• No results found

ONE TO ONE LAPTOP PROGRAMME POLICY

N/A
N/A
Protected

Academic year: 2021

Share "ONE TO ONE LAPTOP PROGRAMME POLICY"

Copied!
7
0
0

Loading.... (view fulltext now)

Full text

(1)

ONE

TO

ONE

LAPTOP

PROGRAMME

POLICY

CONTENTS

1 Vision and Rationale ... 2

2 Ownership Model ... 2

3 End of Lifecycle Process ... 2

4 Early Return Policy ... 2

5 Appearance / Personalisation ... 2

6 Device Specifications ... 3

7 Private Devices ... 3

8 Guidelines for Participation ... 3

9 Replacements due to loss, theft or accidental damage ... 3

10 Technical Support ... 3

Repair costs ... 4

11 Loan Laptops ... 4

12 Software , Copyright and Intellectual Property ... 4

Games, Music, Non-school Applications ... 4

13 Internet Usage ... 5

Usage ... 5

Cost ... 5

14 Users and Security ... 5

15 Virus Protection ... 6

16 Networks and Network Security ... 6

Ad-hoc networks ... 6

Wired networks ... 6

Hacking... 6

Packet Sniffing ... 6

17 Appropriate Use... 6

18 Cyber Safety ... 7

(2)

1. VISION AND RATIONALE

Mount Gambier High School, working within a culture of collaboration with students, staff and parents, will embrace exceptional practice in relation to Learning Technologies.

The increased use of mobile digital devices and the ability to learn anywhere and at any time will guide our choice of innovative teaching methodologies linked to Learning Technologies.

Improving student learning is our core goal and we believe that flexibility of use is a main consideration in the use of student laptops.

2. OWNERSHIP MODEL

The one to one laptop initiative will initially see the school fully fund student laptops. The laptop will remain the property of the school (acting on behalf of the minister of education).

As the ownership remains that of the school, the school software licences will apply to all laptops and no extra expense will be incurred for software licensing.

All laptop repairs, warranty claims or otherwise will be undertaken by the school as they remain the owner of this equipment.

It ensures a consistent platform, which in turn;

Facilitates curriculum delivery and the Training and Development of staff

Helps with the management and support of devices

Enables the school to retain control over how laptops are used for the lifecycle of the device in the school.

3. END OF LIFECYCLE PROCESS

The laptop remains the school’s property for the life of the device. The device will need to be returned to the school at the end of year 12 so it can be reconditioned for deployment at year 9. At the end of the device’s 4-year lifecycle, there may be a buyout option with DECS.

4. EARLY RETURN POLICY

If a student leaves the school prior to the end of the laptop’s lifecycle the laptop must be returned to the school.

The device must be returned in good condition, allowing for normal usage, and personal identifications must be removed. If the device is not returned in this condition, a fee may apply.

5. APPEARANCE / PERSONALISATION

As the laptops are the property of Mount Gambier High School, they are not to be altered or personalised in any way that is not completely reversible. Non offensive labels or stickers are permitted, on the outside of the case but must be removable. The barcode and name on the device must not be altered or removed.

The protective carry case can be personalised to promote easy identification.

(3)

6. DEVICE SPECIFICATIONS

To assist in management, students are not permitted to change the device specifications, make modifications or add upgrades.

Note: The device warranty is void if attempts are made to change the hardware.

7. PRIVATE COMPUTING DEVICES (E.G. LAPTOPS, IPADS, PHONES ETC)

It should be noted that the school cannot support the maintenance of any private computing device and that all software needs to be supplied by the user. The school is not licensed to put software on private devices and this is the responsibility of the owner at their cost.

Arrangements for software packages should be made with the supplier at time of purchase.

A list of suggested software is available on request.

8. GUIDELINES FOR PARTICIPATION Prior to laptops being issued to students:

 Each laptop will be imaged with the permitted school image and registered in the school laptop database with a unique identifier against the students’ ID.

 Parents and students will be invited to attend an information event where details of the Laptop Policy will be discussed and the laptop programme promoted.

 At the conclusion of the information evening parents will be required to sign a Laptop Agreement Form before taking possession of their child’s laptop.

 Students will be given further induction to ensure that they are familiar with their roles / responsibilities / specialist software applications, by relevant staff.

 Laptops will be required to be carried in the carry case provided. The Laptop must be available for use at school each day, fully charged.

9. REPLACEMENTS DUE TO LOSS, THEFT OR ACCIDENTAL DAMAGE

Mount Gambier High School will replace or repair student laptops due to genuine fire, loss, theft or accidental damage, under the following conditions;

In the case of loss or accidental damage, repair or replacements from a pool of similar model will be made at the discretion of the school. In this case, a statutory declaration signed by a parent/caregiver must be provided. Where a loss, theft or damage is the result of negligence, carelessness, malice, inattention or apparent disregard for the laptop, parents/caregivers will be charged for the loss as per the depreciation schedule, as the laptop is a required item.

