Specifications | Parent Owned Notebook Use Policy

Parent Owned Notebook Use Policy
Mount Lawley Senior High School
PARENT OWNED NOTEBOOK
ACCEPTABLE USE AGREEMENT
PA R EN T OW N E D N OT E B O O K U SE PO L IC Y
PARENT OWNED NOTEBOOK : ACCEPTABLE USE AGREEMENT
INTRODUCTORY LETTER3
australian assessment & reporting authority (ACARA)
Australian curriculum information communication technology (ICT) 3-4
table of contents
1
PARENT OWNED NOTEBOOK AND OVERVIEW
5-6
2
DEPARTMENT OF EDUCATION/SCHOOL7
2.1 Online Services7
3
information communications technologies usage GUIDELINES
7
Introduction7
3.1 Responsibilities – Students8
3.2 Responsibilities – Parents/Caregivers8
3.3 Responsibilities – Teaching Staff8
3.4 Responsibilities – The School8
4GUIDELINES FOR PROPER CARE OF NOTEBOOK
9
4.1 Security and Storage9
4.2 Transport and Handling Procedures9
4.3 Occupational Health and Safety Guidelines
9
4.4 General Care of the Notebook Computer
9
4.5 Loss or Damage/Insurance/Warranty9
4.6 Data Management10
4.7 Printing10
4.8 Virus Protection10
4.9 Software10
5ACCEPTABLE USE AGREEMENT10
5.1 Use of Facilities11
5.2 Proper Conduct11
5.3 Access Security and Privacy11
5.4 Internet Usage 12
5.5 Software Copyright Regulations13
5.6 Social Networking Sites (IRC, ICQ, Skype, Facebook, QQ, Twitter etc)
13
5.7 CyberSafety13
:Breaches of Conditions13
5.8 Games14
6FREQUENTLY ASKED QUESTIONS14-17
7CHECKLIST17
8
2
ACCEPTABLE USE AGREEMENT FORM19
Achievement Excellence Tolerance Respect Perseverance Learning
PA R E N T O W N E D N OT E B O O K U SE POL IC Y
The Melbourne Declaration on Educational Goals for Young Australians has as one of its central components, the development and attainment of core competencies in information and communication technologies (ICT) in a rapidly changing world. As part of our ongoing commitment to deliver the best ICT in
an educational setting, we have had to look at an ICT model which is economically sustainable in order to
continue to foster effective teaching and learning in all our learning areas. Students need to develop the
essential skills to become effective and creative users of information and communication technologies.
Letter TO PARENT/CAREGIVER
It is with this in mind that a voluntary Parent Owned Model of notebooks for students will be adopted. The
information brochure identifies many of the queries parents are likely to have as well as provide information and suggested action. The model will provide benefits such as ensuring that all students have access
to notebooks from their entry into high school to their completion of school. It will also enable teachers
to develop ICT based strategies in all their preparation and teaching as required. Notebooks can play an
integral part in a student’s educational environment.
As a school, we are also aware that for some parents and caregivers the parent owned model may be financially challenging, however we believe it is in the best interests of each child to be able to access this
technology as soon as practicable. Various options are available in the market place to minimize the initial
cost outlay, including rent/buy options. From a school perspective, we have determined a platform that we
can effectively support and which provides all the essential software for free, minimising total cost outlay.
Students who do not own a notebook will still have access to computers in the laboratories and library
and may borrow one for daily use subject to its return it at the end of the day. It will not be permitted to
be taken home. Students who have their computers in for repairs or are awaiting insurance claims will be
able to get a loan computer from the school. This will enable all staff and students to continue their learning programs without interruptions. Mount Lawley SHS is committed to ensuring students have equitable
access to technology.
I hope you are able to share with us your son’s/daughter’s ICT educational journey. We see it as essential
preparation for a rapidly changing world by equipping students with the skills required to remain competitive in any environment.
AUSTRALIAN CURRICULUM, ASSESSMENT AND REPORTING AUTHORITY (ACARA):
AUSTRALIAN CURRICULUM information communication technology (ICT)
In the Australian Curriculum, students develop ICT capability as they learn to use ICT effectively and appropriately to access, create and communicate information and ideas, solve problems and work collaboratively in all
learning areas at school, and in their lives beyond school. The capability involves students in learning to make
the most of the digital technologies available to them, adapting to new ways of doing things as technologies
evolve and limiting the risks to themselves and others in a digital environment.
The nature and scope of ICT capability is not fixed, but is responsive to ongoing technological developments. This
is evident in the emergence of advanced internet technology over the past few years and the resulting changes in
the ways that students construct knowledge and interact with others.
Students develop capability in using ICT for tasks associated with information access and management, information creation and presentation, problem solving, decision making, communication, creative expression,
Achievement Excellence Tolerance Respect Perseverance Learning
3
PA R EN T OW N E D N OT E B O O K U SE PO L IC Y
and empirical reasoning. This includes conducting
research, creating multimedia information products,
analysing data, designing solutions to problems, controlling processes and devices, and supporting computation while working independently and in collaboration with others.
ACARA AUSTRALIAN CURRICULUM ICT
Students develop knowledge, skills and dispositions
around ICT and its use, and the ability to transfer these
across environments and applications. They learn to
use ICT with confidence, care and consideration, understanding its possibilities, limitations and impact on
individuals, groups and communities.
