st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web...

25
St Mary’s Catholic Voluntary Primary Academy, St Oswald’s Catholic Academy Trust Acceptable Use of ICT and the Internet Policy July 2016 - September 2018 1

Transcript of st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web...

Page 1: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

St Mary’s Catholic Voluntary Primary Academy,St Oswald’s Catholic Academy Trust

Acceptable Use of ICT and the Internet Policy

July 2016 - September 2018

(To be reviewed annually or as required)

C A Ruddy, Head Teacher

1

Page 2: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

St Mary’s Catholic Voluntary Primary Academy’s Acceptable Use Policy

In order to exploit the many educational and social benefits of new technologies, learners need opportunities to create, collaborate and explore in the digital world, using multiple devices from multiple locations. At times, they will encounter risks. We now recognise, however, that e-safety (now Internet Safety) risks are posed more by behaviours and values online than the technology itself. Our approach must therefore shift: rather than restricting access to technology, we need to empower learners to develop safe and responsible online behaviours to protect themselves whenever and wherever they go online. AUPs, when embedded within a wider framework of e-safety measures (consisting of policies, infrastructure, education and standards3 ), can help to promote the positive behaviours needed.

BECTa - AUPs in Context 2009

Child Safeguarding Statement

In order to create a safe teaching and learning environment, effective policies and procedures which are clearly understood and followed by the whole school community are essential. This Acceptable Use Policy sets out the roles, responsibilities and procedures for the safe and appropriate use of all technologies to safeguard adults, children and young people within our school. The policy recognises the ever changing nature of emerging technologies and highlights the need for regular review to incorporate developments within ICT/Computing.

BECTa says:

E-safety (now Internet Safety) risks have traditionally been classified as those involving content, contact and commerce. When online, for example, children may be exposed to inappropriate content which may upset or embarrass them, or which could potentially lead to their involvement in crime and anti-social behaviour. Some people use the internet to groom children with the ultimate aim of exploiting them sexually, while ICT offers new weapons for bullies who may torment their victims, for instance using websites or text messages.

This is recognised within St Mary’s Child Protection Policy and the advice in this policy must also take into account the responsibilities staff are given through the school’s Child Protection policy.

‘Safeguarding and promoting the welfare of children is everyone’s responsibility. In order to fulfil this responsibility effectively, all professionals should make sure their approach is child centred. This means that they should consider, at all times, what is in the best interests of the child.’

St Mary’s CP Policy

This Acceptable Use Policy must also be read in conjunction with the Safeguarding policy, the Child Protection Policy, the Bullying Policy, and the Social Media Policy.

Who Will Write and Review the Policy?

Our school internet policy has been created by the school Computing subject leader using information from BECTa, previous school Acceptable Use Policies and Government guidance. It has been discussed by the whole staff and approved by the governors, who

2

Page 3: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

realise how intrinsic to the running of the school, both at a management level and an educational level, Computing and the internet is. The policy will be reviewed annually or as required throughout the school year to complywith updated guidance.

Why Have this Policy?

Computing is increasingly used as a tool to access the curriculum and for children to create work. Both staff and children need to be equipped in order to attain in a digital world. The children need to be skill capable and able to adapt to new advances in technology.

The internet is now the most data rich source of information in the world. It can potentially “bring the world into the classroom”. From a teaching point of view this is an essential resource for planning and delivering lessons. From a child’s point of view, it is an excellent source of information that enhances the personal learning agenda.

This policy seeks to ensure users know what good practise is and outlines steps and procedures that will be taken when the darker side of the internet shows itself.

Internet Safety- Roles and Responsibilities

As internet safety is an important aspect of strategic leadership within the school, the Head and Governors have ultimate responsibility to ensure that the policy and practices are embedded and monitored. The named Internet Safety Coordinator in this school is Mrs L Phelps, who has been designated this role as a member of the senior leadership team.

It is the role of the Internet Safety Coordinator to keep abreast of current issues and guidance through organisations such as LA guidance, Becta and Northern Grid.

