The Heath A STEM Centre of Excellence and Leadership Development School ICT Acceptable Use Protocol Introduction The statutory curriculum requires students to learn how to locate, retrieve and exchange information using information and communications technology (ICT). In delivering the curriculum, teachers need to plan to integrate the use of communications technology such as web-based resources and e-mail. In addition to this the development of online learning resources across the curriculum and the use of new technology in schools to enhance the learning experience and engage students mean that students are regularly engaged in activities which involve the use of ICT. Computer skills are vital to access life-long learning and employment; indeed we must consider ICT a life-skill. The purpose of Internet use in The Heath School is to raise educational standards, to promote student achievement, to support the professional work of staff and to enhance the school’s management information and business administration systems. The Internet is an essential element in 21st Century life for education, business and social interaction. The school has a duty to provide students with quality Internet access as part of their learning experience. Aim The aim of this Acceptable Use Protocol (AUP) is to ensure that students will benefit from learning opportunities offered by the school’s Internet resources in a safe and effective manner. Internet use and access is considered a school resource and privilege. Therefore, if the school’s AUP is not adhered to this privilege will be withdrawn and appropriate sanctions will be imposed. The Internet and Learning The Internet will enhance students’ educational opportunities at The Heath School. Students, through Halton Local Authority infrastructure, can access the North West Learning Grid and the Joint Academic Network and take advantage of searching the World Wide Web and using e-mail. Benefits to Learning: 1 Access to world-wide educational resources including museums and art galleries; Communication and collaboration between students and schools; Transfer of information between students and schools; Educational and cultural exchanges between students world-wide; Cultural, vocational, social and leisure use in libraries, clubs and at home; Access to experts in many fields for students and staff; Staff professional development through access to national developments, educational materials and good curriculum practice; Communication with support services, professional associations and colleagues; Improved access to technical support including remote management of networks; Exchange of curriculum and administration data with the LEA and DfES. School Strategy The school will employ a number of strategies in order to maximise learning opportunities and reduce risks associate with the Internet. These strategies are as follows: General Internet sessions during lesson time will always be supervised by a teacher. Adult supervision will be in place in the vicinity of student internet activity at breaktimes and other non-teaching times Filtering software and /or equivalent systems will be used in order to minimise the risk of exposure to inappropriate material. The school will regularly monitor students’ Internet usage. Students and teachers will be provided with training in the area of Internet safety. Uploading and downloading of non-approved software will not be permitted. Virus protection software will be used and updated on a regular basis. The use of personal USB devices in school requires a teacher’s permission. Students will observe good “netiquette” (i.e., etiquette on the Internet) at all times and will not undertake any actions that may bring the school into disrepute. Supply teachers are not granted access to ICT. Using the Internet in the Curriculum Initially, students will be educated about the Internet, and its use, in ICT lessons. During these sessions students will be taught research techniques including the use of subject catalogues and search engines. They should be encouraged to question the validity, currency and origins of information – key information handling skills. They should also use alternative sources of information for comparison purposes. They will also be educated to follow sensible rules for personal safety. Internet access will be planned to enrich and extend learning activities. Access levels will be reviewed to reflect the curriculum requirements and age of students. The Internet will also be used in other subject areas in addition to ICT either directly or through resources located on the school’s Virtual Learning Environment (VLE). The VLE will provide access to specific curriculum resources with an identified learning outcome and revision materials. Interactive forums will offer the opportunity for learners to collaborate on school work and access learning materials outside of the classroom wherever they have access to the Internet. Use of the VLE will be via an individual username and password and all students will receive an induction into its use. Risk Assessment of Internet Materials As the quantity and breadth of the information available through the Internet continues to grow The Heath School realise that it is not possible to guard against every undesirable situation. However, in common with other media such as magazines, books and video, some material available via the Internet is unsuitable for students. The school will take all reasonable precautions to ensure that users access only appropriate material. However, due to the international scale and linked nature of Internet content, it is not possible to guarantee that unsuitable material will never appear on a school computer. Neither the school nor HBC can accept liability for the material accessed, or any consequences of Internet access. However, The Heath School will ensure that the methods used to identify, assess and minimise risks will be reviewed regularly. Similarly, staff, parents, and HBC will work to establish agreement that every reasonable measure is being taken. World Wide Web 2 Students will not visit Internet sites that contain obscene, illegal, hateful or otherwise objectionable materials. Students will use the Internet