ICT capability supports and enhances student learning across all areas of the curriculum. Students develop and apply ICT knowledge, skills and appropriate social
and ethical protocols and practices to investigate, create and communicate, as well as developing their ability to
manage and operate ICT to meet their learning needs.
Learning areas provide the content and contexts within which students develop and apply the knowledge, skills,
behaviours and dispositions that comprise ICT capability. ICT capability is based on the assumption that technologies are digital tools that enable the student to solve problems and carry out tasks. That is, the ICT system needs to suit the student and the task, while the student needs to develop an understanding of what the
machine can do and an appreciation of the limitations under which it operates. In this way, students come to
perceive ICT systems as useful tools rather than feeling that they themselves are the tools of the machine (Maas
1983). The latter often occurs when users have little information about how ICT systems operate and simply follow set, standard procedures, determined for them by the system.
Therefore, the ICT capability needs to take account of the types of tasks that provide authentic contexts for learning. The range of tasks is categorised into three sets: Investigating with ICT, Communicating with ICT and Creating with ICT. Students also need the knowledge and skills to use ICT based on an understanding of the ‘nature of
the machine’. This is encompassed in the Managing and operating ICT element of the continuum.
Source: http://www.australiancurriculum.edu.au/GeneralCapabilities/information-and-communication-technology-capability/introduction/introduction
Where to from here?
rr Be familiar with these guidelines
rr Read, sign and return the Acceptable Use Agreement Form (Page 19)
rr Give the signed Form to your child to return to the front office
rr Consider which MacBook Air
rr Look to purchase/rent/lease the notebook
rr AppleCare Warranty
rr Insurance
rr External Hard Disk for Back ups
rr Cover
4
Achievement Excellence Tolerance Respect Perseverance Learning
PA R E N T O W N E D N OT E B O O K U SE POL IC Y
Mount Lawley Senior High School has traditionally had a mix of desktop and notebook computers.
As part of the previous Federal Government initiative NSSCF (National Secondary Schools Computer Funds) Mount Lawley Senior High School
introduced a 1:1 notebook program for students
in Years 10-12. Unfortunately the NSSCF program
has been discontinued. As such, MLSHS has had
to introduce a new model of deployment with
which to maximise student access to technologies. We believe this is best achieved by students
owning their own notebooks.
Why do we need computers in the classroom?
Melbourne Declaration on Educational Goals
for Young Australians and the Australian Curriculum
The Melbourne Declaration, committed to by all
Australian governments, is a blueprint of what
Australian students should attain in the ten year
period from 2008 until 2018. A core component
of this declaration is the development and attainment of core competencies in information and
communication technologies (ICT). Rapid and
continuing advances in ICT are changing the ways
people share, use, develop and process information and technology. In this digital age, young
people need to be highly skilled in the use of ICT.
While schools already employ these technologies
in learning, there is a need to significantly increase
their effectiveness over the next decade. Students
must develop the essential skills in literacy and
numeracy and become creative and productive
users of technology, especially ICT, as a foundation for success in all learning areas. One of our
goals is to equip our students to become 21st
Century learners, having access to their work anywhere and anytime. It also helps students prepare
for their tertiary studies through access to online
learning tools. The Australian Curriculum includes
ICT as part of every student’s development. The
Australian Curriculum includes seven general capabilities.
Bloom’s Taxonomy (Benjamin Bloom, ‘Taxonomy
of Educational Objectives: The Classification of
Educational Goals’) is a classification of learning
objectives within education. Bloom’s Taxonomy
is considered to be a foundational and essential
element within the education community. Within
the cognitive domain it is desirable for students to
move from remembering to understanding, then
applying and analysing before they can eventually evaluate and create. One of our major roles as
educators is to enable this progression.
PARENT owned NOTEBOOK & OVERVIEW
1. PARENT OWNED NOTEBOOK OVERVIEW
The SAMR (Substitution, Augmentation, Modification and Redefinition) model developed by
distinguished educator, Dr Ruben Puentedura,
shows a progression that adopters of educational
technology often follow as they progress through
teaching and learning with technology. This progression allows students to progress through the
levels of Bloom’s Taxonomy from low level recall
of information to creation and evaluation of their
own information. As you move along the SAMR
continuum, computer technology becomes more
important in the classroom but at the same time
becomes more invisibly woven into the demands
of good teaching and learning. Mount Lawley
Senior High School staff participate in, regularly
provided, sessions designed to facilitate this journey, and therefore enhance the teaching and
learning in their classrooms. Teachers can only
enable this enhanced learning when their
students have access to robust hardware, running shared software on a stable network. (The
diagram overleaf illustrates the fusion of Bloom’s
Cognitive Taxonomy and the SAMR Model)
The voluntary Parent Owned Model will be implemented across the school in 2015. The school will
endeavour to facilitate this process as smoothly
as possible. This program has the capacity to connect education with today’s technological world
and provide an experience rich environment for
students. The school has a Strategic Plan with a vision to establish an e-Iearning environment that
will:
• excite and motivate students,
• promote independent and flexible learning,
Achievement Excellence Tolerance Respect Perseverance Learning
5
PARENT owned NOTEBOOK & OVERVIEW
PA R EN T OW N E D N OT E B O O K U SE PO L IC Y
• be sustainable and affordable,
• fully engage staff and students,
• enhance and improve learning and teaching by providing relevant and engaging technologies.
