Boyton Primary School
ACCEPTABLE USE POLICY
The internet is an essential element of 21st Century life for education and social interaction. The purpose of internet use in school is to promote pupil achievement, to support the professional work of staff and to enhance the school’s management, information and business administration system. Benefits include:
The statutory curriculum requires pupils to learn how to locate, retrieve and exchange information using ICT. Consequently, in delivering the curriculum teachers need to plan to integrate the use of ICT and web based resources including email to enrich learning activities. Effective internet use is an essential life still.
Access to the school’s ICT network and use of ICT facilities owned by the school, including access to the internet, are conditional on observance of the following Acceptance Use Policy. The Aims of this Acceptable Use Policy are to:
General Internet use and consent
Pupils who are to have access to the internet must understand the basic conventions and navigation techniques before going online and accessing material.
Pupils must have returned a signed consent form before being allowed to use the ICT facilities that involve accessing the internet. The use of the names of pupils or photographs of pupils for the website will require written permission from parents/carers. If a picture is placed on website the child’s full name will not be displayed.
Pupils must not use the school ICT facilities without supervision of a member of staff. Although use of the ICT facilities and access to the internet will be supervised, and all possible measures will be taken (including the use of SWGfL service provider, filtering and firewall), Boyton Primary School cannot accept liability for the accessing of inappropriate materials or any consequences of internet access.
Boyton Primary School is protected by SWGfL filtering service and can be used as evidence in circumstances where a computer has been used to access such inappropriate material.
If staff or pupils discover unsuitable sites, the URL (address) and content must be reported to the ICT Technician or Co-ordinator immediately who will, in turn, record the address and report on to the headteacher and internet provider.
Pupils are aware that they must only access those services they have been given permission to use.
Staff and pupils are made aware that the use of computer systems without permission or for inappropriate purpose is a criminal offence (Computer Misuse Act 1990).
Log in and passwords
Pupils and staff must not disclose any password or login name given to anyone, or allow anyone else to use a personal account.
Pupils and staff must not attempt to gain access to the school network or any internet resource by using someone else’s account name or password.
Staff and pupils must ensure PC’s, mobile devices and laptops are logged off when left unattended.
Adult users are expected to be in charge of their own areas on the network. Passwords are therefore set for each user. Passwords should be over 4 characters and should contain letters, numbers and symbols.
General safety and risk assessment
The consumption of food or drink is forbidden whilst using computer. It is hazardous to the equipment and to individuals.
Users must treat with respect equipment and services in school and at other sites accessed through school facilities, and are subject to regulations imposed by the respective service providers. Malicious action will result in immediate suspension from use of the school facilities.
Staff are responsible for sharing the safety issues with their pupils.
The experience of being cyber bullied can be very painful for those who are the targets. Adults need to help children prepare for the hazards of using technology while promoting learning and social opportunities. Some forms of cyber bullying are different from other forms:
We recognise that the best way to deal with cyber bullying is to prevent it from happening in the first place. By embedding good, safe ICT practice into all our teaching and learning, incidents can be avoided.
We recognise we have a shared responsibility to prevent incidents of cyber bullying, the headteacher has the responsibility for co-ordinating and monitoring the implementation of anti-cyber bullying strategies.
Understanding Cyber bullying
The school community is aware of the definition of cyber bullying and impact of cyber bullying has.
As with all forms of bullying, the headteacher keeps records of cyber bullying. Incidents of cyber bullying will be followed up using the same procedure as other forms of bullying. However, we recognise to monitor internet use on a regular basis as a disincentive for bullies misusing school equipment and systems. The ICT technician will conduct regular use checks, log any concerns and inform the headteacher.
Children and staff are reminded of E-Safety Codes of Conduct. Any work or activity on the internet must be directly related to schoolwork. Children and parents are provided with e-safety sessions which are led in school.
Any work or activity on the internet must be directly related to schoolwork. Private use of the internet (including social networking sites) in school is strictly forbidden.