for educational purposes only. Students will be familiar with copyright issues relating to online learning. Students will never disclose or publicise personal information. World Wide Web (Cont’) Students will be aware that any usage, including distributing or receiving information, school-related or personal, may be monitored for unusual activity, security and /or network management reasons. Students will report any concerns or inappropriate materials to their teacher or the supervising member of staff. Students will not engage in illegal file sharing, including exchange or distribution of copyrighted, illegal or otherwise inappropriate material. Email Students will use approved class email accounts under supervision by or permission from a teacher. Students will not send or receive any material that is illegal, obscene, defamatory or that is intended to upset, annoy or intimidate another person. Students will not reveal their own or other people’s personal details, such as addresses or telephone numbers or pictures. Students will never arrange a face-to-face meeting with someone they only know through emails or the Internet. Students will note that sending and receiving email attachments is subject to permission from their teacher. Internet Chat Students will only have access to chat rooms, discussion forums or other electronic communication forums that have been approved by the school. Chat rooms, discussion forums and other electronic communication forums will only be used for educational purposes and will always be supervised. Usernames will be used to avoid disclosure of identity. Face-to-face meetings with someone organised via Internet chat will be forbidden. Mobile Internet Technologies Students will only use mobile internet hardware e.g. laptops, PDA’s, webcams, digital cameras, under supervision and for legitimate subject related learning. Where students are issued with mobile technologies to support learning for a specific project these may be subject to a separate home/school agreement. Digital Media/Image Capture and Storage The use of digital media to capture and transfer images (camera phones or PDA’s) is forbidden unless authorised by a member of staff and deemed appropriate technology for the planned learning activity. No information, image or digital video footage, gathered within The Heath or at a Heath event, is to be posted onto the internet without permission from the Principal. Images captured by staff or students must be used for an authorised purpose and not stored on personal devices. The use of digital media as a form of evidence to assess learning may be used in curriculum areas. This will only be shared with the relevant assessment bodies. School Computers/Network 3 Users will not install any software without explicit permission. Users will not engage in any activity that compromises the security of the network. Users are to immediately report any damage or faults involving equipment or software, however this may have happened. Users will not try to obtain other peoples personal information or passwords or access confidential data through hacking, use of malware or any other means. Mobile Phone Protocol The use of mobile phones is not allowed at The Heath – however, it is understood that some students may carry them so that they can contact home after school. In this case the phone must be switched off throughout the school day including break and lunch time and kept out of sight at all times. If parents wish to contact their child during the day then they should phone school and a message will be passed to their child. If a phone is seen or heard it will be confiscated, taken to the front office, recorded, locked away and returned on Friday afternoon at 3.30 pm. If a phone is confiscated on a Friday, it will be returned on the following Friday. This protocol has become necessary due to problems arising from widespread use of mobile phones in schools throughout the country. These have included the spreading of illegally taken images, illegal videoing and cyber-bullying. These can cause great distress in addition to the obvious interruption to teaching and learning. School Website Students will be given the opportunity to publish projects, artwork or school work on the World Wide Web. The publication of student work will be co-ordinated by a teacher. Students’ work will appear in an educational context on Web pages with a copyright notice prohibiting the copying of such work without express written permission. Digital photographs, audio or video clips may be published on the school website as a record or celebration of events. Personal student information including home address and contact details will be omitted from school web pages. Students will continue to own the copyright on any work published. The school will inform students and parents of key support structures and organisations that deal with illegal material or harmful use of the Internet. Virtual Learning Environment (VLE) The VLE (called IZONE) will allow students access to an online portal where they can store work, access curriculum resources and collaborate with other learners Individual user accounts will be issued to students which must be kept secure All activity through the portal can be traced to individual accounts The VLE can be accessed outside of school wherever an internet connection is available Students should not post any comments that may be found offensive or inappropriate on any areas of the VLE How will ICT system security be maintained? The Heath School realise that it is important to review the security of the whole system, from user practice to Internet service provider (ISP). At the simplest level, occasional checks on user’s files, temporary Internet files and history files can reveal potential mischief. A number of agencies can advise on systems security including LEA support teams and suppliers. However, review of external agencies’ opinions on systems security raises the following issues for further discussion: Local Area Network (LAN) security issues include: 4 The user must act reasonably. Loading non-approved software could cause major problems. Good password practice is required including logout after use. Cabling should be