Senior Management and Governors are updated by the Head/Internet Safety Coordinator and all Governors have an understanding of the issues and strategies at our school in relation to local and national guidelines and advice.

This policy, supported by the school’s acceptable use agreements for staff, governors, visitors and pupils, is to protect the interests and safety of the whole school community. It should be read in conjunction with the following mandatory school policies: Child Protection, Health and Safety, home–school agreements, and behaviour/pupil discipline (including the anti-bullying) policy and PSHE.

Internet Safety - Education and Lessons

With the introduction of the new National Curriculum Digital Literacy and Keeping Safe Online is now explicitly taught throughout the school in an age appropriate way. In addition to this the children undertake three Internet Safety days in school throughout the year. On these days, all the children in school undertake an age appropriate lesson on keeping safe online.

We also periodically invite the police and child protection/Internet Safety speakers into school for assemblies, along with key stage assemblies related to keeping safe. If a particular need arises due to an event in or out of school, we may organise other events to respond to needs.

Portable and Mobile ICT Equipment (Staff Laptops)

3

Page 4: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

This section covers such items as laptops, tablets and removable data storage devices provided by school for professional use. Staff must be aware:

All activities carried out on School systems and hardware will be monitored in accordance with the general policy and Staff conduct policy.

Staff must ensure that all school SIM data is stored on school’s network, and not kept solely on the laptop. Any equipment where personal data is likely to be stored must be encrypted.

Equipment must be kept physically secure in accordance with this policy to be covered for insurance purposes. When travelling by car, best practice is to place the laptop in the boot of your car before starting your journey. When storing the device at home it must be kept securely e.g. using your homes usual security procedures for valuable items.

Ensure portable and mobile ICT equipment is made available as necessary for anti-virus updates and software installations, patches or upgrades.

The installation of any applications or software packages must be for professional duties and fully licensed.

In areas where there are likely to be members of the general public, portable or mobile ICT equipment must not be left unattended and, wherever possible, must be kept out of sight.

Portable equipment must be transported in its protective case if supplied.

Personal devices (e.g. smart phones, tablets etc) must not be used to take photographs of children.

School devices must not be used for personal use e.g. personal internet shopping, accessing social media sites etc.

If personal devices are used to read professional emails they must have a passcode on them.

Occasional personal use of the school’s computers can be beneficial to the development of staff IT skills and to enable staff to maintain a positive work-life balance. However this is at the school’s discretion and can be revoked at any time.

Any online behaviour and activity by a member of staff whilst using the school systems must be in accordance of the school AUP and any policies relating to staff conduct and personal use must not interfere with the member of staff’s duties or be for commercial purpose or gain (unless authorised by the SLT).

Again, occasionally there may be a need to use a personal device on the schools network. Permission of the Head Teacher must be sought and the appropriate form signed (appendix 2) by both the member of staff and the Head Teacher. Only the ICT Technician can facilitate the access of a personal device onto the school network. The device will only have access to the network while necessary and access rights will be revoked when the task is completed or if the member of staff leaves the school.

Internet Filtering

4

Page 5: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

The school’s 10MB broadband internet connection is produced by the local authority, which in turn links into the Northern Grid Network/Redcar and Cleveland Network and ultimately the National Education Network. The company providing this broadband connection is EasyNet. They work with Northern Grid and Equiinet to ensure filtering is appropriate and when problems occur, there are guidelines to follow.

The filters at each stage are extensive and include lists of illegal sites/inappropriate sites that cannot be accessed. It also allows open access and sharing of resources between educational establishments. However when dealing with the internet, there is never a failsafe of blocking inappropriate content in all situations and therefore the school cannot take responsibility for these events when all reasonable steps outlined have been taken.

Use of the web through the LA link is monitored and is traceable by the council network administrators. In addition to this is the consideration that children will inevitably access the internet outside of school. We therefore aim to educate them about internet safety, not simply cover their eyes.

When will Pupils have Direct Access to the Internet?

