Warrington School/Board Of Trustees/Information and Communication Technology (ICT

=Cyber Safety Procedures=
 * 1) The school’s ICT practices are based around a formal agreement with users and teaching of relevant age appropriate procedures
 * 2) No individual may access the School's Internet and devices unless they have signed the appropriate use agreement
 * 3) The use agreements are an educative tool and should be used as a resource for the professional development of staff
 * 4) .Use of the Internet and the ICT devices/equipment by staff, students and other approved users at Warrington School is to be limited to educational, professional development, and personal usage appropriate in a school environment, as defined in individual use agreements.
 * 5) Signed use agreements will be filed in a secure place, and an appropriate system devised which facilitates confirmation that particular individuals are authorised to make use of the Internet and ICT devices/equipment.
 * 6) The school has the right to monitor access and review all use. This includes personal emails sent and received on the schools computer/s and/or network facilities at all times.
 * 7) The school has the right to audit at anytime any material on equipment that is owned or leased by the school. The school may also request permission to audit privately owned ICT devices/equipment used on the school site or at any school related activity.
 * 8) Issues relating to confidentiality, such as sighting student or staff information, reasons for collecting data and the secure storage of personal details and information (including images) will be subject to the provisions of the Privacy Act 1993.
 * 9) The safety of children is of paramount concern. Any apparent breach of cybersafety will be taken seriously. The response to individual incidents will follow the procedures developed as part of the school’s cybersafety practices. In serious incidents, advice will be sought from an appropriate source e.g the NZ STA and/or a lawyer with specialist knowledge in this area. There will be special attention paid to the need for specific procedures regarding the gathering of evidence in potentially serious cases. If illegal material or activities are suspected, the matter may need to be reported to the relevant law enforcement agency.
 * 10) Downloading of Copyrighted material is forbidden unless paid for by the school or individual with permission to do so

General cybersafety practices

 * Teachers are to:
 * Teach age appropriate computer use - where in doubt - find out
 * Roam their classroom to actively monitor what students are looking at on their screens
 * Teach strategies for dealing with inappropriate content
 * Turn off monitor and telling the teacher
 * Equipment is used in a safe, caring and environmentally friendly manner
 * Turning devices off at the wall before remo*Senior Schoolving cables
 * Access and use of teacher's laptops at home and school is at the prudent discretion of the teacher
 * The use of ICT equipment will be used by all for purposes that are within keeping of this educational setting. No inappropriate use. If in doubt, find out.
 * Contravening copyright laws is a not permitted. If in doubt, find out.
 * All computers are set up so screens face into the classroom
 * If inappropriate material is inadvertently accessed remove from screen and record details with another staff member and place details at the office
 * Passwords for accessing the Internet and server are confidential to the user
 * The school Internet is unfiltered allowing for all to learn the effective use of the Internet through protective protocols and self monitoring
 * The use of the school’s ICT equipment will be age appropriate

Class Level related ICT practices
*Junior School *Middle School *Senior School
 * 1) Start-up, shut-down and saving work onto local drives and server
 * 2) Access to educational programs and applications
 * 3) Internet browsing under direct teacher supervision
 * 1) Saving into own folder on server
 * 2) Access to more complex programs and applications
 * 3) Researching on the net with guidance and prior teaching
 * 4) Using peripherals such as camera
 * 5) Manipulating data/images
 * 1) Setting up computer operating systems, installing extra software
 * 2) Email, blogs, social networking and online document accounts (teacher/parent discretion)
 * 3) Access to all school equipment
 * 4) Problem solving computer issues
 * 5) Assisting other students and teachers

REVIEW
1. This procedure will be reviewed according to the Board’s self review timetable. 2. All changes can be tracked via this wiki history tab.

Signatures:
 * NathanP 01:26, 15 October 2010 (UTC)