{"id":60,"date":"2010-09-21T10:15:50","date_gmt":"2010-09-21T10:15:50","guid":{"rendered":"http:\/\/www.kegs-it.org.uk\/wordpress\/?page_id=60"},"modified":"2013-04-24T10:13:31","modified_gmt":"2013-04-24T09:13:31","slug":"internet-acceptable-use-policy","status":"publish","type":"page","link":"https:\/\/it.kegs.org.uk\/?page_id=60","title":{"rendered":"Internet Acceptable Use Policy"},"content":{"rendered":"<p><strong>(This document complements the School\u2019s IT Acceptable Use Policy)<\/strong><br \/>\n<strong>Approved by Governors Curriculum Committee 21 October 2010<\/strong><br \/>\n<strong>Review Autumn 2013<\/strong><\/p>\n<p><strong>1\u00a0\u00a0 \u00a0Introduction<\/strong><br \/>\nThe Internet, in many guises, offers extensive potential to our educational endeavours. The Governing Body endorses and encourages the widespread use of Information Technology in learning and teaching.<\/p>\n<p>The main reason that we provide Internet access to our teaching staff and students is to promote educational excellence by facilitating resource sharing, innovation, and communication.\u00a0 However, for both students and teaching staff, Internet access at school is a privilege and not an entitlement. The Governing Body will not object to the reasonable use of IT systems for personal activities or recreational purposes.\u00a0 It must be for staff to use their common sense as to what is reasonable and if they are in any doubt to seek guidance from the appropriate manager.\u00a0 Activities such as gaming or online gambling are considered inappropriate and as such could lead to disciplinary action.<\/p>\n<p>Unfortunately there is the possibility that students will encounter inappropriate material on the Internet. The School will actively take all reasonable precautions to restrict student access to both undesirable and illegal material. Teaching staff are responsible for guiding students in their on-line activities, by providing clear objectives for Internet use.\u00a0 Teaching staff will also ensure that students are aware of what is regarded as acceptable and responsible use of the Internet.\u00a0 The main goal is to utilise Internet access to enrich and extend those learning activities that reflect the curriculum requirements and the age and maturity of the students.<\/p>\n<p><strong>2\u00a0\u00a0 \u00a0Whole-school network security strategies<\/strong><br \/>\nThe School\u2019s computer network security systems are reviewed regularly.<\/p>\n<p>All access to the School network requires entry of a recognised username and password.\u00a0 Staff and students must log out after every network session and must not disclose these details to anyone, nor try to use any other person\u2019s username\/password.\u00a0 No user must access, copy, remove or otherwise alter any other user\u2019s files, without their express permission.<\/p>\n<p>The School may monitor usage of IT systems, email and other digital communications to ensure they are being used in a responsible manner, to ensure there is no risk to users\u2019 safety or to the safety and security of the IT systems. Unapproved software and executable files must not be stored in staff or student storage areas.<\/p>\n<p>The School has the responsibility to provide safe and secure access to technologies. When using personal handheld\/external devices (including PDAs, laptops, mobile phones, USB devices) in school, users will follow the rules set out in this policy, as well as any additional rules set by the School about such use.\u00a0 Any such devices must be protected by up-to-date anti-virus software and free from viruses.<\/p>\n<p><strong>2.1\u00a0\u00a0 \u00a0Hardware and software infrastructures<\/strong><br \/>\nThe School uses the following strategies to reduce risks associated with the Internet:<br \/>\n\u2022\u00a0\u00a0 \u00a0Proxy server \u2013 in conjunction with a web management system<br \/>\n\u2022\u00a0\u00a0 \u00a0Client Server network \u2013 in conjunction with an information and web management system<br \/>\n\u2022\u00a0\u00a0 \u00a0Filtering software<br \/>\n\u2022\u00a0\u00a0 \u00a0Firewall \u2013 that has been configured to prevent access to inappropriate websites.<\/p>\n<p>The School uses virus protection which is updated regularly.\u00a0 However, files downloaded (e.g. images or software) from the Internet &#8211; or the opening of email attachments &#8211; from anywhere other than well-trusted sources can be a cause of virus infection.\u00a0 Infection of the School\u2019s IT systems, either intentionally, or through neglect of reasonable care could lead to disciplinary action.<\/p>\n<p><strong>2.2\u00a0\u00a0 \u00a0Classroom management structures<\/strong><br \/>\nComputers are positioned in such a way that monitors are easily observed by Teaching staff.<\/p>\n<p><strong>3\u00a0\u00a0 \u00a0Risk assessment and management of Internet content<\/strong><br \/>\nAll students are taught effective online research techniques.