Children in all classes in school will have access to the internet. However the different types of use are outlined below:

Online content will be often used by the teachers for specific tasks. In these situations the children are not searching the internet or navigating away from page/s and tasks which have been set. Teachers will have previewed the site to ensure that it matches the learning outcomes of the lesson/setting. With younger children it is essential that access to accidently navigate away from the site is denied (i.e. hiding the URL address bar)

The children will use a suitable search engine when searching for information with the default safe search on. This is not a failsafe way of searching for information but a good line of defence. Searches will only be permitted when a member of staff is present. Where possible, teachers will have pre-searched for this topic beforehand and previewed the hits that will be used based on the fact that most search engines do not give the most appropriate site at the top of their lists.

In most cases to avoid fruitless browsing, a key website will be identified by the teacher for use by the children to find information. This can be made easier by using a printed guide to share links/bookmarks or sharing links saved on the CC4 network.

Children will not be allowed to access and search the internet unless authorised by a member of staff. Responsibility for the monitoring of what the children find is then the responsibility of that adult. The school scheme of work from the Computing Curriculum outlines when the use of searching on the internet is appropriate; other uses are the sole responsibility of the supervising adult. Appropriate behaviour and understanding of how addresses are composed will be explicitly taught before ever using the internet search in school and will be reinforced by visual reminders which are displayed as the desktop background of all school laptops.

As part of our network agreement with Northern Grid, all internet access is filtered through the local authority network – this filters a large majority of websites in order to ensure that children do not access inappropriate material.

On staff laptops, teachers and teaching assistants have access to the internet without cache pilot filtering. This allows them to find resources and information without being hindered by

5

Page 6: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

filtering, thus they will need to use their professional judgement on what is suitable for children under their care.

When the class teacher is using the internet using a projector in the classroom, the class teacher will ensure that they have taken all reasonable steps in order to ensure that inappropriate material is not accessed.

The class teacher (and other members of staff) is individually responsible for the upkeep and maintenance of their professional laptop to ensure that internet “pop ups”, adware or malware is not` present when using their laptop with children – on the smart board or with children. If staff do not feel confident maintaining the security of their laptop, guidance and advice must be sought immediately from the school ICT technician (or subject leader if available).

Access and interacting with the internet is part and parcel of many users’ reasons for having an internet connection. Simply blocking the children from using the internet is not educating them for life in the real world (and use at home). Therefore internet safety is implicitly taught from Year Two upwards and referred to whenever a unit of work requires the use of the internet. Key themes to be covered are listed below:

Safe browsing on the internet. Use of chat rooms. Use of blogs/web space. Use of email. Copyright.

What to do if you find something which is inappropriate:

The child must seek the adult in charge of the session immediately. The adult must then record the incident and speak to the head teacher directly (or deputy head/ICT subject leader if not available).

At the head’s discretion, a phone call maybe made home in order to inform parents, following appropriate child safeguarding procedures.

Use of the network for personal monetary gain or gambling is strictly prohibited.

In accordance with the Data Protection Act 1984/98, users are not allowed to access other user’s personal files and folders. The exception to this being system administrators who can gain access from the head teacher when just cause has been established or a member of teaching staff retrieving work from a child’s document folder.

Inappropriate Behaviour from Children using ICT

If a child misuses an ICT device within school, the head teacher will be informed and sanctions will be carried out in line with the school behaviour policy.

Use of Email

Staff

6

Page 7: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

Staff will be given a “professional” email account. This account is set up using the learning platform software (currently Office 365). Staff are at liberty to use this account for correspondence between each other or for use in their work with relevant professional bodies. This account may be monitored for possible abuse of the system. Passwords must be changed by each member of staff once they have received their username. Users agree through the staff agreement to keep passwords secret even from their family and friends.

The Headteacher, IT Co-ordinator and System administrator (IT technician) or another nominated person will retain admin controls for the use of professionalaccounts.Staff will also be expected to report any offensive emails that they receive to the head teacher. At the head teacher’s discretion, disciplinary action may be taken.

Staff must also report any attempts by people who they don’t know trying to contact them. Staff will be taught to never give out their email address in a public setting (virtual or real) or divulge personal details in public internet space.

Use of personal email accounts in school is not permitted.

Use of Newsgroups, forums, discussion boards, chat rooms and instant messaging is not permitted.