secure and wireless LANs safe from interception. Servers must be located securely and physical access restricted. The server operating system must be secured to a high level. Virus protection for the whole network must be installed and current. Wide Area Network (WAN) security issues include: All external connections must be assessed for security risks including the wide area network connection and any modems staff may wish to use. Firewalls and routers should be configured to prevent unauthorised use of software such as FTP and Telnet at the protocol level. Decisions on security made by external agencies such as the LEA or ISP must be discussed with schools. Third-party security testing should be considered. The Internet is a connection to the outside world that could compromise system performance or threaten user or system security. The downloading of large files such as video and MP3 can compromise system performance. A WAN connection introduces further risks such as students trying to access another school. However it also brings the opportunity for industrial strength security in the form of hardware firewalls and the expertise to design and operate them. Therefore: The school ICT systems will be reviewed regularly with regard to security. Virus protection will be installed and updated regularly. E-Safe software is installed on the school network, this will track and monitor all student activity and will protect against risks associated with internet use Security strategies will be discussed with the LEA, particularly where a wide area network connection is being planned. Personal data sent over the Internet will be encrypted or otherwise secured. Personal USB devices may not be used in school without specific permission from the teacher and a virus check. Unapproved system utilities and executable files will not be allowed in students’ work areas or attached to e-mail. Files held on the school’s network will be regularly checked. The ICT co-ordinator/network manager will ensure that the system has the capacity to take increased traffic caused by Internet use. Handling Complaints Responsibility for handling incidents will be given to a senior member of staff through the faculty line manager hierarchy in The Heath School. Students will be informed of the process and parents and students will work in partnership to resolve any issue. Any students found to be infringing the conditions laid down in the Conditions of Acceptable Use Protocol will be initially referred to the Head of ICT and, subsequently, dealt with by the school’s sanctions procedures. Misuse of the Internet may result in disciplinary action, including written warnings, withdrawal of access privileges and, in extreme cases exclusion. The school also reserves the right to report any illegal activities to the appropriate authorities. Legislation The school will provide information on the following legislation relating to use of the Internet which teachers, students and parents should familiarise themselves with: 5 Data Protection (Amendment) Act 2003 Child Trafficking and Pornography Act 1998 Interception Act 1993 Video recordings Act 1989 The Data Protection Act 1988 Student name ______________________________ Date of birth _______________________ Student responsibility code for all ICT, digital and electronic resources in school As members of the school community we each have responsibility for our own behaviour and to recognise that at times it can impact on other people. Digital and electronic resources give huge opportunities for learning but in sharing network and internet access all users must accept responsibility for their own behaviour so that all students are kept safe and within legal guidelines. The student responsibility code is a summary of what The Heath School considers to be student responsibilities with regards e-safety but for full details of our policy please consult the Acceptable Use Protocol. It is my responsibility to: Keep my username and password details secure and only known to me Use computers, recording equipment, mobile devices and the internet specifically for the purpose of the lesson or learning activity Listen to the advice and instruction given by my teachers relating to all activities using ICT, digital and electronic resources and follow those instructions Avoid giving out my personal details or those of my friends online such as name, age, address etc. Report any incidence of cyber-bullying, against either myself or a friend to a teacher or mentor Use the School network files and Learning Platform/VLE responsibly and make sure that school materials are not downloaded or circulated elsewhere on the web Protect the school network by not downloading video, music, software or other inappropriate material onto machines from the internet or from a portable disk drive Inform people if I am filming or audio recording them in any way or where it is a group shot involving lots of people to make sure that individuals are not individually identifiable Make sure that I do not offend others by producing offensive materials which contain abusive, coercive, defamatory, blasphemous, pornographic, obscene or racist language or images. Ensure that all materials I use are within copyright laws, if I am not sure I must ask permission from the school Make sure that my mobile phone is not switched on or visible during school hours unless I have been specifically requested to use it for a learning activity by a teacher. If my phone is seen or heard I understand that it will be confiscated, taken to the front office, recorded, locked away and returned on Friday afternoon at 3.30 pm Use school resources appropriately outside of timetabled lessons and always for school related activities Inform my teachers or an adult that I trust if I encounter anything or if anyone approaches me or asks me to do anything I am not comfortable with via digital or electronic means. I accept the terms of the student responsibility code and agree to abide by it: Name of student: ________________________________ Date: ___________________ 6 Signed: _______________________________ student Staff responsibility code for all ICT, digital and electronic resources in school Digital and electronic