Although the notebooks are owned by parents,
students must agree to the terms and conditions in the “Acceptable Use Agreement” whilst at
school.
As part of the program, parents will be asked to
purchase a specified notebook, the MacBook Air.
Insurance, notebook covers and external hard
disks for backup are required to ensure care and
maintenance of the computer, continuous learning and to avoid losing data.
This document comprising the ICT Usage Guidelines and the Acceptable Use Agreement has been
written to provide you with valuable information
relating to the provision and acceptable use of
the notebook computer at school and at home.
Read the information carefully with your child and
consider implementing appropriate measures at
home to ensure your child uses the computer
safely, responsibly and ethically.
6
Achievement Excellence Tolerance Respect Perseverance Learning
The school must receive an Acceptable Usage
Agreement signed by the student and parent/
caregiver before being granted students access
to online services. Please read, sign and return the
Acceptable Use Agreement. If you have any queries and/or require further assistance regarding
these documents, please do not hesitate to contact the school on 9471 0300.
2.
DEPART
PA R E N T O W N E D N OT E B O O K U SE POL IC Y
No student within the school is authorised to access another person’s email or data.
2.1 ONLINE SERVICES
Online Services provided to students in public
schools will only be used for learning related activities and require informed parental/caregiver
consent and appropriate management. Please
read and make yourself familiar with this policy.
These conditions apply to all: ICT using the
school’s network, school computers and systems,
privately owned computers and tablets, phones,
laboratories, computer facilities, networks, peripherals, software and data.
http://www.det.wa.edu.au/policies/detcms/policyplanning-and-accountability/policies-framework/
policies/students-online/
3. INFORMATION COMMUNICATIONS
TECHNOLOGIES (ICT) USAGE GUIDELINES
Use of the facilities is subject to conditions which
are designed to keep the infrastructure operational, in good order and to generate an educational
environment that is productive, ethical, legal, secure and effective.
INTRODUCTION
The integration of notebook computers and
supporting information technology equipment
into the classroom represents an exciting era at
Mount Lawley Senior High School. Information
technologies can provide a wealth of rich educational resources and tools, that when used effectively, can deliver very positive teaching and
learning outcomes. We are focused on utilising
technologies to not only engage students but to
provide the capacity to optimise learning and to
be creative and innovative. We also believe that
technologies allow for differentiated learning to
occur, providing scaffolding for all our students to
participate to the best of their ability. It is also our
aim to provide for a learning process that allows
for “anytime, anywhere” learning. This has been
developed to provide students with optimum
opportunities to continue their learning on multiple platforms and hardware, be it on their smart
phones, iPads or other devices. This has been
achieved through a concerted effort of providing students with a state of the art infrastructure
that will permit ‘anytime, anywhere’ learning. Our
infastructure will complement this capacity and
enable students to develop the necessary skills to
navigate through their educational requirements.
However, if the implementation of new technologies is not properly controlled, there are certain
pitfalls that students may encounter.
In order to ensure that the facilities function in a
secure, efficient and effective manner, the school
reserves the right to examine any computer on its
facilities and to monitor usage.
The Department of Education supports students
in the appropriate and safe use of their notebooks.
By alerting parents and students to potential dangers, developing guidelines and providing advice
All activities conducted using the online services
may be logged and accessed for administrative,
legal or security purposes at any time. This includes but is not limited to email, calendaring,
instant messaging, web browsing, web conferencing, discussion groups, online file sharing and
storage, and Internet access.
The School
Mount Lawley Senior High School respects and
values academic freedom, the academic ethos
and the rights of students, staff, parents and caregivers who make up the school community. The
school must comply with laws and other legal obligations regarding the use of its communications
and information technology infrastructure, within
the jurisdiction in which it operates. The school
has decided upon the following conditions of use
for school Information, Communication Technologies (ICT) facilities.
School ICT facilities are for the purpose of schoolrelated teaching, learning, research, administration and other school related activities.
Achievement Excellence Tolerance Respect Perseverance Learning
DEpartment of education/school
2. DEPARTMENT OF EDUCATION/SCHOOL
7
PA R EN T OW N E D N OT E B O O K U SE PO L IC Y
ICT USAGE GUIDELINES
and support, the exposure of students to future
problems can be minimised.
This document is specifically aimed at parents
and students and details the policy, guidelines
and support strategies to ensure that students are
able to make effective use of their notebooks and
avoid any problems.
Authentication
Authentication is an identity and permissions
check performed with a user ID and password
when a user logs on to a computer system.
Within this document you will find an Acceptable
Use Agreement to sign and return. (Page 19)
No attempt should be made to avoid authentication
It is likely that students will have their notebooks
for a number of years. Back up software/hardware
will be an important part of preserving valuable
data throughout the years.
3.2 Parents / Caregivers
Parents or caregivers are required to take responsibility for conveying the importance of the policy
guidelines in this document and other school
policies to their children. They should also monitor their child’s use of the notebook, especially at
home, including access to media and information
sources.
RESPONSIBILITIES
3.1 Student
Students must use their notebook computers and
the school computer network responsibly. Communications on the information networks are often public and school computer usage rules for
student behaviour, conduct, safety and standards
will apply.
Students must understand that the computer will
operate on a monitored school network system.