The staff internet agreement form sets out the terms and conditions they must adhere to before being allocated an account.

Failure to adhere to the agreement will result in the removal of the email account.

All school accounts should carry the tag:

This email is confidential and privileged. If you are not the intended recipient please accept our apologies; please do not disclose copy or distribute information in this email or take any action in reliance on its contents: to do so is strictly prohibited and may be unlawful. Please inform us that this message has gone astray before deleting it. Thank you for your co-operation.

Social Networking Websites and Staff

The school recognises that many staff may actively use Facebook, Twitter, and other such social networking sites, blogging and messaging services. As this new technology brings new safeguarding concerns for both children and staff please read this policy in conjunction with our new Social Networking Policy.

Agreement of this Policy and Other Supporting Documents

All users of the school ICT systems must sign an agreement supporting the aims set forth in this and any other supporting documents: Child Protection Policy and the LA/Northern Grid guidelines.

Wireless Network Security

The wireless network is not broadcasted, so it will not be found if a user searches for a network.

7

Page 8: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

Access to the network is protected by password using WPA encryption. Internet access requires knowledge of the LA proxy servers.

Use of Mobile Telephones

Mobile phones are not permitted within school unless permission has been granted by the head teacher. Failure to observe this will result in confiscation.

Staff

All mobile phones must be switched off in lesson time unless permission has been granted by the head teacher.

If staff have their professional emails ‘pushed’ to their personal mobile phone the phone must have a pass code to allow entry to the persons phone. If a person has their professional email on their personal phone they must not share this device with family or friends and must ensure they keep the device as safe as possible.

Dangers

The School states its policy towards the dangers potentially involved in the use of mobile learning and devices below:

Physical danger

There is a risk that whilst online, a child may make inappropriate 'friends', perhaps providing information or arranging a meeting that could risk his or her safety or the safety of others. This is perhaps the most worrying and extreme risk associated with internet use. With the mobile internet, these risks can potentially be greater.

As mobile phones are such personal and private devices it will be difficult for parents to supervise access and contacts in the same way as they would a PC in the home. Mobile devices are typically always on and hence a child is always contactable, and always vulnerable.

The rich content capabilities of modern technology means that young people may be sent inappropriate images or videos, or be encouraged to send back images or videos of themselves using integrated cameras. The integration of cameras within devices may also result in digital images of children and young people being taken and circulated or posted on websites without their knowledge or permission. Therefore children are educated in school to ensure they ask permission of the person they are taking an image of before proceeding.

Services may also provide more opportunities for personal contact, for example by email, chat, online gaming or dating services. Additionally, location-based capabilities may mean that it is possible to pinpoint the exact location of children and young people. Whilst this may be welcomed by parents keen to know where their child is at all times, it is not difficult to see how misuse of the technology could arise.

Parents will therefore have access to training in school to address these issues. It will be the parent’s responsibility to attend.

School will explain to pupils the possibility of the attempted/actual theft of the device.

8

Page 9: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

Devices will be security marked. School will inform the Police of the allocation anddistribution of equipment into the local area. Children will be expected to ‘pocket or bag’ the device whilst travelling to and from School; they will be given guidance on safe use and storage, both at home and travelling to and from School.

Online bullying

Online bullying, for example by text message, email or via websites is a growing concern associated with the fixed internet and mobile telephone use. The mobile internet may unfortunately offer a further way for bullies to torment their victims. Such behaviour will be dealt with following School procedures.

Legal, financial and commercial considerations

With the fixed internet there are concerns that a child could do something that has legal or financial consequences such as giving out a parent's credit card details or doing something that contravenes another persons' rights. Plagiarism and copyright are particular issues, which are associated with the internet, especially in relation to downloading music or games.

Research also shows that children are not able to differentiate between what is advertising and what is not.

Again, all of these issues could potentially increase with the mobile internet with easy access to chargeable content in the form of games, downloads, ringtones, logos and other services all of which are particularly attractive to children and young people. The facility to pay for goods and services using mobile phones as an 'electronic wallet' is also set to increase. Spam by text message is already a growing problem, and the rich media capabilities of 3G/4G devices will undoubtedly mean that advertisers become more sophisticated in their campaigns.

