1 minute read

Safeguarding

Before being issued with a user name and password, all of our students are required to read and sign the College 'Acceptable Usage Policy' this is available on our College website

Academy Policy

Digital technologies have become integral to the lives of children and young people, both within schools and outside school. These technologies are powerful tools, which open up new opportunities for everyone. These technologies can stimulate discussion, promote creativity and stimulate awareness of context to promote effective learning. Young people should have an entitlement to safe internet access at all times.

This Acceptable Use Agreement is intended to ensure:

That young people will be responsible users and stay safe while using the internet and other digital technologies for educational, personal and recreational use. That school systems and users are protected from accidental or deliberate misuse that could put the security of the systems and will have good access to digital technologies to enhance their learning and will, in return, expect the students to agree to be responsible users.

All network activity is monitored and logged. All Internet traffic is monitored and logged. E-Safety protection software exists on a number of levels to prevent access to inappropriate material.

When the student signs the agreement they are saying that:

they understand that they are responsible for their actions, both in and out of school.

As a parent or carer please take the time to read through this with your child.

By completing the Jot Form students are confirming that they have read, and will abide by this Acceptable Usage Policy.

Specific Unauthorised Activities

• You must not make deliberate attempts to disrupt the computer system or destroy data. • You should not attempt to go beyond your authorised access. This includes: attempting to log in through another person's account or sending e-mail while masquerading as another person. • You must not use any facility to participate in any form of cyber-bullying. You must not engage in personal, prejudicial or discriminatory attacks. You should respect the privacy of any message sent to you and not re-send it to others without permission. • The use of social networking sites such as Facebook, Bebo, MySpace, Twitter and 33 YouTube is not permitted. ...Information and Communication Technology 32