When using their notebook and accessing school
information resources, students must follow the
policy and guidelines detailed in this document.
Students who fail to honour the Acceptable Use
Policy may forfeit access to the Internet and/or
school network.
It is the student’s responsibility to bring the notebook fully charged to school each day. This is essential.
Authorised Users
Persons authorised to use school ICT resources
are:
•
students enrolled in the School.
•
staff employed by the School.
8
•
other persons having special
authorisation from the Principal or
nominee.
Achievement Excellence Tolerance Respect Perseverance Learning
3.3 Teaching Staff
School teaching staff will monitor use of the notebooks in accessing curriculum information. They
will also provide guidance and instruction to students in the appropriate use of such resources.
This includes staff facilitating student access to
information on their notebooks in support of, and
to enrich the curriculum while taking into account
the varied instructional needs, learning styles,
abilities and developmental levels of students.
3.4 The School
The school commits to upholding the ICT Usage
Guidelines and providing physical and financial
resources to enable safe, educationally relevant
access to the notebooks and relevant curriculum
facilities for staff and students. To enable this, the
school has invested in specialised software to allow for the notebooks to automatically join the
school’s network on student arrival and to automatically disconnect them on departure.
The school has a responsibility to verify that information published on the Internet by students
under the school’s name meets all legal requirements and community standards in relation to
copyright and safety.
PA R E N T O W N E D N OT E B O O K U SE POL IC Y
4.2 Transport and Handling
Procedures
Students are encouraged to purchase a protective
notebook case or carry bags. The covers should
have sufficient padding to protect the notebook
during normal treatment.
4.3 Occupational Health and Safety
Guidelines
The basic health and safety guidelines for desktop
computers also apply to notebook use.
• Keep the upper arms relaxed at the side of the body.
• Bend the elbows to around 90 degrees.
• Keep the wrists straight.
• Change position every 15-20 minutes and take
a complete break to get up and move your body
every 30-60 minutes.
Students with special needs will be catered for according to Department of Education guidelines.
4.4 General Care of your Notebook
Computer
In order to achieve this, students must follow
some simple guidelines. Students should not:
• do anything likely to cause damage to any
equipment, whether deliberately or otherwise or
carelessly vandalise equipment which may damage the school’s infrastructure;
• eat or drink near the notebook in classrooms;
• attempt to repair equipment at school;
• remove any covers or panels at school;
• disassemble any part of the notebook at school.
Staff will not accept data loss as an excuse for not
handing in work on time.
4.5 Loss or Damage/Insurance/
Warranty
Since home use brings with it a risk of accidental
damage or theft of the notebook, insurance for
the notebooks is recommended to ensure your
notebook is covered for loss or damage.
. Check your insurance policies regarding the
notebook. If an insurance claim is partially or
wholly rejected by the insurer, its replacement
rests with parent or caregiver.
GUIDELINES FOR PROPER CARE OF NOTEBOOK
4. GUIDELINES FOR PROPER CARE OF THE NOTEBOOK
IDELINES FOR PROPER CARE OF NOTEBOOK
4.1 Security and Storage
When the notebook is being used away from
school, students should avoid leaving it unattended or where it is visible to the public (eg. in a vehicle). In these circumstances, the notebooks can
become a target for theft. When the notebook is
at home, ensure that normal accepted domestic
security practices are followed.
If loss or damage or theft occurs, either the student, or their parent/caregiver should report the
incident to the Police. The school will not assume
responsibility for the loss, damage or otherwise of
your computer. A police incident report number
may be required for insurance claim purposes.
You must carefully check your insurance policy
to make sure it meets your needs. The cost of all
non-warranty repairs due to negligence, damage
or other reasons will be the responsibility of parent/caregivers.
It is recommended that the notebook has the student’s name on a label on the underside of the
notebook to assist return to the owner should the
notebook become lost.
AppleCare warranty is required as part of your purchase. AppleCare Protection provides an extended
warranty and 24/7 telephone support. Make sure
AppleCare and insurance is part of any leased or
rental options.
Achievement Excellence Tolerance Respect Perseverance Learning
9
PA R EN T OW N E D N OT E B O O K U SE PO L IC Y
4.6 Data Management
Saving or data backup is the student’s responsibility. To backup their work it is required that
students purchase an external hard drive. The external hard drive should be configured as a “Time
Machine” at home, which creates a daily backup
of all work.
ACCEPTABLE USE AGREEMENT
4.7 Printing
Printing will be supervised by the teacher in
charge of the learning area in which the student
wishes to print materials. Students must arrange
for this to be conducted during class time or at another time convenient for the classroom teacher.
Students should minimise printing at all times by
print-previewing, editing on screen rather than
on printouts and spell-checking before printing.
Students should not load paper into printers without permission
4.8 Virus Protection
The notebooks should be configured with antivirus software, which regularly and automatically
checks for viruses on the notebook. On the detection of a virus or the suspicion of a viral infection,
the student must inform the Network Administrator. Keeping vigilant will protect your work and
the network from the destructive nature of viruses. Free anti-virus applications are available. The
school’s network is protected from viruses.
4.9 Software
Upon purchase, the notebook will already be imaged with a variety of software. The school has
appropriate licences for any additional software
it places on the notebook. Students should ensure that all other software meets with the legal
requirements. In other words, ALL software on
any ICT device must be legal. Inappropriate or illegal software must not be put on any ICT device.