Parents will therefore have access to training in school to address these issues. It will be the parent’s responsibility to attend.

Reducing the risks

The dangers and risks associated with using 3G/4G or mobile internet services can be reduced through effective education of the safe and appropriate behaviours to adopt when using this new technology.

In common with general internet safety recommendations, children and young people should be taught the importance of keeping personal information private, the appropriate behaviours to use when online, the need to critically evaluate any information they find, and the importance of seeking advice from an adult if they see any content or are contacted in a way which makes them feel uncomfortable.

Parental involvement

We will liaise with parents annually to keep them up to date with developments. If a parent is unhappy with an aspect of ICT they must approach our ICT subject leader. Their concern will be logged and followed up on appropriately. We ask them to re-enforce our Internet Safety Guide at home.Admin Network

The school adheres to the LA policy regarding use of administration machines.

9

Page 10: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

Storage of Digital Images

Members of staff will store images of children on their professional laptops, these will be used for celebration purposes, stimuli for work or to record school work/events. The members of staff will ensure that photos are kept secure.

Appendix 1 Pupil ICT Agreement

Primary Pupil Acceptable UseAgreement / eSafety Rules

I will only use ICT in school for school purposes.

I will only use my class e-mail address or my own school e-mail address when emailing.

I will only open e-mail attachments from people I know, or who my teacher has approved.

I will not tell other people my ICT passwords.

I will only open/delete my own files.

I will make sure that all ICT contact with other children and adults is responsible, polite and sensible.

I will not deliberately look for, save or send anything that could be unpleasantor nasty. If I accidentally find anything like this I will tell my teacher immediately.

I will not give out my own details such as my name, phone number or home address. I will not arrange to meet someone unless this is part of a school project approved by my teacher and a responsible adult comes with me.

I will be responsible for my behaviour when using ICT because I know that these rules are to keep me safe.

I will support the school approach to online safety and not deliberately upload or add any images, video, sounds or text that could upset any member of the school community.

I know that my use of ICT can be checked and that my parent/ carer contacted if a member of school staff is concerned about my Internet Safety.

Signed ………………………………………….……………

Name …………………………………………………………

10

Page 11: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

Date …………………………………………………………..

Appendix 2 Acceptable Use Agreement: Staff, Governors and Visitors

Staff, Governor and VisitorAcceptable Use Agreement / Code of Conduct

Staff ICT Acceptable Use Policy

As a professional organisation with responsibility for children’s safeguarding it is important that all staff take all possible and necessary measures to protect data and information systems from infection, unauthorised access, damage, loss, abuse and theft. All members of staff have a responsibility to use the school’s computer system in a professional, lawful, and ethical manner. To ensure that members of staff are fully aware of their professional responsibilities when using Information Communication Technology and the school systems, they are asked to read and sign this Acceptable Use Policy.

This is not an exhaustive list and all members of staff are reminded that ICT use should be consistent with the school ethos, other appropriate policies and the Law.

I understand that Information Systems and ICT include networks, data and data storage, online and offline communication technologies and access devices. Examples include mobile phones, i-pads, digital cameras, email, learning platforms, cloud, computing services such as Office 365 and social media sites.

School owned information systems must be used appropriately for professional use. I understand that the Computer Misuse Act 1990 makes the following criminal offences: to gain unauthorised access to computer material; to gain unauthorised access to computer material with intent to commit or facilitate commission of further offences or to modify computer material without authorisation.

I understand that any hardware and software provided by my workplace for staff use can only be used by members of staff and only for educational use. To prevent unauthorised access to systems or personal data, I will not leave any information system unattended without first logging out or locking my login as appropriate.

I will respect system security and I will not disclose any password or securityinformation. I will use a ‘strong’ password (A strong password has numbers, letters and symbols, with 8 or more characters, does not contain a dictionary word and is only used on one system). I will follow the password policy of the school.

