others online, and never participate in online bullying
Using the technology at school for learning, using the equipment properly and not interfering with the work or data of another student.
Virus protection
Viruses have the potential to severely damage and disrupt operations within the school and DEECD’s computer networks. The devices have Symantec antivirus software installed on them. This software will scan the hard drive for known viruses on start-up. The virus software will be upgraded from the school network and at home. Students are recommended to:
Protect their devices from virus attacks by scanning for viruses at least weekly. Symantec virus definitions updates are managed automatically when connected to the internet
Consider running virus scans regularly after accessing the internet or personal mail or opening a file from a removable media source. Carry out the scan before returning to the school and connecting to the school network
Not to open any files attached to suspicious or unknown emails
Exercise caution when downloading files from the internet. Save the files to the device hard disk and run the virus scanner on the file before opening them
Delete chain and junk emails. Do not forward or reply to any of these
Never reply to spam. Spam email messages can contain viruses that notify a third party of the legitimacy of an email address and then add the recipients to the spammer’s database. They can also consume a large amount of disk space on the server, which slows computer networks.
7
Images and reimaging
The school will be responsible for the software image used on all 1-to-1 devices. If a student experiences difficulties with software or device operation, then the computer will be reimaged. All data stored on the computer will be deleted in the process and students will be responsible for reloading necessary files from backup drives maintained at home.
The school will periodicaly reimage all student notebooks. The purpose of this will be to ensure all software is updated and to remove any unwanted / unnecessary software. This will generally take place in Term 4 on a class by class basis and will result in notebooks for those students being unavailable for a short time. (We would hope the process would take less than 3 days). Reimaging may also take place if a student abuses the privilege of having a notebook at their disposal by hacking, malicious damage, download of pirated software or inappropriate programs.
Before this process occurs it is essential that students make backups of any files they wish to keep that are located on their notebooks. The school takes no responsibility for lost data during this reimaging, but will provide support and assistance to students wishing to make backup copies of existing files.
Non school applications and files
Software, including music, movies and games will be allowed for academic and recreational reasons, provided copyright obligations are met. Personal MP3 and other music files may be stored on the device. Downloading music, games and videos from the internet during school hours is prohibited except when directed by a staff member. Students are permitted to listen to digital music and/or participate in games on their device while at school where given express permission by a teacher for an educational purpose. It is the student’s
responsibility to ensure that there is enough hard drive space and memory available to engage in all educational requirements.
Reimaging may take place if students abuse the privilege of having a notebook at their disposal by hacking, malicious damage, download of pirated software or inappropriate programs.
Backup/recovery
Students will be responsible for their own backup of critical data at all times. This may be through a USB, external drive, the school network or internet-based backup to regularly backup important work.
8
Appendix 1: Faults and Repairs Procedure
Malfunction is software related Malfunction is hardware related
Under Warranty
Not covered by
Warranty
Unit is returned to student and swap unit returned to School
“Faulty” notebook is handed to
Upwey HS technician
Student will be issued with a receipt
and depending on the issue and
likely time of repair, may be issued
with a “swap unit”
Is the malfunction
hardware or
software related?
Unit is reimaged
Whilst every effort is made to
retain data, backup is always
the responsibility of students
Covered by
Warranty?
Unit is repaired by Lenovo
technician and the parent
is billed for repair.
Notebook returned to
student on receipt of
payment
Unit is fixed by Lenovo
technician under
warranty agreement
9
Appendix 2: Caring for your 1 to 1 device
Packing away your device
Store your device bottom down
Do not wrap the cord too tightly around the power adaptor because this might damage the cord.
Handling your device
Try to avoid moving your device around when it is on. Before switching on, gently place your device on a stable surface and then switch on
You still need to be careful with your device while it is in the bag. Always place protective cover gently down
Be careful when putting the device in the car that no other items are on top of it and nothing will roll onto the device
Devices should be switched off before being put into the protective cover.