Downloaded software must be legal and not infringe on any intellectual property rights. Offensive or other such material must not be on the
notebook. Making illegal copies of material and
passing it on to others is prohibited.
10
Achievement Excellence Tolerance Respect Perseverance Learning
5. ACCEPTABLE USE AGREEMENT
Our ICT Acceptable Use Agreement is an agreement that formally sets out the rules of use of software, networks, printers and the Internet. All staff
and students that are accessing the Department
of Education and School System are bound by Department of Education and the School’s rules of
use.
Computer operating systems and other software
have been set up to maximise the usefulness of
the notebook computers.
5.1 Use of Facilities
• A user may use only those facilities for which
they are authorised.
• Facilities may be used only for the purposes for
which they have been provided and may not be used for other projects, private commercial or
private consulting work, unless specifically sanctioned by the Principal or nominee.
• Facilities must not be wasted or consumed by
inappropriate or irresponsible use.
• No attempt should be made to tamper with any
facility in any way which might alter or impede its use by others.
• Equipment may not be attached to school networks or equipment unless authorised by the
school.
• Users must not harass others, including using
computing facilities to send obscene, abusive, fraudulent, threatening or unnecessarily repetitive messages.
• Users must not involve themselves in any action
that is unethical, illegal, of malicious intent, is in
breach of the Communications Act or any state or
federal law, is in breach of any school rule, or brings the school into disrepute.
• Users must inform staff immediately if they
identify a security breach. They must not inform
any other user.
• The school reserves the right to withdraw or
modify authorization or access to facilities without notice.
PA R E N T O W N E D N OT E B O O K U SE POL IC Y
5.3 Access Security and Privacy
Computer accounts are for the exclusive use of
the person to whom they are allocated and must
not be used by anyone else.
It is a condition that students agree to the monitoring of all activities including their files, e-mail
and Internet access whilst on the school network.
Monitoring and logging of all access to the Internet including email will be periodically scanned
to ensure that undesirable Internet sites have
not been accessed and that the content of email
remains within the guidelines described in this
document.
ACCEPTABLE USE AGREEMENT
5.2 PROPER CONDUCT
Students are prohibited from:
• Bringing or downloading unauthorised programs, including games, to the school.
• Online Internet games.
• Deleting, adding or altering any configuration
files for the school network.
• Breaking software copyright. Copyright is to be
observed at all times. It is illegal to copy or distribute school software. Illegal software from other
sources is not to be copied to or installed on any
school equipment.
• Introducing any virus or program that reduces
system security or effectiveness.
• Attempting to log into the network with any
user name or password that is not their own, or change any other person’s password.
• Revealing their network password to anyone
except the System Administrator. Students are
responsible for everything done using their accounts and everything on their notebooks. Since passwords must be kept secret, no user may claim
that another person entered their home directory
and did anything to cause school rules to be broken.
• Using or possessing any program designed to
reduce network security.
• Entering any other person’s file directory or doing anything whatsoever to any other person’s
files.
• Attempting to alter any person’s access rights.
• When the computer is on school grounds, it
must remain connected to the school network.
• Storing the following types of files:
◊ obscene material: pictures or text;
◊ obscene filenames;
◊ insulting material;
◊ password-protected files;
◊ discriminatory materials;
◊ copyrighted materia: unless they own the copyright or
have the owners permission.
Passwords must not be divulged to any other person.
Every reasonable precaution must be taken to
ensure that passwords, accounts and data are adequately secured.
No attempt should be made to find out another
user’s password, nor to gain access to another
user’s account.
Regardless of the prevailing level of security, users
must not:
• publish video recordings, photographs or comments of students without explicit written
permission from the student’s parents.
• attempt to examine, disclose, copy, rename, delete or modify another person’s data.
• attempt to recover deleted data belonging to
someone else.
• attempt to subvert any restrictions imposed on
the use of any facility.
• access any data or software except that which
belongs to, or has been provided for the use of
that user.
• forward any emails to another person without
the permission of the sender.
Do not store anything on the notebook that you
are not prepared to share with staff or your parents. Student activity on the notebooks can be
monitored at any time at school, and this may include remotely viewing and taking control of the
notebook. School staff may request access to the
notebook, including access to the Internet browser history, logs, caches and files and programs
stored on the notebook.
Achievement Excellence Tolerance Respect Perseverance Learning
11
PA R EN T OW N E D N OT E B O O K U SE PO L IC Y
ACCEPTABLE USE AGREEMENT
Due to the software installed in these machines,
notebooks have the capacity to make digital images, both still and video. Unless appropriate permissions are sought, the taking of digital images
is an invasion of personal rights. Under no circumstances can notebook computers be used to take
or distribute digital images without both the expressed permission of the person whose image is
being taken and the supervising teacher.
The school cannot monitor use of the notebook
outside of the school, and it is the responsibility
of the parent to ensure it is used appropriately at
home.
5.4 Internet usage
Internet access is expensive and has been provided to assist students’ education. Students must
only use it with permission, and not in any unauthorised way. As the Internet is an unsupervised
environment, the school has a responsibility to
ensure that, as far as possible, material obtained
from the Internet is not offensive or inappropriate. To this end, filtering software has been placed
on the Internet. Ultimately, however, it is the responsibility of individual students to ensure their
behaviour does not contravene rules imposed by
parents/caregivers or the school.