Staff are discouraged from being members of social networking sites. However, if staff are members they are reminded of the necessity to keep their profiles secure and to avoid contact with persons (particularly parents/pupils or ex-pupils) related to the school. Staff are reminded that any action or comment that brings the school or colleagues into disrepute or compromises pupil or staff confidentiality will be classed as a disciplinary matter.
Do no give personal email or postal addresses and telephone numbers of any person.
Under no circumstances give email or postal addresses/telephone numbers/fax numbers of any members of staff or pupils at school.
Do not download, use or upload any material that is copyright. Always seek permission before using any material from the internet. If in doubt, or you cannot obtain permission do not use the material.
Users should assume that all software is subject to copyright restrictions. Pupils must not, under any circumstances download or attempt to install any software on the school computers. Staff should seek the advice of the ICT technician or ICT Co-ordinator before attempting to download or upload software.
Under no circumstances should users view, upload or download any material that is likely to be unsuitable for children or schools. This applies to any material of violent, dangerous, racist or inappropriate sexual content. If users are unsure about this, or any materials, users must seek advice from the ICT co-ordinator. If in doubt, DO NOT USE. The transmission, storage, promotion or display of offensive, defamatory or harassing material is strictly forbidden as they breach the laws of the UK under the Computer Misuse Act. Possession of certain types of unsuitable material can lead to prosecution by the police.
Search engines (such as Google) are not to be used to search for websites or images unless the needs of the lesson specifically demands it.
School network and Pupil Files
Always respect the privacy of files of other users. Do not enter the file area of other users without obtaining their permission first. Files to be shared should be saved to the shared area. Pupils can access and save work to their own log on through the server. Do not modify or delete files of other users on the shared areas without obtaining permission from them first.
The ICT co-ordinator will view any material pupils store on the school’s computers. Storage space on the network is limited. All users are requested to ensure that old unused files are removed from their area at the end of each academic year. Users unsure of what can be safely deleted should ask the ICT co-ordinator for advice.
Users accessing software or any services available through school facilities must comply with licence agreements or contracts relating to their use and must not alter or remove copyright statements. Some items are licensed for educational or restricted use only.
Files stored on the network are backed up every evening. This means files can be restored if deleted or lost in error. However, if you create and delete files on the same day then a backup will not be available to restore. Backups are kept securely on the school site in a fire proof room.
It is important to save work regularly (approximately every 10 minutes). The network is reliable but problems do occur i.e. programs crash, power failures. If work is saved regularly and a PC or network does fail for any reason, only the work done since the last save will be lost.
Use your network area
Always ensure that files are saved to your network area, not on the local hard drive. This will ensure that your work is backed up and can be retrieved in the event of a hardware failure or theft.
The school cannot accept responsibility for personal documents held on school laptops, it is the responsibility of the user to back documents created at home.
Offsite pupil data and pupil information
Laptops, USB sticks, Ipads may be taken off site. Staff are to ensure that they are used cautiously when viewing pupil data/information and images and that devices are logged off when left unattended. Images must be transferred to the school network as soon as possible to be removed with the set timescales. Data, images and pupil information must be removed from backups and devices when pupils transfer to another class to avoid records being kept of pupils that are not taught by their former teacher.
All computers in school have anti-virus software, although very new viruses will not be found. If you suspect a virus please report it to the ICT Co-ordinator straight away.
Use of email and communication by email should be treated with the same degree of care that you take if you wrote a letter to the person that you are contacting by email. It cannot be regarded as purely private, only to be seen by the receiver. Email can be stored, forwarded and distributed to large numbers of people at the touch of a button. It is easy to forget that it is a permanent form of written communication and that material can be recovered even if seen to be deleted from the computer.
When using email, staff should:
Pupils are not permitted to bring mobile phones or devices into school. Should there be a need for a child to bring their device in to school this should be turned off and handed to the school office to look after during the school day and collected at 2.55pm.
Mobile phones may not be used to take pictures of pupils and staff (unless class camera provided by the school).
Any inappropriate use of mobile devices such as cyber bulling must be reported to the headteacher.
