Download E-Safety Policy 2014

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Peering wikipedia , lookup

Deep packet inspection wikipedia , lookup

Distributed firewall wikipedia , lookup

Net neutrality wikipedia , lookup

Net neutrality law wikipedia , lookup

Net bias wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Schools e-safety Policy @ Gatehouse Primary
2014
E-safety
This policy outlines a statement of intentions with respect to use of the Internet resources
(and other communications technologies) at Gatehouse Primary School. This policy also
applies to wrap around care within school (ie breakfast and after school clubs).
This policy will not cover strategies dealing with the use of the Internet in specific subjects
nor is it the intention to provide strict rules of pedagogy: all staff will be entitled to direct
training through in-house ICT training from the ICT co-ordinator.
Due to its very nature, the communications technologies can pose a risk in many ways,
where pupils / users can:

Be exposed to unacceptable materials (pornographic, violent, extremist literature).

Encounter inappropriate messages (harassing, demanding, belligerent contacts).

Arrange contacts and meetings (potential exploitation and physical dangers).

Inadvertently provide personal information which could be sufficient to put them in
danger or to allow commercial companies to exploit them.
However, the existence of undesirable material is not a valid reason to avoid the Internet
(and other communications technologies), which provide an amazing resource of
cultural, scientific and intellectual material. This policy sets out how the school will deal
with issues surrounding the provision of Internet use (and other communication
technologies).
The e-safety message must be integral to the use of any technology, embedding safe
practice into school culture. This will be taught specifically at the start of every new
academic year and with all subsequent uses of the Internet.
What the policy contains:
1.
2.
3.
4.
5.
6.
7.
8.
A.
B.
C.
D.
Information on the current infrastructure in place for Internet access (Oct 2012).
Policy, procedures and responsibilities regarding Internet use in school.
Parental communication and consent letters.
Internet use guidelines and resources.
Disclaimer.
Information on the RM SafetyNet Plus Internet filtering system.
Guidance on the use of all communications technologies.
Procedures for responding to incidents of misuse of communications technologies
An introduction to the terminology used throughout this document.
Copies of a poster for pupils and students regarding various forms of Internet use.
Inappropriate ICT use forms – pupils + staff
Request for unfiltered access forms
Internet Terminology
Due to the nature of the Internet many new technologies exist. Many of these have strange
and unusual names. If you are unsure of these whilst reading through this document please
refer to appendix A at the end of the document to gain a deeper insight into them.
1
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
Current Infrastructure
SECTION 1
The infrastructure in place in school for Internet access (as of Oct 2012) is listed below:



51 Internet linked internal Ethernet LAN computers for staff and pupil use(25 Laptops for Staff
use only).
Broadband Internet access.
Internet Access provided by SWGFL with built in filtering service (RM SafetyNet Plus).
School Policy and Procedures for Internet

SECTION 2
Background to the Internet in School
It is a belief of all at Gatehouse Primary School that the Internet should take its place as one of a
number of extremely useful and empowering tools available for teaching and learning. The school
has been and must continue to invest heavily in the hardware necessary for staff, pupils and
students to access and use Internet-based resources for study at all levels from Key Stage 1 and the
professional development needs of its staff.

Inclusion + Implementation
In line with the school policy on inclusion all pupils are entitled to equal protection and access to
the internet and associated technologies. This policy also follows the implementation of all school
policies with respect to equality and inclusion.

The Internet in the Curriculum:
The WWW can be utilised by teachers and pupils whenever it is deemed appropriate to do so for
study in lessons and is written into schemes of work for all subjects. Full introduction to using the
Internet appropriately is given in Year 3 upwards and further understanding of various concepts are
taught throughout the KS2. But other years must and should access specific resources from the
Internet to enhance their curricular teaching.
The rules and processes of Internet use are taught in line with the National Curriculum for ICT, and it
is expected that pupils will transfer the knowledge and skills learned to their studies in other subjects.
The issues covered in the ICT curriculum are:



Correct and efficient search service techniques and usage (including the use of Boolean
operators and understanding search service types).
Bias and deceit detection techniques.
Critical evaluation skills.
The use of e-mail during any time has been permitted on the school network for Years 1 - 6. All
pupils already have their own e-mail addresses using Microsoft Exchange server 2008.
Access to web-based e-mail (e.g. hotmail, google mail, yahoo mail, etc.) is not permitted by
children or staff using the school network (with the exception of the Network Manager).
The use of chat rooms and social media sites has not been permitted for any pupil or student and
there are no plans for this to be the case. However, education about any aspect of the Internet is
our responsibility regardless of this fact. Therefore, we advocate that pupils and students are made
aware of the SMART code, (expressly in years 3 and 6) through the displaying of posters in relevant
places. (This code can be found on a poster copy at the end of this policy – see Appendix B).
Newsgroup use is not allowed, as no benefit has been seen in its’ use.
The creation of websites has not been included in the curriculum. It is intended that the school
parliament should be more active in the school website. This will require monitoring with regards to
photos and names/ information. This policy will be used in any development of this area.
2
Gatehouse E-safety Policy 27/06/17
Version 4.0.0

Responsibilities:
The Headteacher is responsible for ensuring the safety (including e-safety) of members of the
school community, though the day to day responsibility for e-safety is delegated to the Network
Manager.
The designated persons for child protection are trained in e-safety issues and is aware of the
potential for serious child protection issues to arise from sharing of personal data, access to illegal /
inappropriate materials, inappropriate on-line contact with adults / strangers, potential or actual
incidents of grooming and cyber-bullying.
Responsibilities with regard to Internet use in school are as follows:
Monitoring / development / upkeep of hardware / ISP and access management – ICT co-ordinator
and Network Manager
Maintenance and development of the policy document – ICT co-ordinator and Network Manager
Policy review in line with ICT development plan – ICT co-ordinator and Network Manager
School portal development and maintenance – ICT co-ordinator and Network Manager
Internet-in-ICT curriculum development – ICT co-ordinator and Network Manager
Internet use in subject areas – Class teachers, Head of Subject and ICT co-ordinator (whole school
issues)
Dissemination of relevant policy areas to pupils / students – ICT co-ordinator
Delivery of ICT policy - all staff
Reporting of misuse/ inappropriate behaviour/unwanted pictures etc. - All Staff report to Network
Manager (Recorded by Network Manager using Inappropriate ICT use forms – see Appendix C)
In addition, pupils and students are responsible for their conduct in relation to school use of Internet
resources. It is assumed parents / guardians will ensure responsible conduct at home.

Other Policy Issues:

Monitoring of pupil / student use of the Internet in school can take place at any time through
watching the pupils. Monitoring using software has been investigated, and whilst good, remains
expensive and so has not been purchased.

Where inappropriate use has been suspected and proved, sanctions will be made according
to the school’s Behaviour Policy. This means that every situation will be treated in relation to the
individual pupil or student. Instances of inappropriate use will need to be made aware to the
Network Manager and/or the headteacher as soon as possible (see sections 7 and 8).

The current filtering system (provided by RM SafetyNet Plus) is under constant review and is
amended through the Network Manager, who can telephone RM to have a site removed from
the filter or by adding material to the list. This is essential as there are issues with any automatic
filtering system – the RM SafetyNet Plus system is no different: it is often blocking educationally
sound sites due to the over-reliance on certain keywords that the filtering system cannot
recognise in context (e.g. the word ‘bloody’ on a history site).
Individual teachers can request access to an educational site that they feel is “unnecessarily”
being blocked by consulting the Network Manager. They will be required to complete the form
“Access to a site being filtered” (See Appendix D). It is suggested that in most cases, teachers
should provide children with a list web-sites that they have checked, prior to a lesson. If “open”
searches are being used, teachers should perform searches prior to lessons to spot any
unwanted content.

Each computer has an anti-virus program installed. This program is set up to perform a periodic
scan of the computer and monitors files in the background. It should upgrade itself weekly.

Pupils and students aren’t able to download any files from Internet sites, such as MP3s.