Operating conditions
Do not place objects on top of your device and never carry it around while it is turned on Avoid exposing your device to direct sunlight or sources of heat such as desk lamps Avoid exposing your device to dust, dirt, rain, liquids or moisture
Avoid exposing your device to heavy shock or vibration.
LCD screen
LCD screens are delicate – they don’t like being poked, prodded, pushed or slammed Never pick up your device by its screen
Do not slam the screen closed
Be gentle when putting your device down.
To clean your LCD screen
Switch off your device
Lightly dampen a non-abrasive cloth with water and gently wipe screen in a circular motion Do not directly apply water or cleaner to the screen
Avoid applying pressure to the screen.
AC adaptor
Connect your adaptor only to your device
Do not step on your power cord or place heavy objects on top of it. Keep your cord away from heavy traffic areas
When unplugging the power cord, pull on the plug itself rather than the cord Do not wrap your cord tightly around the adaptor box
Be aware of the power savings that come from running your device effectively from battery after being fully charged. This can amount to a significant amount per year.
Keyboard
Gently brush your keyboard with a clean soft bristled paint brush or similar to remove dirt
If any key tops are missing or keys are in a damaged state, take your device to technicians to be repaired immediately. A single key top can easily be replaced but continuing to use the keyboard with a missing key top can result in having to replace the entire keyboard.
10
Appendix 3: Safe notebook use practice
Take breaks
Incorporate breaks every 20–30 minutes to rest eyes, stretch hands, muscles and joints; and to break up repetition and static postures.
Spinal health
To ensure you are able to take part in the things you enjoy, it is important to take care of your back. Tips to help keep your back healthy:
A backpack carried over both shoulders is the best choice for carrying a load to ensure the weight is evenly distributed
Pack your backpack so that the heavier objects are placed nearer to your back, with the lighter objects towards the outside
Make sure your backpack fits properly. When you sit down with your pack on, it should not extend higher than your shoulders
When lifting your backpack, face it, bend at the knees and lift the pack with both hands while straightening your legs. Place the straps over your shoulders one at a time
Only carry items that are necessary. If you have a locker, use this to help lighten the load you have to carry during the day
When carrying a heavy load over a long distance, take regular breaks to avoid fatigue. Fatigue increases the risk of injury
If you sit for long periods of time, ensure that your bottom touches the back of the seat
Take regular breaks when you've been sitting for a long time, briefly move around and/or stretch every hour or so
Try to do as much physical activity as possible. When you participate in vigorous activities such as swimming, jogging etc. ensure that you warm up and stretch before and after
If you participate in contact sports, it is important that your neck and spinal muscles are in good condition to help prevent injuries. Regular fitness and skill training are essential in reducing the incidence of injury.
11
Appendix 4: Upwey High School ICT (Information and
Communication Technologies) Acceptable Use Policy
Policy Statement
The internet offers huge potential benefits for teaching and learning. It offers wonderful opportunities for students and teachers to contribute to the world community on the web. Blogs, social networking spaces and instant messaging tools are now part of students' 'life on the web'. Students can:
explore the world online
visit museums and libraries around the world
access rich information resources to support research and investigations
communicate and collaborate with people all over the world
publish to the web.
Upwey High School has an important role in preparing students for these 'online communities', even though students may not access some online communities at school (eg Facebook).
Before our students start to explore the Internet, it's crucial to make sure everyone understands what they should and shouldn't be doing online.
Behaving safely online means:
protecting their own privacy and personal information (we used to call it 'stranger danger')
selecting appropriate spaces to work and contribute
protecting the privacy of others (this can be sharing personal information or images)
being proactive in letting someone know if there is something that is 'not quite right'. At home this
would be a parent or carer, at school a teacher.
These principles of safety and responsibility are not specific for the web but certainly apply to the use of internet at school. Just as in the real world, the virtual world of the internet involves some risks. Upwey High School has developed proactive strategies that help to minimise these risks to our students.