Staff should only use their mobile phones at appropriate times of the day e.g. break times. During the school day their mobiles should be turned off or set to silent. Staff must not use personal mobile devices or cameras to take images of pupils or staff.
On receipt of the IPad staff are required to read and sign the ‘Staff Mobile Device Policy’. Staff should not leave the device unattended and must be kept secured when not in use.
Should a member of staff leave the employment of the school, the device must be returned in its original box.
IPods/Apple Macs are located in the ICT cupboard which must be locked at all times, the key is located in the office. Equipment must be booked in and out and after use should be charged for the next class to use them.
Users must agree to comply with all software license agreements. Do not attempt to copy any software from, or by using school computers. If you have any requirements for using additional software for any reason, please contact the ICT co-ordinator to discuss. Computer facilities shall not be used to hold or process personal data except in accordance with the provisions of the Data Protection Act 1984. Any person wishing to use the facilities for such a purpose is required to inform the headteacher in advance and comply with any restrictions that the school or the UK Data Protection Registrar may impose concerning the manner in which data may be held or proceed.
Copyright Designs and Patents Act – copyright is infringed if a person acquires an unauthorised copy of a computer program. Mere acquisition, without regard to the actual or intended use, constitutes an infringement of the author’s copyright. ‘Acquisition’ includes loading a copy of a programme into the random access memory, or other temporary storage device, of a computer, or onto another form of permanent data storage medium.
The high cost of commercially marketed software and the ease with which it can be copied make it tempting to copy software illegally. Agents for software developers are aggressively seeking to protect their rights under the law. Schools can be audited at any time. Anyone found to have unauthorised copies of software will immediately be suspended from using IT facilities. The matter will be investigated and the necessary action taken, the school will not accept any liability.
‘Hacking’ is illegal under the Computer Misuse Act 1990. Regulations regarding unauthorised access or misuse of computing facilities are enforceable under the law, any person found attempting to or hacking the school network will be prosecuted.
Regulations regarding the transmission, storage or display or obscene material are enforceable by law under the Criminal Justice and Public Order Act 1984 which amends the Obscene Publications Act 1956, the Protection of Children Act 1978 and the Telecommunications Act 1984 to extend their provisions to transmission over a data communications network.
If staff break the rules as laid down in this policy they will lose temporary or permanent use of the school systems and may be subject to disciplinary proceedings. If the law has been broken the police will be informed and the school will assist the police with any prosecution.
Video conferencing and webcams
The use of webcams to video conference will be via SWGfL which is a filtered service. Publicly accessible webcams are not used in our school setting. Taking images via a webcam should follow the same procedures as taking images with a digital or video camera.
Permission should be sought from parents/carers if their child is engaged in video conferencing with individuals or groups outside of the school. This process should always be supervised by a member of staff.
Managing allegations against adults who work with children and young people
Allegations made against a member of staff should be reported to the headteacher. In the event of an allegation being made against the headteacher, the Chair of Governors should be notified immediately.
Disciplinary Procedure for all school based staff
In the event that a member of staff may be seen to be in breach of behaviour and good conduct through misuse of online technologies, this policy outlines the correct procedures for ensuring staff achieve satisfactory standards of behaviour and comply with the rules of the governing body.
Please be aware, at such time that you leave Boyton Primary School, your user account and any associated files, your email address and any associated emails will be removed from the school system and will no longer be accessible. The school cannot continue to receive emails sent to your email address.
Named Personnel: Darren Humphries
Governor for ICT: Darren Humphries
The person responsible for E-safety and Acceptable ICT Use: Antony Fugill
ICT Co-ordinator: Antony Fugill
Child Protection Officers: Lucinda Cummings, teacher.
Acceptable Use Agreement for Staff, Governors and Volunteers
All adults within the school must be aware of their safeguarding responsibilities when using any online technologies, such as the internet, email or social networking sites. They are asked to sign this agreement so that they provide an example to children and young people for the safe and responsible use of online technologies. This will educate inform and protect adults so that they feel safeguarded from any potential allegations or inadvertent misuse themselves.
Signed: _______________________________________Date: _________
Name (printed): ________________________________