Any material taken from the internet, such as photos and texts, should be checked for
copyright. If applicable referenced in a bibliography. This should be taught to pupils. Creative
Common licensed work is always preferable.
3
Gatehouse E-safety Policy 27/06/17
Version 4.0.0

Review of this policy will take place yearly (at the start of Autumn term) and will involve the
school’s Curriculum Committee and Governing Body. This will allow amendments to take into
account the yearly ICT Action Plan and any (proposed) changes in hardware or access.

It is our school policy that no names of pupils / students will appear with photographs used on
the school website/portal and if any are to be used, they should be ‘anonymous’ or have
parental consent.

The policy on the use of photographs on the school portal is as follows:
o
o
o
Photographs will only be considered where its use will be to celebrate pupil / student
achievements or where it forms part of an information resource or as an aid to learning / as
part of a learning resource.
Photographs will never be included with a named pupil / student directly without express
permission (or vice versa).
Where pupils / students are used for photographs, every attempt will be made to disguise
pupils / students (such as for photographs on the uniform page or general shots of pupils
working).
Parental Consent Letters
SECTION 3
Parental consent letters are given to parents on admission to the school. There is also a list of pupils
that parents do not wish to appear on the school website. This list is maintained by the office staff
as is the letter given to all new parents.
4
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
Internet use guidelines and resources
SECTION 4
The following section outlines various guidelines and resources made available to pupils through
posters, pupil diary inserts and other means.

Chat room advice & MSN Messenger (instant message programmes incl.
SMS texts on mobile phones)
Whilst chat rooms are not a permitted use of the Internet resources in school at any time, it is
incumbent upon us as an educational institution to empower pupils and students with the
knowledge of how to deal with chat rooms, and like technologies outside of school. Using the
SMART mnemonic, as shown on the poster and used by “think you know”, pupils will be reminded of
the key messages of keeping safe on the internet.

E-mail advice for students in the School
Where e-mail is used for work:
 Users are responsible for e-mail they send and for contacts made.
 E-mail should be written carefully and politely. Messages may be forwarded, so you should
consider all e-mail sent to be public property.
Other rules regarding the use of e-mail:
 Anonymous messages and chain letters must not be sent.
 E-mail bombardment or spamming to any one or more accounts is strictly forbidden.

Search service advice for all pupils
Both in-house research by the Head of ICT and in Internet publications have shown that the most
time is lost by pupils and students when using search services on the Internet. This is due to the fact
that not a great deal is known about the fact that there are many different types of search service
and providers of services available on the Internet. This policy sets out the school’s position on this
area of research. It is preferable for teachers to provide pupils with the URLs of appropriate web
sites wherever applicable, to save time. However, where it is not possible or desirable for teachers
to provide this, then:


Pupils / students should be made aware of the main types of search service.
Promote the use of Google (www.google.com), which is the most effective search service
on the Internet, using a unique technology. This will speed up search times and the
relevance of resource listings. This is already built heavily into the school portal.
Information on Search Service types and how to use them appropriately can be utilised in any
lesson to ensure that the services are used effectively to save time and increase learning.
5
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
Search Service Information:
Search Engines (e.g. Lycos)
Software programs called spiders or robots create a search engine’s listings. These spiders
‘crawl’ through the internet categorising sites and collecting information about new or
updated sites and put it into a database. Search engines return a list of sites that mention
the word you have entered into the search field.
The problem is that search engines may return millions of pages in their listings and most of
these may not be relevant. A web page may only mention the word your looking for once,
and the rest may have nothing to do with what you were looking for. There are many ways
you can use these.
Metasearch Engines (e.g. Ask Jeeves)
Metasearch engines are search engines that search search engines (!). When you submit a
query (or question) the metasearch engine then submits that query to a number of search
engines and then collates the results from those engines on its own results page.
This can yield an enormous amount of results!
Best to use special searching request techniques here (e.g. Boolean Operators)!
Directories (e.g. YAHOO!)
A directory is a manually created catalogue of sites on the internet. This means that people
actually create categories and assign web sites to the categories.
To use a directory, it is better to use the category listings and search the subcategories
within it than use the search facility.
Portals (e.g. Virgin Net)
Portals are web sites that have a variety of content and services on them. A search service
on a portal therefore has to be able to look into different types of web content to be able to
find the different resources you are looking for.
It is well worth noting that many sites employ a combination of the above methods (e.g. YAHOO!).
Using Boolean Operators in search service keyword queries:
Expression
Symbol
AND
&
OR
|
AND
NOT
!
NEAR
~
()
Action
Finds documents containing all of the specified words
or phrases.
Finds documents containing at least one of the
specified words or phrases. The found documents
could contain both, but not necessarily.
Excludes documents containing the specified word or
phrase. NOT must be used with another operator,
like AND. AltaVista does not accept the NOT operator
on its own; instead, specify * AND NOT *.
Finds documents containing both specified words or
phrases within 10 words of each other.
Use brackets to group complex Boolean phrases. For
example, (* AND *) AND (* OR *).
6
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
Disclaimer for Internet use
SECTION 5
The school will supervise pupils and take all reasonable precautions to ensure that users access only
appropriate material. In line with Devon LEA policy, Gatehouse Primary School will provide a filtered
Internet service.
No system can be completely effective and a combination of approaches will be required in
addition to adequate supervision. All staff, governors, parents and advisers will work to establish
agreement that every reasonable measure has been taken. Due to the process involved in
publishing information on the Internet, it is not possible to guarantee that unsuitable material will
never appear on a computer screen
Neither the school nor Devon LEA can accept liability for the materials accessed, or any
consequences thereof.
In addition:
 The school will work in partnership with parents, the LEA, DfES and the Internet Service
Provider (ISP) to ensure systems to protect pupils are reviewed and improved.

Members of the school’s Senior Management team will ensure periodic checks are made to
substantiate that the filtering methods employed are effective in practice.

If unsuitable sites are discovered by anyone belonging to the school community, a member
of staff will report the URL and content without delay to the Network Manager and this will
be passed to the ISP provider. The SMT will be informed if necessary.
Information on our Internet Filtering Service
SECTION 6
Our Internet filtering service is provided by RM SafetyNet. All information relating to how this works is
provided on the following web site:
http://www.ifl.net/support/filteringpolicy.html
RM SafetyNet is provided as part of our service from the SWGFL consortium, who provide our
broadband provision.
7
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
Guidance on the use of all Communications
Technologies
SECTION 7
A wide range of rapidly developing communications technologies has the potential to enhance
learning. The following table shows how the school currently considers the benefit of using these
technologies for education outweighs their risks / disadvantages:
Mobile phones may be brought to school

Not allowed
Allowed with staff permission
Allowed at certain times
Allowed
Students / Pupils
Not allowed
Allowed only if checked by
Network manager
Allowed at certain times
Communication Technologies
Allowed
Staff & other adults

Yr 5/6

Use of mobile phones in lessons
Use of mobile phones in social time



Taking photos on personal mobile phones or other camera
devices


Use of hand held devices e.g. PDAs, PSPs



Use of personal storage devices (e.g., pen drives) *

Use of personal email addresses on school network
(including hotmail, google mail, yahoo mail, etc.)


Use of school email for personal emails on school network


Use of chat rooms / facilities on school network


Use of instant messaging on school network


Use of social networking sites on school network


Use of blogs on school network


* Note that personal storage devices (e.g. pen drives and external hard drives) should not be used by staff or
children, as the risk of infecting the school network is considered too high. In the rare case that use of such a
device is considered essential, permission must be sought from the Network Manager, who will need to
check the device prior to use.
8
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
Unsuitable / inappropriate activities
Users shall not
visit Internet
sites, make,
post,
download,
upload, data
transfer,
communicate
or pass on,
material,
remarks,
proposals or
comments that
contain or
relate to:
Unacceptable
and illegal
Unacceptable
Acceptable for
nominated users
User Actions
Acceptable at
certain times
Acceptable
The school believes that the activities referred to below are inappropriate in school and that users
should not engage in these activities in school or outside school when using school equipment or
systems.
child sexual abuse images

promotion or conduct of illegal acts, e.g. under child protection,
obscenity, computer misuse and fraud legislation

adult material that potentially breaches the Obscene
Publications Act in the UK

criminally racist material in UK

pornography

promotion of any kind of discrimination

promotion of racial or religious hatred

threatening behaviour, including promotion of physical violence
or mental harm

any other information which may be offensive to colleagues,
breaches the integrity of the ethos of the school or brings the
school into disrepute

