How to Draft and School Internet Policy

Internet at school

Internet at school

by Anastasie Mukarugomwa -
Number of replies: 0
Rules and procedures to protect students at school 1) Prevent user access to and transmission of inappropriate material via the Internet, email, or other forms of direct electronic communications over its computer network; 2) Prevent unauthorized access and other unlawful online activity; 3) Prevent unauthorized online disclosure, use, or dissemination of personal identification information of minors To gain access to the Internet, all students of at School, Perrysburg must obtain parental permission and attend a series of required Internet training sessions. The signature(s) at the end of this document indicate(s) the party (parties) who signed has (have) read the terms and conditions carefully and understand(s) their significance. The school administration, and/or staff may request the Computer Teacher (or Technology Coordinator) to deny, revoke, or suspend specific user accounts. 1) A user is defined as any student, or staff member using the technology resources at School. 2. The term harmful to minors means a picture, image, graphic image file, or other visual depiction that: a. Taken as a whole and with respect to minors, appeals to a prurient interest in nudity or sex; b. Depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors; and c. Taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors. Internet Terms and Conditions A. Safety 1) Promotion of Internet Safety: To the extent practical, steps shall be taken to promote the safety and security of users of the Saint Rose School, Perrysburg online computer network when using electronic mail, chat rooms, instant messaging, and other forms of direct electronic communications. 2). When using the computer network and Internet, minors should not reveal personal information about themselves or any other minors such as home address, phone number, full name, or any other identifying information. System Security 1) Users should notify a teacher if a problem or potential bypass of security systems is detected. Students from accessing another individual’s account and/or tampering in any way with the personal emails, files, or data belonging to another person. 2) Hacking: As prevention of inappropriate network usage includes unauthorized access, including so-called ‘hacking,’ and other unlawful activities by minors online. C. Inappropriate Material 1) Final Say: The network is provided to conduct research and communicate with others. Access to network services is given to users who agree to act in a considerate and responsible manner. Access is a privilege – not a right – that entails responsibility. Inappropriate use will result in a suspension or cancellation of Internet privileges. The Computer Teacher (or Technology Coordinator), after consultation. 1. Technology needs to become more relevant to learning in school. Currently, technology is something that is more relevant to their social lives and is of limited relevance in school. 2. Provide access to learning resources on the internet as these are often more up-to-date than those provided in textbooks or easier to understand than what has been presented by the teacher. 3. Use ICT to open up new forms of learning and collaboration and provide greater flexibility for students with different styles of learning. 4. Provide Cloud-based services such as email, online resource banks, organisation of teaching and learning resources, and the administration of homework. 5. Use ICT to record students’ work on an ongoing basis, accessing it at any time, and using ICT as their student journal. 6. Use ICT for administration including roll call in each class and the assignment of homework and homework feedback. 7. Provide ongoing training for teachers to help them use these services effectively. 8. Use ICT to help students with specific learning needs such as dyslexia or dyspraxia. 9. Raise awareness of technology downsides such as plagiarism, distraction, cyber bullying and access to inappropriate material and enable students to deal with these. 10. Help filter out unreliable or inappropriate sources and content.