The school is aware that no security system is
perfect and that there is always the possibility of
inappropriate material, intentionally and unintentionally, being obtained and displayed. It is the
responsibility of the school to take action to block
the further display of offensive or inappropriate
material that has appeared on Internet links.
Students must not deliberately enter or remain in
any site that has any of the following content: nudity; obscene language or discussion intended to
provoke a sexual response; racial vilification, violence; information about committing any crime;
information about making or using weapons;
booby traps; dangerous practical jokes or “revenge” activities.
Students must:
• follow school guidelines and procedures when
12
Achievement Excellence Tolerance Respect Perseverance Learning
preparing materials for publication on the web.
• not use material from other web sites unless
they have permission from the person who created the material. If unsure, they should check with
their teacher.
• not access any other material that is considered
inappropriate. If students encounter any such site,
they must immediately turn off the device and
notify a teacher. They should not show the site to
their friends.
• tell a teacher about any information that is inappropriate or makes them feel uncomfortable. Examples of inappropriate content include violent,
racist, sexist, or pornographic materials, or content that is offensive, disturbing or intimidating or
that encourages dangerous or illegal activity.
• close down email programs at the end of each
session to prevent unattended access to your
email.
• not reveal personal information, including
names, addresses, photographs, credit card details and telephone numbers of themselves or
others.
• not give anyone their password.
• not let others use their online services account
unless it is with the teacher’s permission.
• not access other people’s online services accounts.
• understand that they are responsible for all activity in their online services account.
• tell the teacher if they think someone has interfered with or is using their online services account.
• follow the instructions of teachers and only use
online services for purposes which support learning and educational research.
• be courteous and use appropriate language in
all Internet communications.
• not use the Department’s online services for
personal gain or illegal activity, to bully, offend or
intimidate others or send inappropriate materials
including software that may damage computers,
data or networks.
• not damage or disable the computers, ICT systems or networks of the school, the Department
of Education or any other organisation.
• be mindful of the possible problems caused by
PA R E N T O W N E D N OT E B O O K U SE POL IC Y
5.5 Software Copyright Regulations
The school adheres to copyright laws and expects
students to do the same. The notebook is not to
be used for illegally downloading or copying software, games, music, video or other material at
school. There must be no illegal peer to peer filesharing using Torrents or other means. Do not plagiarise i.e. present the work of others as your own.
Only legally obtained software is to be used on
school computing equipment - the penalties
for breaching copyright are very high. All users
of school equipment are warned that any such
breach is the liability of the user. The School will
not be liable for any breaches made by users.
Unauthorized software may not be used on any
school facility.
The school has appropriate licences for all its software. Students should ensure that all other software meets with the legal requirements regarding software. In other words, ALL software on any
notebook must be legal. Downloaded software
must be legal and not infringe on any intellectual
property rights. Offensive or other such material
must not be on the notebook. Making illegal copies and passing them on to others is prohibited.
Copyright on the Internet
All material on the Internet is covered implicitly by
copyright law. Unless the web site states that the
material can be used for educational, non-commercial or other purposes, permission should be
sought to copy that material.
5.6 Social Networking Sites (IRC, ICQ,
Skype, Facebook, QQ, Twitter etc)
Social Networking applications are not to be
used at school by students unless instructed by a
teacher.
5.7 CyberSafety
Parents will be aware of many incidents reported
in the media regarding online safety. Personal
information is easily tracked and harvested by
those who know how, so it is important to keep
as safe as possible while online. The school runs
programs informing students and parents on Cybersafety.
ACCEPTABLE USE AGREEMENT
sharing or transmitting large files online.
• not use the internet for entrepreneurial
purposes.
Parents are encouraged to check the following
sites online for further useful information; the
main government Cybersafety information website is http://www.cybersmart.gov.au. Information
for secondary students can be found at http://
www.cybersmart.gov.au/Teens.aspx
Never reveal personal information, passwords,
addresses, geotagged images, phone numbers
of fellow students and staff, via the notebooks
or school network. Students will not circumvent
school Internet access control systems settings
(including using proxy anonymisers) to access unauthorised web sites. Do not use your notebook
to access inappropriate websites. Students will
not harass, threaten, intimidate or attack others,
either through email, social network sites, chat
sites or other electronic means. Students will use
cybersafe and cybersmart strategies when using the internet at school. If a student becomes a
victim to inappropriate behaviours, teachers and
parents are to be informed.
Students will comply with all school policies, procedures and guidelines in respect to cyber-safety.
The school considers the safety of students as its
highest priority.
Breaches of Conditions
Failure to adhere to the above conditions may be
considered an act of misconduct and appropriate
action may be taken according to school rules. If a
student breaches the terms of the Acceptable Use
Agreement, the student will lose the privilege of
using the notebook in class.
Certain breaches which involve security and/or
access violations may require the School to report
them to the Australian Federal Police or State Police.
Achievement Excellence Tolerance Respect Perseverance Learning
13
PA R EN T OW N E D N OT E B O O K U SE PO L IC Y
FREQUENTLY ASKED QUESTIONS
5.8 Games
Games, listening to music, watching videos, accessing websites not relevant to the lesson, or
any other activity on the notebook which is a distraction will not be tolerated during class time.