Stolen laptops must be reported immediately by the student or parent/caregiver to the police and the school must be provided with the police report number.

10. TECHNICAL SUPPORT

Students experiencing technical and software faults should proceed according to the handbook.

If a laptop cannot be repaired in a timely manner a loan laptop will be issued. It is our goal to have laptops returned within three workings days of the initial report.

(4)

Repair costs

If a laptop is deemed faulty and covered under the four year warranty, the school will endeavour to repair the laptop under this warranty, with the machine being repaired within 2 working days.

If a laptop has been looked after in relation to these guidelines, and every care has been made to look after the laptop, the laptop may be repaired at the Principal (or delegates) discretion. If however a machine is damaged due to neglect or malicious damage, cost of repair will be transferred to the student.

11. LOAN LAPTOPS

Loan Laptops may be available from the ICT Support Office in approved circumstances.

If a student must await the repair or replacement of their Laptop they may receive approval to borrow a Laptop for the duration of the repair/replacement period. The Laptop must be returned to the ICT Support Office. All applications for loan Laptops must be made to the ICT Coordinator who will provide students with written approval. Short term loans will not be made in circumstances such as:

 A student not bringing their laptop to school.

 The battery going flat.

12. SOFTWARE : COPYRIGHT AND INTELLECTUAL PROPERTY

Each device will be loaded with a Mount Gambier High School approved software image, configured for use on the school network.

Digital textbooks appropriate for specific year levels will also be provided on these laptops.

Software installed by the school is copyright and must not be distributed or deleted without written permission from the school.

The parent will need to sign off on a software use agreement when issued with the laptop.

Students may add their own private software as required. This software must be legally purchased with a user licence. The software must not be malicious or offensive or breach copyright laws.

Games, Music, Non-school Applications

Mount Gambier High School does not object to the installation of non-school applications and files on the school laptops provided that the installed applications and files:

 Are appropriately licensed (i.e. they do not breach copyright and intellectual property laws – this includes video and music downloads)

 Are ethically and morally acceptable (including consideration of school appropriateness, age appropriate ratings and privacy issues)

 Do not affect the efficient functioning of the laptops for educational purposes (i.e. they do not interfere with the speed and storage capacity of the laptop or the problems that might arise from increased battery use)

 Do not affect the school’s wireless network

 Do not interfere with the learning program (i.e. they may only be used in class under

(5)

In particular, while some games have significant educational benefits, other games have little educational merit and may affect network function. As a result:

 The use of network games is not permitted at school

 No ad-hoc networks are to be formed

Where there is a contravention of this policy, consequences will include re-imaging the device which will result in the loss of data if back-ups have not been carried out effectively.

Other sanctions may be imposed as appropriate and determined in consultation with the ICT Coordinator, Network Manager and the Senior Leader of either Junior or Senior School.

13. INTERNET USAGE Usage

Students can access the Internet through the school’s network while on site. Access to the Internet through the school’s network at school will be monitored and subject to strict filtering.

Students may also use the Internet for their personal use at home after setting up the device to access it through their home Internet Service Provider. (Consult your ISP for processes to do this.) However, students are reminded that inappropriate downloads can be detected when the devices are connected to the school’s network.

Students will be ‘in-serviced’ on safe Internet usage and topics such as

 Personal information security

 Cyber bullying

 Copyright and online referencing

 Libel Cost

Using the Internet and downloading data incur a cost when used at the school. This is incorporated in an Internet allocation which is topped up each week.

It is the school policy that when used appropriately, students should not need to pay for Internet usage. If quotas are reached under normal usage, students will be provided with an adequate increase in balance to achieve learning outcomes.

Access to the school network when accessed from home will incur a cost through your home ISP.

14. USERS AND SECURITY

Each student will be required to have an individual password for logging in to the school network. This password should not be divulged to any other party under any circumstance.

Sanctions will be taken against any sharing of passwords.

Any attempt to break into a government computer system is a federal offence carrying strict penalties which are also applicable to minors.

Our network audit logs contain information on the user logging in, the computer which is

(6)

15. VIRUS PROTECTION

Anti-virus software and monitoring software will be loaded onto the laptop through the initial imaging process. Updates of this software will be scheduled at various times.

If a student machine attempts to connect to the school network and is found to have a virus the laptop should automatically be ‘cleaned’.

Students should ensure that anti-virus software is kept up-to-date on their laptop and regularly check for viruses. This can be done at no cost at school.

As students have the right to personally use their laptops, and connect to the Internet from home, they need to take all steps to protect the laptop from virus attacks.