Using school systems to run a private business

Use systems, applications, websites or other mechanisms that bypass the
filtering or other safeguards employed by SWGfL and / or the school

Uploading, downloading or transmitting commercial software or any copyrighted
materials belonging to third parties, without the necessary licensing permissions

Revealing or publicising confidential or proprietary information (e.g. financial /
personal, databases, computer / network access codes and passwords)

Creating or propagating computer viruses or other harmful files

Carrying out sustained or instantaneous high volume network traffic
(downloading / uploading files) that causes network congestion and hinders
others in their use of the internet


On-line gaming (educational)
On-line gaming (non educational)

On-line gambling


On-line shopping / commerce
office only
File sharing

Use of social networking sites apart from Merlin e.g. Bebo, Facebook for older
users

Use of video broadcasting e.g. Youtube on school network

9
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
Procedures for responding to incidents of misuse of
Communications Technologies
SECTION 8
We expect all members of the school community to be responsible users of ICT, who understand
and follow this policy. However, there may be times when infringements of the policy take place,
through careless, irresponsible or, very rarely, deliberate misuse.
Illegal misuse
If any apparent or actual misuse appears to involve illegal activity the SWGfL flow chart below is
consulted and followed, in particular the sections on reporting the incident to the police and the
preservation of evidence.
Illegal activity would include:
 child sexual abuse images
 adult material which potentially breaches the Obscene Publications Act
 criminally racist material
 other criminal conduct, activity or materials
If members of staff suspect that any misuse might have taken place it is essential that correct
procedures are used to investigate, preserve evidence and protect those carrying out the
investigation.
Reporting of such incidents should follow the schools procedure identified in the
Safeguarding Policy. Reports should be made directly to the allocated Child Protection
Officers (Head / Deputy)
10
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
Misuse by pupils
It is more likely that the school will need to deal with incidents that involve inappropriate rather than
illegal misuse. Incidents of misuse will be dealt with through behaviour / disciplinary procedures as
follows:

Deliberately accessing or trying to access
material that could be considered illegal (see
list in earlier section on unsuitable /
inappropriate activities).
Further sanction eg
detention / exclusion
Warning
Removal of network /
internet access rights
Refer to Police
Refer to Headteacher
Refer to team leader
Refer to class teacher
Incidents:
Inform parents / carers
Actions / Sanctions
Refer to Network Manager
(Kevin Frost)
Students / Pupils

Unauthorised use of non-educational sites during
lessons



Unauthorised use of mobile phone / digital
camera / other handheld device



Unauthorised use of social networking / instant
messaging / personal email



Unauthorised downloading or uploading of files



Allowing others to access school network by
sharing username and passwords



Attempting to access or accessing the school
network, using another student’s / pupil’s
account



Attempting to access or accessing the school
network, using the account of a member of staff



Corrupting or destroying the data of other users



Sending an email, text or instant message that is
regarded as offensive, harassment or of a
bullying nature



Continued infringements of the above, following
previous warnings or sanctions







Actions which could bring the school into
disrepute or breach the integrity of the ethos of
the school







Using proxy sites or other means to subvert the
school’s filtering system



Accidentally accessing offensive or pornographic
material and failing to report the incident



Deliberately accessing or trying to access
offensive or pornographic material



Receipt or transmission of material that infringes
the copyright of another person or infringes the
Data Protection Act



Instances of inappropriate use by pupils will need to be made aware to the Network Manager as soon as
possible. The Network Manager, in consultation with the class teacher, will use the “Inappropriate ICT use
form - pupils” to record incidents and actions taken (see Appendix C). This will then be monitored by the
head, who will decide whether additional actions to those highlighted on the table are necessary.
11
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
Misuse by staff
Staff
Actions / Sanctions
Deliberately accessing or trying to access
material that could be considered illegal
(see list in earlier section on unsuitable /
inappropriate activities).