Guidelines Program
1.1 Use of the school’s network to access the Internet and Internet services, including electronic mail and the World Wide Web, will be governed by an Acceptable Use Procedures (AUP) for the Internet.
2.1.1 The use of the school's network is subject to the Acceptable Use Procedures (see appendix-a). Briefly this means that the school’s network can be used only by staff, students and associated individuals (eg visiting teachers) and only for or in connection with the educational or administrative functions of the school. 2.1.2 The Acceptable Use Procedures (AUP) is intended to
operate within and be consistent with existing school policies and procedures in areas such as:
bullying (including cyber-bullying) and Anti-harassment
Student Wellbeing 1.2 The Acceptable Use Procedures (AUP) is
intended to encourage responsible action and to reflect a respect for the ability of its adherents to exercise good judgement.
2.2.1 Responsibility and accountability for network security is the shared responsibility of all network users. It is the responsibility of the student to protect his/her password and not divulge it to another person. If a student knows or suspects his/her account has been used by another person, the account holder must notify a teacher immediately.
12
Guidelines Program
2.2.2 All messages created, sent or retrieved on the school’s network are the property of the school, and should be considered public information. The school reserves the right to access and monitor all messages and files on the computer system as deemed necessary and appropriate. Internet messages are public communication and are not private. All communications including text and images can be disclosed to law enforcement and other third parties without prior consent from the sender.
1.3 Independent student use of the internet will only be permitted where students and their parents/carers provide written acknowledgement that students agree to act in accordance with the standards of conduct established in the Acceptable Use Procedures (see appendix-a).
2.3.1 Independent student use of the internet on the school’s network will only be permitted where students and their parents/carers provide written acknowledgement that students agree to act in accordance with the standards of conduct established in this policy document and as set-out in the Acceptable Use Procedures (AUP).
1.4 Students can expect sanctions if they act irresponsibly and disregard their
obligations to other users and the school as the provider of their Internet access.
2.4.1 For breaches of the Acceptable Use Procedures students can face a number of consequences depending on the severity of the breach and the context of the situation. More than one consequence may apply for a given offence. Serious or repeated offences will result in stronger penalties.
Removal of network access privileges Removal of email privileges
Removal of internet access privileges Removal of printing privileges
Paying to replace damaged equipment Confiscation of device/s
Other consequences as outlined in the school’s student engagement discipline policy.
2.4.2 Bullying and harassment of any kind is prohibited. No messages with derogatory or inflammatory remarks about an individual or group’s race’ religion, national origin, physical attributes, or sexual preference will be
transmitted. Violations of any guidelines listed above may result in disciplinary action.
1.5 Students must not use the school network in breach of a law or to commit an offence.
2.5.1 While the Internet may be largely a self-regulated environment, the general principles of law and community standards still apply to communication and publishing via the Internet. In addition to school penalties, there are legal sanctions for improper use of the Internet.
Links
Upwey High School’s Anti-bullying (including cyber-bullying) and Anti-harassment Policy Appendix-A: Acceptable Use Procedures (AUP) for the Internet
13
http://www.education.vic.gov.au/management/elearningsupportservices/www/classroom/default.ht m http://www.education.vic.gov.au/management/elearningsupportservices/www/classroom/technolog ies.htm http://www.education.vic.gov.au/management/elearningsupportservices/www/management.htmEvaluation
This policy will be reviewed as part of the school’s 3 year cycle or as required by developments in relevant legislation.
Policy drafted by: Education Committee September 2012 Date ratified by school council: 21 November 2012
14
Appendix-A: Guidelines and Conditions ICT (Information and Communication
Technologies) Acceptable Use Procedures
Upwey High School’s computing facilities are provided primarily for the educational benefit of students and the professional development of staff. Any behaviour that interferes with these primary objectives will be considered an infringement of Acceptable Use.