11

Page 12: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

I will not attempt to install any purchased or downloaded software, including browser toolbars, or hardware without permission from the system manager.

I will ensure that any personal data of pupils, staff or parents/carers is kept inaccordance with the Data Protection Act 1988. This means that all personal data will be obtained and processed fairly and lawfully, only kept for specific purposes, held no longer than necessary and will be kept private and secure with appropriate security measures in place, whether used in the workplace, hosted online (only within countries or sites with suitable data protection controls) or accessed remotely. Any data which is being removed from the school site (such as via email, stored in the cloud or on memory sticks or CDs) will be encrypted by a method approved by the school, (see LA Data Security Policy). Any images or videos of pupils will only be used and stored as stated in the school Acceptable Use Policy (section on pupil images) and will always take into account parental consent.

I will not keep professional documents which contain school-related sensitive or personal information (including images, files, videos etc.) on any personal devices (such as laptops, digital cameras, mobile phones), unless they are secured and encrypted. Where possible I will use the Cloud Services such as Windows 365 on the school domain to upload any work documents and files in a password protected environment. I will protect the devices in my care from unapproved access or theft.

I will not store any personal information on the school computer system or Cloud Services such as Windows 365 that is unrelated to school activities, such as personal photographs, files or financial information.

I will respect copyright and intellectual property rights.

I have read and understood the school Acceptable Use Policy which covers the requirements for safe ICT use, including using appropriate devices, safe use of social media websites and the supervision of pupils within the classroom and other working spaces.

I will report all incidents of concern regarding children’s online safety to the Designated Child Protection Coordinator (Mrs Ruddy) and/or the e-Safety

Coordinator (Lindsay Phelps) as soon as possible. I will report any accidental access, receipt of inappropriate materials, filtering breaches or unsuitable websites to either the head teacher or the e-Safety Coordinator or as soon as possible.

I will not attempt to bypass any filtering and/or security systems put in place by the school. If I suspect a computer or system has been damaged or affected by a virus or other malware or if I have lost any school related documents or files, then I will report this to the ICT Support Provider/Team (Graham Potter) as soon as possible. Although, in many instances, first speak to the Headteacher, ICT Leader or Noel Potter.

12

Page 13: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

My electronic communications with pupils, parents/carers and other professionals will only take place via work approved communication channels e.g. via a school provided email address or telephone number or through services such as those provided through Windows 365. Any pre-existing relationships which may compromise this will be discussed with the Senior Leadership team.

My use of ICT and information systems will always be compatible with my professional role, whether using school or personal systems. This includes the use of email, text, social media, social networking, gaming, web publications and any other devices or websites.

My use of ICT will not interfere with my work duties and will be in accordance with the school Acceptable Use Policy and the Law.

I will not use school devices for personal internet shopping, accessing social media sites etc.

I will not create, transmit, display, publish or forward any material that is likely to harass, cause offence, inconvenience or needless anxiety to any other person, or anything which could bring my professional role, the school, or the County Council, into disrepute.

I will promote Internet Safety with the pupils in my care and will help them to develop a responsible attitude to safety online, system use and to the content they access or create.

If I have any queries or questions regarding safe and professional practise online, either in school or off site, then I will raise them with the Internet Coordinator (Mrs Phelps) or the Head Teacher.

I understand that my use of the information systems, internet and email may be monitored and recorded to ensure policy compliance.

If I need to access the Redcar and Cleveland Network (RedClev) as part of my work I will follow the Acceptable Use Policy as stated on the network.

I will ensure any personal device I access my professional emails on will be protected by a passcode.

I will read and sign St Mary’s Social Media policy in conjunction with theAcceptable Use Policy.

The School may exercise its right to monitor the use of information systems, including internet access and the interception of e-mails in order to monitor compliance with this Acceptable Use Policy and the School’s Data Security Policy.

13

Page 14: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

Where it believes unauthorised and/or inappropriate use of the service’s information system or unacceptable or inappropriate behaviour may be taking place, the School will invoke its disciplinary procedure.

If the School suspects that the system may be being used for criminal purposes or for storing unlawful text, imagery or sound, the matter will be brought to the attention of the relevant law enforcement organisation.