\u00a0 These include:<br \/>\n\u2022\u00a0\u00a0 \u00a0Ensuring the validity, currency and origins of the information accessed or received;<br \/>\n\u2022\u00a0\u00a0 \u00a0Using alternative sources of information for comparison purposes;<br \/>\n\u2022\u00a0\u00a0 \u00a0Identifying an author\u2019s name, date of revision of the materials, and possible other links to the site;<br \/>\n\u2022\u00a0\u00a0 \u00a0Respecting copyright and intellectual property rights.<\/p>\n<p>When using the internet in a professional, educational or school sanctioned personal capacity, permission must be obtained to use the original work of others.\u00a0 Copyrighted, material must not be copied, downloaded or distributed.\u00a0 In conjunction with the data protection policy, staff and student data will be kept private and confidential, except where it is required by law or by school policy to disclose such information to an appropriate authority.<\/p>\n<p>Staff and students will be made aware of the risks to which they may be exposed while on the Internet.\u00a0\u00a0 They will be shown how to recognise and avoid the negative areas of the Internet such as pornography, violence, racism and exploitation of children.\u00a0 However, if they encounter such material they will know that they should report the incident to the nearest teacher or a member of IT Services who will deal with it according to the School AUP.\u00a0 Materials which are illegal, inappropriate or which may cause distress to others must not be uploaded, downloaded or accessed.<\/p>\n<p><strong>4\u00a0\u00a0 \u00a0Regulation and guidelines<\/strong><br \/>\nThe School\u2019s Internet access incorporates a filtering system, as well as pre-filtered content via Essex County Council provision to block certain chat rooms, newsgroups, and inappropriate websites.\u00a0 The filtering system used on the School network aims to achieve the following:<br \/>\n\u2022\u00a0\u00a0 \u00a0Access to inappropriate sites is blocked.<br \/>\n\u2022\u00a0\u00a0 \u00a0The content of web pages or web searches is dynamically filtered for unsuitable words.<br \/>\n\u2022\u00a0\u00a0 \u00a0A rating system is used to rate web pages for inappropriate content and that the web browsers are set to reject these pages.<\/p>\n<p>The School&#8217;s Network Manager regularly assesses the effectiveness of the filtering system.\u00a0 The School\u2019s filtering strategy depends on the age and curriculum requirements of each class. The School will immediately report the details of any inappropriate or illegal Internet material found.<\/p>\n<p><strong>4.1\u00a0\u00a0 \u00a0E-mail<\/strong><br \/>\nThe School may use an e-mail distribution list to send messages to selected groups of users.<\/p>\n<p>Students should not reveal their own or other people\u2019s personal details, such as addresses or telephone numbers or arrange to meet someone outside school via the School network.<\/p>\n<p>Users should not open any attachments to e-mails, unless the source is known and trusted, due to the risk of the attachment containing viruses or other harmful programs.<\/p>\n<p>E-mail must not be used to propagate offensive or inappropriate material in any way, even if such material was not sourced from the School\u2019s systems.\u00a0 This includes \u2018spam\u2019 messages whereby multiple unsolicited messages or unwanted material are sent in an effort to congest a recipient\u2019s mailbox or to harass or stalk the recipient.\u00a0 Students should immediately report any offensive e-mails that they receive to a or a member of IT staff.<\/p>\n<p><strong>4.2\u00a0\u00a0 \u00a0The School\u2019s website<\/strong><br \/>\nAll content on the website is copyright of the School. It must not be copied or reproduced without our express permission in writing from the headteacher. The School is not responsible for content of external websites, even if we provide links to those sites.<\/p>\n<p>We will not associate a photograph of a pupil with their name.\u00a0 We may publish childrens&#8217; names on the site and we may publish photographs containing their image, but it will never be possible to identify a child&#8217;s name from the photograph. We operate an &#8220;opt out&#8221; policy for any parent or guardian who does not wish their children&#8217;s image to appear on the web site. Parents wishing to opt out must confirm this in writing to the headteacher.<\/p>\n<p><strong>4.3\u00a0\u00a0 \u00a0Social networking sites, blogs and chat rooms<\/strong><br \/>\nKEGSNet (the School\u2019s VLE &#8211; Virtual Learning Environment) is the preferred method of interacting electronically with students.<\/p>\n<p>Use of external resources (such as blogs and social networking sites) must be undertaken with planning and care with regard to the age of students and the suitability of the site, to ensure that the privacy of students is not compromised, and that students are not exposed to bullying. It is also the responsibility of the teacher to moderate material placed online if the facility is provided as a school resource.