1. General Policies
Use of computer/internet resources is for educational purposes only Access to the Internet must be supervised by a staff member Appropriate language must be used in all communications
Internet and printing services are both charged against a student’s account
Consideration must be given to avoiding inconvenience to other computer users. e.g. use headphones to listen to sound or music; leave computers ready for the next user to log in; do not leave programs running on computers when you leave; do not leave rubbish or paper lying around computers; replace furniture to normal positions when you leave.
Students must not:
Use abusive or obscene language in any communications
Steal, or deliberately or carelessly cause damage to any equipment Interfere with or change any software settings or other user’s files Attempt to get around or reduce network security
Logon using another user’s account
Store unauthorised types of files in their own home directories (games or other executables) Send "spam" (bulk and/or unsolicited e-mail)
Reveal personal information in any communications
Deliberately enter, or remain in, web sites containing objectionable material Knowingly infringe copyright.
2. Computer hardware
Computer facilities are expensive and must be treated carefully. Students must not:
Do anything likely to cause damage to any equipment, whether deliberately or carelessly Interfere with networking equipment
Eat or drink near any School owned computer resources.
Students must not, without permission:
Attempt to repair equipment without permission Unplug cables or equipment
Move equipment to another place Remove any covers or panels Disassemble any equipment
Disable the operation of any equipment
Students must also report other people breaking these rules.
Regardless of the real or supposed levels of understanding, students are NOT authorised to attempt the repair or adjustment of any school hardware or software. Any such attempt will be regarded as a violation of network security. Any problem with equipment or software must be referred to an authorised person.
15
3. Software and operating systems
Computer operating systems and other software are set up properly for computers to be successfully used in the School.
Students will not:
Change any computer settings (including screen savers, wallpapers, desktops, menus standard document settings etc)
Bring or download unauthorised programs, including games, to the school or run them on school computers. Online Internet games are banned
Delete, add or alter any configuration files
Copy any copyrighted software to or from any computer, or duplicate such software Deliberately introduce any virus or program that reduces system security or effectiveness.
4. Networks
Network accounts are to be used only by the authorised owner of the account.
It is the responsibility of students to ensure their user account details remain secure and that unauthorised use of their account does not take place.
Students must not:
Attempt to log into the network with any user name or password that is not their own Reveal their password to anyone. Students are responsible for everything done using their
accounts, and everything in their home directories. Since passwords must be kept secret, no user may claim that another person entered their home directory and did anything to cause school rules to be broken
Use or possess any program designed to reduce network security
Enter any other person’s home directory or do anything whatsoever to any other person’s files Be logged on to the network on different computers at the same time
Store the following types of files in their home directory: - Program files (EXE, COM)
- Compressed files (ZIP, ARJ, LHZ, ARJ, TAR etc)
- Picture files, video files, music files etc unless they are required for a school task - Obscene material – pictures or text
- Obscene filenames - Insulting material - Copyrighted material
Intentionally seek information on, obtain copies of, or modify files, other data or passwords belonging to other users.
5. Printing
Students must minimise printing at all times by print previewing, editing on screen rather than on hard copies and spell-checking before printing.
Students are allocated printing credit as part of their ICT Parent Payment. Once this allocation has been completely used, further allocations may be purchased. Students are not to use another student’s allocation. Students who deliberately waste another student’s allocation will be liable for all costs incurred. Students are charged a fee to print A4 pages of black printing.
16
6. Internet usage
Internet access is expensive and has been provided to assist students' education. Students must use it only with permission and not in any unauthorised way. Students are to be supervised by a staff member when using the Internet at all times.
Students are allocated a download credit as part of their ICT Parent Payments. Once this allocation has been completely used, further allocations may be purchased. Students are currently charged for each Mb of download.
The Internet is not intended for entertainment.
Because the Internet is an unsupervised environment, the school has a responsibility to ensure that, as far as possible, material obtained from the Internet is not offensive or inappropriate. To this end, filtering software has been placed on the Internet links. In the end, however, it is the responsibility of individual students to ensure their behaviour does not contravene school rules or rules imposed by parents/carers.