I have read, understood and agree to comply with the Staff ICT Acceptable Use Policy.

Signed: ……………………….... Print Name: ………………………… Date: ……………

Accepted by: ………………………………. Print Name: ………………………………….

14

Page 15: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

Current Legislation

Data Protection Act 1998

The Act requires anyone who handles personal information to comply with important data protection principles when treating personal data relating to any living individual. The Act grants individuals rights of access to their personal data, compensation and prevention of processing.

http://www.hmso.gov.uk/acts/acts1998/19980029.htm

The Telecommunications (Lawful Business Practice) - (Interception of Communications) Regulations 2000

Regulation of Investigatory Powers (RIP) Act 2000

Regulating the interception of communications and making it an offence to intercept or monitor communications without the consent of the parties involved in the communication. The RIP was enacted to comply with the Human Rights Act 1998.

The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000, however, permit a degree of monitoring and record keeping, for example, to ensure communications are relevant to school activity or to investigate or detect unauthorised use of the network. Nevertheless, any monitoring is subject to informed consent, which means steps must have been taken to ensure that everyone who may use the system is informed that communications may be monitored. Covert monitoring without informing users that surveillance is taking place risks breaching data protection and privacy legislation.

http://www.hmso.gov.uk/acts/acts2000/20000023.htm

Human Rights Act 1998

http://www.hmso.gov.uk/acts/acts1998/19980042.htm

Other Acts Relating to eSafety

Racial and Religious Hatred Act 2006

It a criminal offence to threaten people because of their faith, or to stir up religious hatred by displaying, publishing or distributing written material which is threatening. Other laws already protect people from threats based on their race, nationality or ethnic background.

Sexual Offences Act 2003

The new grooming offence is committed if you are over 18 and have communicated with a child under 16 at least twice (including by phone or using the internet) it is an offence to meet them or travel to meet them anywhere in the world with the intention of committing a sexual offence.

15

Page 16: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

Causing a child under 16 to watch a sexual act is illegal, including looking at images such as videos, photos or webcams, for your own gratification. It is also an offence for a person in a position of trust to engage in sexual activity with any person under 18, with whom they are in a position of trust.

Schools should already have a copy of “Children & Families: Safer from Sexual Crime” document as part of their child protection packs.

For more information: www.teachernet.gov.uk

Communications Act 2003 (section 127)

Sending by means of the internet a message or other matter that is grossly offensive or of an indecent, obscene or menacing character; or sending a false message by means of or persistently making use of the internet for the purpose of causing annoyance, inconvenience or needless anxiety is guilty of an offence liable, on conviction, to imprisonment. This wording is important because an offence is complete as soon as the message has been sent: there is no need to prove any intent or purpose.

The Computer Misuse Act 1990 (sections 1 – 3)

Regardless of an individual’s motivation, the Act makes it a criminal offence to gain:

access to computer files or software without permission (for example usinganother persons password to access files)

unauthorised access, as above, in order to commit a further criminal act (such as fraud) impair the operation of a computer or program

UK citizens or residents may be extradited to another country if they are suspected of committing any of the above offences.

Malicious Communications Act 1988 (section 1)

This legislation makes it a criminal offence to send an electronic message (e-mail) that conveys indecent, grossly offensive, threatening material or information that is false; or is of an indecent or grossly offensive nature if the purpose was to cause a recipient to suffer distress or anxiety.

Copyright, Design and Patents Act 1988

Copyright is the right to prevent others from copying or using work without permission. Works such as text, music, sound, film and programs all qualify for copyright protection. The author of the work is usually the copyright owner, but if it was created during the course of employment it belongs to the employer. Copyright infringement is to copy all or a substantial part of anyone’s work without obtaining them author’s permission. Usually a licence associated with the work will allow a user to copy or use it for limited purposes. It is advisable always to read the terms of a licence before you copy or use someone else’s material. It is also illegal to adapt or use software without a licence or in ways prohibited by the terms of the software licence.