Excessive or inappropriate personal use of the
internet / social networking sites / instant
messaging / personal email


Unauthorised downloading or uploading of files


Allowing others to access school network by
sharing username and passwords or attempting
to access or accessing the school network,
using another person’s account


Careless use of personal data eg holding or
transferring data in an insecure manner


Deliberate actions to breach data protection or
network security rules


Corrupting or destroying the data of other users
or causing deliberate damage to hardware or
software


Sending an email, text or instant message that
is regarded as offensive, harassment or of a
bullying nature


Using personal email / social networking /
instant messaging / text messaging to carrying
out digital communications with students /
pupils


Actions which could compromise the staff
member’s professional standing


Actions which could bring the school into
disrepute or breach the integrity of the ethos of
the school


Using proxy sites or other means to subvert the
school’s filtering system


Accidentally accessing offensive or
pornographic material and failing to report the
incident


Deliberately accessing or trying to access
offensive or pornographic material


Breaching copyright or licensing regulations


Continued infringements of the above, following
previous warnings or sanctions


Disciplinary action
Suspension
Warning
Refer to Network Manager
(Kevin Frost)
Refer to Police
Refer to Headteacher
Refer to team leader
Refer to class teacher
Incidents:

Instances of inappropriate use by staff will need to be made aware to the Network Manager and head as
soon as possible. The “Inappropriate ICT use form - Staff” will be used to record incidents and actions taken
(see Appendix C). The head will decide whether additional actions to those highlighted on the table are
necessary.
12
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
Appendix A

–
Glossary of terms used.
SECTION A
Internet:
The Internet is a large number of computers all over the world linked together with cables. Access
to the Internet is through a phone line, ISDN or ADSL link through an ISP (Internet Service Provider)
which links to the NSP (Network Service Provider) on the Internet backbone.

World Wide Web:
The World Wide Web (WWW) is only one part of the Internet, but the most popular for educational
purposes. The WWW is constructed of hyperlinked pages that can contain text, pictures, video, etc.
Its ease of use through browsers and search services means that it is the most attractive way to use
the Internet.
 E-mail:
This is merely a way of sending messages from one person to another via the Internet – each user
has their own unique address (e.g. [email protected]).
 Newsgroups:
These are collections of messages written for public readership rather than addressed to an
individual. Each collection, or group, of messages is about a particular subject or theme. Individuals
can reply to these messages, and these replies are also public.
 Chat Rooms:
These are areas of the WWW run through browsers or specific software programs (e.g. ICQ) where
people can meet to chat on the Internet in real-time. These rooms also have private chat areas
where users can chat on a one-to-one basis.
 Search Services:
Web sites, such as search engines, Metasearch engines, directories and portals that keep and
provide categorised lists of sites. A user types in (a) keyword(s) or searches a directory to locate a
site on a particular topic. The type of search service used should determine how it is used.
o Blogs, Wikis and Flickr (new technologies)
A blog is a website for a specific group that they can access and write to. Wikis are websites that
can be amended by anyone. Flickr is a photo sharing website.
 Blogs/Wikkis/ Tiddly Wikki/RSS feeds / podcasts
These new technologies probably have immense possibilities to improve children’s learning, not to
mention their ICT capability. The usage of these must go hand in glove with the school’s over riding
policy of safety for the children. Hence any usage needs exploring to locate any dangers. Staff
must retain confidence that they are in charge of these technologies. Names and Pictures of
children must never be linked (see section 2).
Additional Glossaries and Documents:
Signpost to safety: Teaching e-safety at key stage 1 and 2
E-safety developing whole school policy
Safeguarding children online- a guide for school leaders
School Behaviour Policy – includes cyber bullying
13
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
Appendix B
Copies of a posters for pupils Internet use
SECTION B
Gatehouse Primary School
Remember when using the Internet
14
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
A Key stage 1 poster.
15
Gatehouse E-safety Policy 27/06/17
Version 4.0.0

Internet Use Computer Room Poster
Gatehouse Primary School
Responsible Internet Use
Rules for Pupils and Students
The school computer system provides Internet access to pupils and students. This
Responsible Internet Use statement will help protect you by clearly stating what is
acceptable and what is not.