The school is aware that definitions of "offensive" and "inappropriate" will vary considerably between cultures and individuals. The school is also aware that no security system is perfect and that there is always the possibility of inappropriate material, intentionally and unintentionally, being obtained and displayed.
6.2 Email
Electronic mail is a valuable tool for personal and official communication both within the school network and on the Internet. Students and staff are encouraged to use it and take advantage of its special features. As with all privileges its use involves responsibilities.
Throughout the Internet, there are accepted practices known as Netiquette, which should be followed. The following points should be noted:
Use appropriate language and be polite in your messages. Do not be insulting, abusive, swear or use vulgarities
Never write hate mail, chain letters, harassment, discriminatory remarks and other antisocial behaviours. Therefore no messages should contain obscene comments, threats, sexually explicit material or expressions of bigotry or hate
Do not reveal your personal address or the phone numbers of students or colleagues
Note that email is not guaranteed to be private. All school emails are filtered for inappropriate content. Messages containing inappropriate content are automatically reported to the ICT Manager Teachers will set their own guidelines for use of email in class time.
Students will not:
Send offensive mail
Send unsolicited mail to multiple recipients ("spam") Use email for any illegal, immoral or unethical purpose.
6.3 Chat lines (Messenger, Facebook, Twitter, MySpace)
Real-time chat programs (Messenger, Facebook, Twitter, MySpace etc) are not to be used by students.
6.4 World Wide Web
The World Wide Web is a vast source of material of all sorts of quality and content. The school will exercise all care in protecting students from offensive material, but the final responsibility must lie with students in not actively seeking out such material. It is conceivable that, especially for senior students, information is required for curriculum purposes that may appear to contravene the following conditions. In such cases, it is the responsibility of students and teachers to negotiate the need to access such sites.
Students will not deliberately enter or remain in any site that has any of the following content: Nudity, obscene language or sexual discussion intended to provoke a sexual response Violence
17
Racism Information on making or using weapons, booby traps, dangerous practical jokes or "revenge" methods
Any other material that the student's parents or guardians have forbidden them to see
If students encounter any such site, they must immediately turn off the computer monitor (not the computer itself) and notify a teacher. Do not show your friends the site first
The Internet must not be used for commercial purposes or for profit
The Internet must not be used for illegal purposes such as spreading computer viruses or distributing/receiving software that is not in the public domain
It is inappropriate to act as though you intend to break the law e.g. by attempting to guess a password or trying to gain unauthorised access to remote computers. Even if such attempts are not seriously intended to succeed, they will be considered serious offences
Interactive use of the Internet should ensure that there is no possibility of the transmission of viruses or programs, which are harmful to another user's data or equipment
Copyright is a complex issue that is not fully resolved as far as the Internet is concerned. It is customary to acknowledge sources of any material quoted directly and it is a breach of copyright to transmit another user's document without their prior knowledge and permission. This includes the use of images and text. It is safest to assume all content on web sites is the legal property of the creator of the page unless otherwise noted by the creator.
6.5 The School Web site (including the Intranet (Daymap) and the Ultranet)
Material placed onto any of the above:
Be checked for appropriateness and (as far as possible) accuracy Not violate copyright
Have the written permission of a parent/guardian if the parent or guardian has requested such a veto Not contain the home address or home phone number of an individual
Not contain the e-mail or web address of a student unless specifically required and requested. Links to sites beyond the school site must be checked for appropriate content. It must be recognised that the content of external sites may change after links have been made, and the school cannot be held responsible for the contents of linked sites, but the school must exercise all due care to ensure no objectionable material is directly accessible via links on our site.
7.
Consequences
More than one may apply for a given offence. Serious or repeated offences will result in stronger penalties. Removal of network access privileges
Removal of email privileges
Removal of internet access privileges Removal of printing privileges
Paying to replace or repair damaged equipment Confiscation of device/s