Public Order Act 1986 (sections 17 – 29)

This Act makes it a criminal offence to stir up racial hatred by displaying, publishing or distributing written material which is threatening. Like the Racial and Religious Hatred Act

16

Page 17: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

2006 it also makes the possession of inflammatory material with a view of releasing it a criminal offence.

Protection of Children Act 1978 (Section 1)

It is an offence to take, permit to be taken, make, possess, show, distribute or advertise indecent images of children in the United Kingdom. A child for these purposes is a anyone under the age of 18. Viewing an indecent image of a child on your computer means that you have made a digital image. An image of a child also covers pseudo-photographs (digitally collated or otherwise). A person convicted of such an offence may face up to 10 years in prison.

Obscene Publications Act 1959 and 1964

Publishing an “obscene” article is a criminal offence. Publishing includes electronic transmission.

Protection from Harassment Act 1997

A person must not pursue a course of conduct, which amounts to harassment of another, and which he knows or ought to know amounts to harassment of the other.A person whose course of conduct causes another to fear, on at least two occasions, that violence will be used against him is guilty of an offence if he knows or ought to know that his course of conduct will cause the other so to fear on each of those occasions.

Acts Relating to the Protection of Personal Data

Data Protection Act 1998

http://www.opsi.gov.uk/acts/acts1998/ukpga_19980029_en_1

The Freedom of Information Act 2000

http://www.ico.gov.uk/for_organisations/freedom_of_information_guide.aspx

Further Information

Redcar and Cleveland Schools have access to support for e-safety through Senior Adviser [email protected] and through Child Protection Officer [email protected].

Redcar and Cleveland Schools have access to support from the Northern Grid E-Safety Team (if purchasing broadband through the LA). http://www.northerngrid.org/index.php/esafety-andsecurity.

Redcar and Cleveland Information Governance Documents are kept on the local intranet: http://intranet/intra.nsf/web+full+list/de84e42d7c4f067a802575a800302030?opendocument

Redcar and Cleveland Schools e-safety officers all have access to the Learning Platform site:

17

Page 18: st-marys.rac.sch.ukst-marys.rac.sch.uk/wp-content/uploads/2018/05/Acceptable-Us… · Web viewE-safety (now Internet Safety) risks have traditionally been classified as those involving

https://fronter.com/rac/lpathobj/page.php?pageid=307&editmodus=0&xus=448b66df&init_load=1

Kent Trust has an excellent range of policy documents and support available:http://www.kenttrustweb.org.uk//Children/safeguards_esafety.cfm

“Safer Use of New Technology” is a Kent Safeguarding Children Board (KSCB) document which discusses ideas and FAQs for professionals on how to use technology safely when working with young people. The document can be downloaded from www.kenttrustweb.org.uk?esafety

“Supporting School Staff” is an essential document to help staff understand how to protect themselves online created by Childnet International and DfE:http://www.digizen.org/resources/school-staff.aspx

Teach Today is a useful website which provides useful advice and guidance for staff from industry: http://en.teachtoday.eu

The UK Safer Internet Centre’s Professional Online Safety Helpline offers advice and guidance around e-Safety for professionals who work with children and young people in the UK. The helpline provides support with all aspects of digital and online issues such as social networking sites, cyber-bullying, sexting, online gaming and child protection online. Staff can contact the helpline via 0844 381 4772, [email protected] or can visit www.saferinternet.org.uk/helpline for more information.

360 Degree Safe tool is an online audit tool for schools to review current practice: http://360safe.org.uk/

“Guidance for Safer Working Practice for Adults who Work with Children and Young People” (2009) contains useful guidance around professional use of technology: www.childrenengland.org.uk/upload/Guidance%20.pdf

National Union of Teachers – a common sense approach:http://www.teachers.org.uk/files/active/0/INTERNET-NUT-GUIDE-9-03.pdf

NASUWT advice links for teachers; NQTs and GTP students

http://www.nasuwt.org.uk/system/search/index.htm?search=aup&stype=QUICK

A useful study of Primary e-safety has been produced by Sheffield Hallam University:http://www.shu.ac.uk/_assets/pdf/improving-esafety-in-primary.pdf

18