16. NETWORKS AND NETWORK SECURITY Ad-hoc Networks

Ad-hoc networks (the creation of a standalone wireless network between two or more laptops) are not permitted whilst at school.

Wired Networks

Students are not to plug any device (i.e. wireless router) into the school’s wired network.

Any student caught with a device plugged into the schools wired network will be dealt with through standard Student Behaviour Management (SBM Policy).

Hacking

Hacking is a criminal offence under the Cyber Crime Act (2001). Any hacking attempts will be forwarded to the appropriate outside agencies.

Packet Sniffing

Any type of software or hardware device designed to capture or view network data is not permitted (i.e. keyloggers). Any student detected capturing network traffic will be dealt with under the SBM process, and the police will be involved where necessary.

17. APPROPRIATE USE

Prior to the distribution and use of any ICT’s all students and their parents/caregivers are required to sign a User Agreement. This covers the care, use and management of computers in a cyber-safe learning environment. Included in the management are security, email, Internet access and virus protection as well as cyber-safety.

The use of school ICT’s including applications and files is for the benefit of student learning. The use of allocated and loaned resources is on the understanding that the user will access applications and files in safe and ethical ways. Students and their parents/caregivers must be aware that the school’s Student Management process encompasses off-site use and behaviours related to ICT, even outside of school hours. It is our expectation that students will make use of the available technologies in line with the school values and behaviour code.

Digital devices provided by Mount Gambier High School are only available for use by enrolled students and other authorised persons. They are not to be used for private business or other unauthorised activities.

(7)

18. CYBER SAFETY

Mount Gambier High School is committed to being a cyber-safe learning environment.

Students will undertake Cyber-safety seminars as a part of their network induction.

If a student who is enrolled in a school behaves online in a manner that threatens the wellbeing of another child, student, parent or member of the school community, even if this occurs off-site and/or out of school hours, the principal has the authority under the Regulation pursuant to the Education Act 1972 to suspend or exclude a student from attendance at school.

If the principal suspects an electronic crime has been committed, this must be reported to the South Australian Police Department (SAPOL). Where there is a further reasonable suspicion that evidence of a crime, such as an assault, is contained on a mobile phone or other mobile digital device eg laptop, the device will be confiscated and handed to the investigating police officer. SAPOL will determine any further action.

Any other relevant outside agencies will also be contacted in accordance with our legal responsibilities.

19. SECURITY AND STORAGE

Students must store and transport their laptops in the case provided. Laptops available for loan will be loaned along with the case in which they are stored in. Laptops must be secured in the case when moving from one learning space to another and, where possible, laptops should be used in classes within the supplied case.

Moving around school with the laptop:

Students must take the laptop to all lessons unless the teacher has requested otherwise.

When moving around the school students must carry the laptop in the case. In accordance with the existing policy on schoolbags, the laptop must not be carried around the school in a school bag. The Laptop must never be left in any unsupervised area. When the laptop is not in use it must be locked in students’ lockers.

Students must not carry their laptop while the screen is open.

20. LAPTOP BATTERIES / CHARGING

Students are to bring their laptops to school each day in a fully functional state.

Students will not be permitted to recharge laptops at school.

21. BACKUP AND DATA STORAGE

It is important to keep backups of critical student work. There are a number of options students should consider, including 1GB of space on the school server in their home drive, removable media and cloud based services.

22. REVIEW

This policy will be reviewed by the ICT Committee in 2012.

References

Related documents

The BYOD policy applies to any device is for personal learning (including appropriate use of all Wireless Network Capable Digital Devices brought from home for school or class

Ventura/Garner-Hayfield Junior High School Computer Acceptable Use Policy 2014-2015 School Year.. The focus of the one-to-one computer program at the Ventura/Garner-Hayfield

Firm Decision Aid (Condition I) Firm Decision Aid v.ith Rotated Table (Condition 2) AICPA Decision Aid (Condition 3) AICPA Decision A id with Rotated Table (Condition 4)

54, Commercial Registration and Business Licensing (Amendment) Proclamation, 2003, proc. 9 which are all repealed and Commercial Registration and Business Licensing Proclamation,

6 Order: (1) Overruling Defendant San Diego Port District’s Objections to the United States’ Taking of Property by Eminent Domain; and (2) Denying Defendant California State

Supplemental Figure 16: Krona chart of the top 10 OTUs at the Family level created using an excel template for site H or Shore Crest Canal and Little River Pocket park for the

Through the ability to manage and resolve local public affairs, local public authorities which have a high degree of financial autonomy will be able to work towards meeting the

Backbones, deploying IPv6 over IPv4 tunnels, deploying IPv6 over dedicated data links, deploying IPv6 over multiprotocol label switching (MPLS) backbones, and deploying IPv6 is