Access must only be made via the user's authorised account and password, which
must not be given to any other person.

School computer and Internet use must be appropriate to your education – computers
are limited so USE THEM FOR WORK!

Copyright and intellectual property rights must be respected.

Users are responsible for e-mail they send and for contacts made. E-mail should be
written carefully and politely. As messages may be forwarded, e-mail is best regarded
as public property. Anonymous messages and chain letters must not be sent.

When using search services on the Internet, GOOGLE is the most effective. The use of
public chat rooms is not allowed.

Use for personal financial gain, gambling, political purposes or advertising is forbidden.

The security of any ICT systems must not be compromised, regardless of ownership.

Never download or store inappropriate materials or materials which may cause harm
to the computer system.
The school monitors your Internet use through various electronic means, including the web
sites you visit, the e-mails you send and through these monitoring processes can locate
inappropriate materials your may have downloaded to your user area.
You will be denied access to the Internet at school if you break these rules at any time.
USE THE INTERNET SAFELY AND APPROPRIATELY
16
Gatehouse E-safety Policy 27/06/17
Version 4.0.0

Pupil fact sheet
Gatehouse Primary School
Responsible Internet Use
Rules for Pupils
The school computer system provides you with Internet access. This Responsible
Internet Use leaflet will help protect you by clearly stating what is acceptable and
what is not. Read it and learn the rules! If you do not understand any, ASK!

You are only allowed to use your own network username and password. You
must not let anyone else know this.

You should only use the school computers and Internet FOR WORK!

Do NOT plagiarise material you see on the Internet. This means you should put
material into your own words. Copyright and intellectual property rights must
be respected.

We do follow the SMART system of using the Internet. Posters will be on display
around the school.

You must not use the school computer system to compromise the security of
the network or the security of any other computer systems EVER. Never
download or store inappropriate materials or materials which may cause
harm to the computer system.

When searching on the Internet – the school recommends Google
(www.google.com).
The school monitors your Internet use through various electronic means, including
the web sites you visit, the e-mails you send and through these monitoring
processes can locate inappropriate materials you may have downloaded to your
user area.
You will be denied access to the Internet at school if you break these rules at any
time.
17
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
Date
Incident
reported by
Details of incident
Inappropriate use of ICT form - children
Referred
to head
Action taken
Records kept by Network Manager (Kevin Frost)
Appendix C
Copy of “Inappropriate ICT use forms”
Gatehouse E-safety Policy 27/06/17
SECTION C
Version 4.0.0
18
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
19
Reported by:
Date of report:
Inappropriate use of ICT form - staff
Details of incident
Name of Staff member:
kept by Head )
Action taken
(Records
Appendix D
“Request for unfiltered access” form
REQUEST FOR UNFILTERED
ACCESS
Requested by:
SECTION D
Date:
(record to be kept by Network Manager)
Site address
www.
Reason for wanting unfiltered
access to site
I confirm that I have investigated
this site and believe it should be
given unfiltered access
Signed: Staff member _________________________
I confirm that I have investigated
this site and have given it unfiltered
access
Signed: Kevin Frost
REQUEST FOR UNFILTERED
ACCESS
Requested by:
_________________________
Date:
(record to be kept by Network Manager)
Site address
www.
Reason for wanting unfiltered
access to site
I confirm that I have investigated
this site and believe it should be
given unfiltered access
Signed: Staff member _________________________
I confirm that I have investigated
this site and have given it unfiltered
access
Signed: Kevin Frost
_________________________
20
Gatehouse E-safety Policy 27/06/17
Version 4.0.0
Policy review carried out by Luke Harman in consultation with Angela Jeffrey (Head), Ashley Leeson
(Deputy) and Kevin Frost (Network Manager). Completed November 2012
21
Gatehouse E-safety Policy 27/06/17
Version 4.0.0