\u00a0 If the teacher is in any doubt as to the appropriateness of such use they should consult IT staff in the first instance.<\/p>\n<p>Inappropriate use of networking sites (such as Facebook) will be held to be under the school\u2019s jurisdiction in the case of any actions which impact on members of the KEGS community (such as bullying), irrespective of whether or not such inappropriate use took place on or off the school premises.<\/p>\n<p><strong>4.4\u00a0\u00a0 \u00a0Other communication technologies (see also mobile phones and portable electronics policy)<\/strong><br \/>\nStudents are not allowed to use mobile devices during lessons or formal school time.\u00a0 The use of any personal handheld\/external devices (whether for music, data storage, or communication) is at the discretion of the teacher in charge.\u00a0 It is forbidden to send abusive or otherwise inappropriate text messages.\u00a0 Personal equipment should not be used to record sound or images unless prior permission has been given.\u00a0 Staff must not engage in any online activity that may compromise their professional responsibilities.<\/p>\n<p>For their own protection, staff should only communicate with students and parents\/carers using school systems.\u00a0 Use of personal communication systems could be misconstrued.<\/p>\n<p><strong>5\u00a0\u00a0 \u00a0Communicating the School\u2019s AUP<\/strong><br \/>\n<strong>5.1\u00a0\u00a0 \u00a0Informing students<\/strong><br \/>\n&#8216;Code of Practice&#8217; posters will be displayed near all networked computer systems.\u00a0 Students will be informed that their Internet use is monitored and be instructed on safe and responsible use of the Internet.<\/p>\n<p><strong>5.2\u00a0\u00a0 \u00a0Informing staff<\/strong><br \/>\nAll staff will be provided with a copy of the School\u2019s Acceptable Use Policy.\u00a0 Teaching staff are aware that Internet traffic can be monitored and traced to an individual user.\u00a0 Staff will be consulted regularly about the development of the School\u2019s Acceptable Use Policy and instructions on safe and responsible Internet use.\u00a0 To avoid misunderstandings teaching staff should contact IT staff regarding they are in any doubt about the legitimacy of any use of the internet.\u00a0 Teaching staff will be provided with information on &#8216;copyright and the Internet&#8217; issues that apply to schools.<\/p>\n<p><strong>5.3\u00a0\u00a0 \u00a0Informing parents \/ carers<\/strong><br \/>\nParents\u2019 attention will be drawn to the School AUP by letter, in the School newsletter and on the School\u2019s website.\u00a0 Advice that accords with acceptable and responsible Internet use by students at home will be made available to parents.<\/p>\n<p><strong>6\u00a0\u00a0 \u00a0Responsibility<\/strong><br \/>\nAll users are responsible for their actions both in and out of school.\u00a0 This internet acceptable use policy applies not only to work and use of school IT equipment in school, but also applies to the use of school IT systems and equipment out of school, and the use of personal equipment in school or in situations related to the School.\u00a0 Failure to comply with this acceptable use policy could be subject to disciplinary action.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>(This document complements the School\u2019s IT Acceptable Use Policy) Approved by Governors Curriculum Committee 21 October 2010 Review Autumn 2013 1\u00a0\u00a0 \u00a0Introduction The Internet, in many guises, offers extensive potential to our educational endeavours. The Governing Body endorses and encourages the widespread use of Information Technology in learning and teaching. The main reason that we [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":18,"menu_order":1,"comment_status":"open","ping_status":"open","template":"","meta":{"_links_to":"","_links_to_target":""},"_links":{"self":[{"href":"https:\/\/it.kegs.org.uk\/index.php?rest_route=\/wp\/v2\/pages\/60"}],"collection":[{"href":"https:\/\/it.kegs.org.uk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/it.kegs.org.uk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/it.kegs.org.uk\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/it.kegs.org.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=60"}],"version-history":[{"count":5,"href":"https:\/\/it.kegs.org.uk\/index.php?rest_route=\/wp\/v2\/pages\/60\/revisions"}],"predecessor-version":[{"id":625,"href":"https:\/\/it.kegs.org.uk\/index.php?rest_route=\/wp\/v2\/pages\/60\/revisions\/625"}],"up":[{"embeddable":true,"href":"https:\/\/it.kegs.org.uk\/index.php?rest_route=\/wp\/v2\/pages\/18"}],"wp:attachment":[{"href":"https:\/\/it.kegs.org.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=60"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}