resources give huge opportunities for learning but in sharing network and internet access all users must accept responsibility for their own behaviour so that all students and staff are kept safe and within legal guidelines. The staff responsibility code is a summary of the key features of our policy but for full details please consult the Acceptable Use Policy. It is my responsibility to: Keep my username and password details secure and only known to me. Use the School network files and Learning Platform/VLE responsibly and make sure that school materials are not downloaded or circulated elsewhere on the web without agreement from the school. Ensure that all digital images are stored on a shared drive Protect the school network by not downloading video, music, software or other inappropriate material onto machines from the internet or from a portable disk drive and ensure that students I am responsible for or supervising do the same Use my laptop, school e-mail account and internet access for work related purposes only except in the case of designated break times when appropriate personal use is acceptable Use school media equipment only for school related purposes Use only school owned hardware to capture images of students When publishing work on the internet make sure that only the first name of the student is used Ensure that no student or other unauthorised person has access to confidential files or information stored on my laptop Inform people if I am filming or audio recording them in any way or where it is a group shot involving lots of people to make sure that individuals are not individually identifiable Control levels of access to any resources I personally upload to the VLE according to the age and ability levels of the students they are aimed at Make sure that I do not offend others by producing offensive materials which contain abusive, coercive, defamatory, blasphemous, pornographic, obscene or racist language or images. Ensure that I do not seek out materials in the categories above using my staff laptop or internet access Ensure that all materials I use are within copyright laws, if I am not sure I must ask permission from the school Make myself aware of the protocols relating to cyber-bullying and child protection related to internet and use of digital media Inform my line manager if something I am concerned about occurs during a lesson or whilst students are using digital and electronic equipment Keep all data secure which could identify a child through a combination of their name with date of birth, address, phone number etc and where I have a work related requirement to download this data to use an encrypted memory stick available to borrow from the Systems Manager. I accept the terms of the staff responsibility code and agree to abide by it. Name: __________________________________ Signature:________________________________ To be returned to Trish Jordan in the office 7 Date: _____________ Staff – Internet Usage Staff will be responsible for all web content viewed from their appointed workstation. The following uses are considered unacceptable: Illegal Activities Staff will not attempt to gain unauthorised access to any other computer system through or go beyond the school authorised access account. This includes attempting to log in through another person’s account or access another person’s files. These actions are illegal, even if only for the purpose of “browsing”. System Security Staff are to seek advice when downloading programmes or files from the ICT co-ordinator. All Internet access logs will be reviewed daily and may, at a later date, be regularly published to the administration intranet for whole staff consumption. All E-mail sent via the administration E-mail system (i.e. heathschool.org.uk) will be monitored. Inappropriate Language Restrictions against Inappropriate Language apply to public messages, private messages and material posted on Web pages. When acting in an official capacity on behalf of the school, or using the school e-mail accounts, the following points are to be noted. Staff will not use obscene, profane, vulgar, rude, inflammatory, threatening or disrespectful language. Staff will not post information that could cause damage or a danger of disruption. Staff will not engage in personal attacks, including prejudicial or discriminatory attacks. Staff will not harass another person. Harassment is persistently acting in a manner that distresses or annoys another person. Staff will not knowingly or recklessly post false or defamatory information about a person or organisation. Respect for Privacy Staff will not repost a message that was sent to you privately without permission of the person who sent you the message. Staff will not post private information about another person. Plagiarism and Copyright Infringement Staff need to be aware of copyright laws with regards to information on the World Wide Web. The same precautions are to be taken with information from the World Wide Web as those of print. When in doubt, contact the Webmaster of the site you seek information from. Inappropriate Access to Material You will not use administration workstations to access material that is profane or obscene (pornography), that advocates illegal acts, or that advocates violence or discrimination towards other people (hate literature). A special exception may be made for hate literature if the purpose of your access is to contact research. 8 Due Process The school will co-operate fully with local officials in any investigation related to any illegal activities conducted through the school system. Working with Children Under no circumstances should a pupil be allowed to use an administration workstation. Non-Work Related Material During designated break periods and only designated break periods the administration workstations may be used to access non-work related material (as long as it does not contradict any of the previous rules). I have read and understood the above document. Signed: ……………………………………………………………………………………………………………. Print name : ………………………………………………………………………………………………… Date: ………………………………………………………. Return to Trish Jordan who will maintain this declaration as evidence of your acceding to the internet usage policy 9