This policy will be strictly monitored by the class
teacher and remotely by other staff, and action
will be taken if this policy is breached. The extent
to which the student conducts these activities at
home is at the discretion of the parent/caregiver,
but it is to be remembered the notebook at school
is primarily an educational tool. As good practice,
parent /caregiver should retain accessibility to the
notebook should they need to examine the notebook.
This Policy will be available on the school website
at lawley.wa.edu.au and is to be read in conjunction with the ICT Usage Guidelines. Access to the
school network is granted to those who abide by
the policies in this document. Parents/Caregivers
are asked to discuss this policy with their child before signing it.
5. FREQUENTLY ASKED QUESTIONS
14
Achievement Excellence Tolerance Respect Perseverance Learning
6. FREQUENTLY ASKED QUESTIONS
Why a MacBook Air?
There are many reasons. After a lengthy evaluation process, including visits to other schools running 1:1 notebook programs, we chose the Apple
MacBook Air. Many schools including large public
and private schools use MacBooks of some variety
as we have for the past few years.
Factors that contributed to our decision included
the following: the MacBook Air is made from an
aluminium unibody shell that is durable and has
a much longer battery life than most comparable
notebooks. They are light yet strong and appear in
a functional form/size for students to use both at
school and home, being the only computer they
need to use. Our own experience using various
platforms indicates that the MacBooks require
fewer repairs and have less “downtime” and have
been virtually free from virus attacks during our
1:1 program. Many of our notebooks have been in
use for well over three years. The Apple operating
system is relatively easy to use and has taken less
technical time from our Network Administrator
to maintain. Ease of use and maintenance of the
ecosystem are significant factors in identifying
this product. With over 1000 Apple notebooks deployed, we are well versed in the deployment and
maintenance of the system. The included “Time
Machine” software allows students to easily recover lost files or restore the entire hard disk. In addition, all the relevant software and OS X upgrades
are available free from Apple with no yearly fees.
In addition, we have built our infrastructure to
support the hardware and software so students
enjoy a seamless experience including the exchange of files either with their teacher or other
students through the use of Apple Air Drop, Moodle, iCloud Drive and Air Play. Together with the
predominantly free suite of software that includes
the latest operating system plus Pages-a word processor, Numbers–spreadsheet software, Keynotepresentation software, iMovie, iPhoto, GarageBand and others, it is a cost effective method of
PA R E N T O W N E D N OT E B O O K U SE POL IC Y
Do I need insurance?
Yes. Insurance is required. It is essential to limit
any “down time” from the loss of devices so that
the normal teaching and learning program can
continue to operate. Please carefully read your
insurance policies and understand what you are
covered for. Stolen items should be reported to
the police and an incident number recorded for
insurance purposes.
Loss or Damage
If theft occurs, it should be reported to police and
an incident report number should be obtained
for insurance purposes. It is the student’s and parent’s/caregiver’s responsibility for any damage or
loss that is deemed wilful or negligent and not
covered by insurance. Carefully check your insurance policy.
What are the restrictions on what students can do with their Notebooks?
We want students to be educationally engaged
with their notebooks but we have a responsibility
to make sure that the notebooks are not used for
any illegal purpose whilst at school, where they
are used primarily as an educational tool. This
means that if students install any of their own software or games, it must be appropriately licensed.
Any files stored on the computer at school must
not breach copyright and the content must be appropriate. They are not to be used for torrent sharing or anything that might be considered cyberbullying or the accessing of web sites unsuitable
for students under 18. Students must understand
that we will monitor activity on the notebooks at
school, including Internet access and email, and
that we have the right to inspect the notebooks if
we consider that they are being used for unlawful
or unsuitable purposes.
What happens if you lose your data?
A “back up” hard disk is required. The MacBook Air
can be backed up to a “Time Machine” external
disk stored at home. It is a simple procedure to
regain your lost data from the “Time Machine” at
home. “Time Machine” is Apple software used to
backup your data in a regular manner from your
external hard disk. Your machine will be backed
up at home when you connect the external hard
disk. This is an effective manner in which to protect your data and so ensure a continous teaching
and learning program.
FREQUENTLY ASKED QUESTIONS
delivery. In addition, Apple provides an extensive
and comprehensive educational facility through
the iBook store and iTunes U (the world’s largest
online catalogue of free education content). Students have created iBooks in a number of learning
areas. It is also possible for students to continue
their work on their other devices through cloud
based services. The focus should be on learning
outcomes and not on learning about the tools to
get there. We believe our infrastructure will support the end user to accomplish this.
What happens if your computer system
becomes unstable or corrupted?
The school recommends you purchase AppleCare. AppleCare is required to provide 3 years warranty and 3 years of telephone technical support.
All of our recommendations are designed to keep
the student operating within the classroom and
at home with a minimum of any disruption. This
is dependent on having adequate cover. If purchased through the portal, the supplier will provide onsite repairs. If it is a software issue, you
may be able to fix it by using your Time Machine
backup or telephone request to Apple. Otherwise
the notebook should be taken back to your place
of purchase.
Do I have to buy an external hard disk
and a computer cover?
Yes. Again, a back up procedure is essential to
provide for the prevention of the loss of data and
continuation with the normal learning program.
An external hard disk is utilised to store and backup all your files. In addition, covers will protect the
notebook during normal use
Achievement Excellence Tolerance Respect Perseverance Learning
15
PA R EN T OW N E D N OT E B O O K U SE PO L IC Y
Can my computer be connected to the school network?
Yes, the computer will be connected to the school network provided that the ICT Usage Guidelines is adhered to and the Acceptable Use Agreement has been signed. By following these guidelines, you should
be able to utilise your notebook both at home and school with a minimum of effort.
What if I forget my school network password?
If your Password has been forgotten or compromised in any manner, you must report it to the System Administrator immediately. You will be able to apply for a new Password once it has been reset.
FREQUENTLY ASKED QUESTIONS
I have a MacBook Pro, can I use it?
Yes, so long as it is able to utilise the current operating software and various applications the school is using.
16
Achievement Excellence Tolerance Respect Perseverance Learning
PA R E N T O W N E D N OT E B O O K U SE POL IC Y
8
checklist
CHECKLIST
rr Be familiar with these guidelines
rr Read, sign and return the Acceptable Use Agreement Form (Page 19)
rr Give the signed Form to your child to return to the front office
rr Consider which MacBook Air
rr Look to purchase/rent/lease the notebook
rr AppleCare Warranty
rr Insurance
rr External Hard Disk for Back ups
rr Cover
What to Buy
The current MacBook Air is the requested model which will provide for extended use.
For full specifications, please refer to the following web link:
http://www.apple.com/au/macbook-air/specs.html
How to Buy
Apple Authorised Tier 1 Education Reseller
Winthrop Technologies (Special Apple Education Prices and Bundles)
https://portal.winaust.com.au/a/mlshs
Bundles include AppleCare, Insurance option, Rental/Lease option includes Insurance, Accessories option.
https://portal.winaust.com.au/a/accessories
Procure your device and accessories through any of the following Apple Authorised Resellers listed on
http://www.apple.com/au/buy/
Other Apple Authorised Resellers
https://locate.apple.com/au/en/
Understand your consumer rights
The Australian Consumer Law at the shops:
www.consumerlaw.gov.au/content/Content.aspx?doc=fact_sheets/shops.htm
The Australian Consumer Law at home:
www.consumerlaw.gov.au/content/Content.aspx?doc=fact_sheets/your_home.htm
Parents are under no obligation to purchase from any of these links.
Achievement Excellence Tolerance Respect Perseverance Learning
17
18
Achievement Excellence Tolerance Respect Perseverance Learning
PA R E N T O W N E D N OT E B O O K U SE POL IC Y
8.ACCEPTABLE USE AGREEMENT
Please complete and return this form. Forms must be returned to Main Administration Office.
Permission for students to have an online services account
This form is to be completed by the parent/caregiver and is binding on the child and parent.
ACCEPTABLE USE AGREEMENT
Parents / Caregiver
I give my child permission to have an online services account. I agree to and understand the responsibilities
my child has using the online services provided at school for educational purposes in accordance with the
acceptable usage agreement for school students. I also understand that if my child breaks any of the rules
in the agreement, that the principal may take disciplinary action as provided in policies of the school or the
Department of Education.
Note: while every reasonable effort is made by the school and the Department of Education to prevent student exposure to inappropriate online content when using Online Services, it is not possible to completely
eliminate the risk of such exposure. The Department/School cannot filter Internet content accessed by your
child from home or from other locations away from school. The Department recommends the use of appropriate Internet filtering software.
Student
I agree to abide by the Acceptable Use Agreement for school students.
I understand that if I am given an online services account and break any of the rules in the agreement, it
may result in disciplinary action, determined by the principal.
I understand that should I (and my child) not wish to abide by the terms and conditions of the ICT Usage
Policy and Acceptable Use Agreement then my child will not utilise any ICT at school.
We indemnify the School against any civil or legal action initiated by third parties that may arise as a result
of activity that is against the terms and conditions of the ICT Usage Policy and Acceptable Use Agreement.
I accept the terms and conditions outlined in the ICT Usage Policy and Acceptable Use Agreement.
Student Surname ________________________________________________________________________
Student First Name ______________________________________________________________________
Form __________________________________________________________________________________
Student Email ___________________________________________________________________________
Parent/Caregiver Surname _________________________________________________________________
Parent/Caregiver First Name ________________________________________________________________
Parent/Caregiver Email ____________________________________________________________________
Parent/Caregiver Phone ___________________________________________________________________
Parent/Caregiver Signature _____________________________
Date _________________________
Student Signature ____________________________________
Date _________________________
7.CHECKLIST
Achievement Excellence Tolerance Respect Perseverance Learning
19
inSpire
to aSpire
our ViSion
dedicated to student learning
Inspiring
Nurturing
Successful
Persevering
Innovative
Respectful
Engaged
our VaLueS
Achievement
Excellence
Tolerance
Respect
Perseverance
Learning
Mount LawLey Senior HigH ScHooL
Mount Lawley Senior High School, Main Administration:
Middle School (Yr 8-9)
Senior School (Yr 10-12)
65 Woodsome St, Mount Lawley, Western Australia 6050
Tel - 08 9471 0300 Fax - 08 9271 1126
Tel - 08 9471 2419 Fax - 08 9471 0338
Tel - 08 9471 2406 Fax - 08 9471 0329
Website: http://www.lawley.wa.edu.au Email: enquiries@lawley.wa.edu.au
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising