IT_Device_Use_Agreement

IT_Device_Use_Agreement
St Paul’ss Co
olle
ege
e Terrms and
d Co
ondittion
ns of u
use ffor Elecctro
onic Devvicess St Pau
ul’s College, K
Kempseey 2014 TableofContents
Scope and Purpose Section A .............................................................................. 1 Policy Outlines ........................................................................................................ 1 Terms and Conditions ............................................................................................... Students ................................................................................................................. 2 Teachers ................................................................................................................. 3 Advice and Management Section B ........................................................................ Internet and Email ............................................................................................... 4 Computer storage devices ................................................................................... 6 Consequences of misuse ...................................................................................... 8 Social media advice ............................................................................................. 9 Letters, plans and material Section C ...................................................................... Sources and website advice ............................................................................... 10 Example letter home ......................................................................................... 11 Computer work plans sheet ............................................................................... 12 Policy authority agreement sheet ...................................................................... 14 Scope and Purpose Section A Overview At St Paul’s College, we allow all students access to our computer network, enabling them to use standard applications (word processing, spreadsheet, database etc.) as well as online facilities such as the Internet and electronic mail. Every student is issued with a username, password and an email address at the start of their schooling career. Access to the computer network is a privilege and it is the students’ responsibility to restrict themselves to usage which is ethical and appropriate. Failure to comply with the rules which govern the use of the network may result in consequences being administered to the student. These consequences will be in keeping with the College Discipline Policy, and may require referral to the Year Coordinator and/or Assistant Principal. These consequences may include loss of access privileges, or in serious cases, suspension or review of enrolment. Parents will be informed when serious breaches of the Acceptable Use Policy have occurred. Further legal action will be carried out if deemed necessary. external memory devices, SD cards and devices of that nature may be scrutinised by the members of staff responsible for management of the network either (a) during routine system maintenance, or (b) if there is reason to suspect misuse of the network or the device. St Paul’s College makes no warranties of any kind, whether expressed or implied, for the service it is providing. St Paul’s College will not be responsible for any damages, including the loss of data. St Paul’s College may update this AUP at any time. Policy Outlines 1. Computing devices and network access are provided to students to enhance teaching and learning. The use of these devices and services requires informed parental consent and appropriate management. Students are encouraged to make use of IT facilities in support of their studies in all subjects, including the writing up of coursework assignments and other projects. The College provides a network environment in which students can assume that their legitimate use of computers and the data that they store are secure against interference by other users. Students should not, however, assume that their activities are completely private. The College retains the right to determine appropriate use and to monitor user accounts, and fileserver space as judged necessary. Hence, records of usage, files that have been stored, and email messages that have been sent or received, and 2. Background Students, teachers and other St Paul’s College community members need to have clear guidelines to ensure that information technology resources are used appropriately. These guidelines will assist teachers at St Paul’s College implement procedures that both protect and educate the students in their care. 3. Definitions Computing Device – Includes Desktop computers, laptop computers, netbook computers, tablet computers and other devices capable of accessing the College network. Page 1 of 28 Policy Purpose Inappropriate Material – Any material that is offensive, abusive, discriminatory, defamatory, illegal or lewd and lascivious (including, but not limited to, pornography) is considered inappropriate. If a student is unsure if material is appropriate they should check with their teacher before attempting to access it. Access and Security All users are expected to only use legal content on their College provided computing device. Using College resources to access illegal or pirated material is strictly prohibited and may result in the matter being referred to the appropriate authorities for serious breaches. Furthermore, users are to ensure that any work that they submit or host on a College computing device or network is original and appropriately referenced. Plagiarism is a serious academic matter and may lead to disciplinary action. Access to the College network is carefully monitored and controlled to safeguard student welfare and enhance learning. Users are not to attempt to subvert the College network security systems, including, but not limited to, the College proxy server and installed anti‐virus software. Intentionally subverting these security measures may seriously compromise the safety and security of other users and will result in a loss of access privileges. Any user who inadvertently discovers a breach of the College’s security systems or who witnesses’ inappropriate use of the College’s network of computing devices is to report the incident immediately. 7. Appropriate Use – Terms and Conditions Students: • agree to adhere to the terms and conditions set out in this Acceptable Use Policy each time they use a computing device provided by the College and/or access the College network. • will ensure that all communication using the computing device provided by the College and/or separate online services is related to learning or school activities • will keep passwords confidential, and change them when prompted or when known by another user • will never knowingly allow others to use their computing device or network account unless directed to by a teacher for the purposes of collaborative learning 5. Personal Information, Privacy and Confidentiality College staff have to balance the privacy rights of individuals against their moral and legal obligation to protect students from harm and ensure that any computing resources are used to enhance teaching and learning. As such, teachers will inspect the contents of any computing device provided by the College and/or other personal devices from time to time. Furthermore, access to the Internet and the College network will be monitored and reviewed. • will not send or publish unacceptable or unlawful material or remarks including offensive, abusive, defamatory or discriminatory comments • will not access or attempt to access inappropriate material • will not attempt to impersonate any other person when using the College provided computing device or College network Page 2 of 28 Intellectual Property and Copyright Bullying – Persistent behaviour that causes hurt or distress for another person. Bullying may be “unintended”, however the impact on the victim will be considered. 4. 6. • will not engage in any bullying, intimidation or other inappropriate behaviour online document and receiving the approval of the Learning Technologies Coordinator. • will immediately tell a teacher if they receive a computer virus or a message that is inappropriate or makes them feel uncomfortable • will never knowingly initiate or forward emails containing:  a message that was sent to them privately  a computer virus or attachments that are capable of damaging the recipients’ computers  chain letters and hoax emails  “spam”, like unsolicited advertising material, or mail unrelated to learning • will not damage or disable computers, computer systems or networks of the College or other entity • will not attempt any repairs on the computing device provided by the College, nor open the machine’s enclosure in any way. • will ensure that any computing device is charged at night for use at school the following day. • will not use any College computing device while travelling to and from the College or between classes. Any computing device must only be transported secured inside an appropriately padded bag. • will not use any College computing device in the playground at recess or lunch. • will not use the camera option on any device at school without teacher permission. Teachers: • are responsible for supervising student use of the College provided computing devices and access to the College network. • are to maintain an informed view of the relative risks and educational benefits of online activity by their students. A variety of resources are available from the Internet sites listed in Section 8 of this policy document. • will ensure that online services are not used for unauthorised commercial activities, political lobbying, gambling or any unlawful purpose. • are to ensure that students are aware of the possible negative consequences of publishing identifying information online including their own or other students’ images • will not attempt to access the College’s network using an unapproved private device, including but not limited to, smartphones or games devices • will ensure that they have an appropriate data backup strategy. For example, all important data (e.g. assignments) should be backed up to an external device every week. Furthermore, important documents should also be stored in a “cloud‐based” backup facility like Dropbox (www.dropbox.com). • will not install software on any College computing device without completing the appropriate Software Installation Request • will promptly comply with all instructions from their teachers relating to the use of College computing devices and network systems. • are to check that any material planned for publication on the Internet or College network has the approval of the Principal and has appropriate copyright and privacy clearance • are aware of the steps to take and advice to give if students notify them of inappropriate or unwelcome online activity by fellow students or members of the public. Such steps may include: Page 3 of 28  collecting as much information as possible about the incident including copies of communications  emphasising to the student that the event is not necessarily their fault  identifying any risky behaviours on the part of the reporting student and counseling them on the need to adopt more protective behaviours  if the incident warrants further attention inform the Principal of the incident (for example, if the teacher suspects the student may have been placed in a position of harm) • are to inform parents that student Internet access from home or other non‐school sites does not occur via the College’s network and therefore Internet browsing may not be filtered • should promote the use of strong passwords for students who can cope with the complexity. Stronger passwords: Violations may result in a loss of access as well as other disciplinary or legal action. We regard the use of the Internet to search for and use information related to a College subject as acceptable. The Network is provided for students to conduct research and communicate with others in relation to their work. Therefore, they will not look for material, which is unrelated to school curriculum, unless they have the written permission of a teacher. Every student in the College has access to the Internet and has a College email account. The email account is only to be used for educational or school related purposes. It is not be used for private email communication. 2. Rules  contain a mixture of alphabetic and non‐
alphabetic characters  are changed frequently  do not contain dictionary words  do not contain easily identified personal information such as name, date of birth, etc.  do not contain any part of the account identifier such as the username When using these facilities, students are expected to behave with normal standards of courtesy, and within the guidelines of the expectations, which St Paul’s College has of the students enrolled in it. a. General ‘Netiquette’ Net Etiquette Students must not: Send electronic communications which are impolite, indecent, abusive, discriminatory, racist or in any way intended to make the recipient feel uncomfortable. Disclose to a third party the personal details of any other student. ‐ Internet and Email Access any inappropriate Internet site, or attempt to access offensive or inappropriate information. INTERNET USERS AGREEMENT The Board of Studies has mandated that IT is to be studied and as such, access to the Internet must be provided. However, there are standards of behaviour that their children should follow when using media and information sources. Students are responsible for good behaviour on school computer networks just as they are in a classroom or any other school function. Breach another person’s copyright in any material, therefore the St Paul’s College Guidelines in relation to plagiarism must be followed. Download any material from the Internet unless instructed by your teacher. Page 4 of 28 Send a network message Join any List Serve email services unless approved by a teacher b. Personal Safety Cause any unsolicited email to be sent to another person’s email address Send a message with someone else’s name or a false name. Send a message that is inconsistent with the College’s code of conduct and standards. Send a personal email during lesson time that is of a private nature or unrelated to schoolwork. Upload or download any unauthorised software or attempt to run that software. In particular hacking, encryption and other system tools are expressly forbidden. Purchase goods or services via the computer network, or use the Network for commercial gain. Never arrange a meeting in person with anyone they have “met” or only communicated with by computer, without prior parental approval. Not respond to messages or bulletin board items that are indecent, suggestive, belligerent, discriminatory, threatening, or which make the student feel uncomfortable or unsafe in any way. If such a message is encountered the student should report it to his or her teacher and parents. Be aware that any person they “meet” or communicate with online may pretend to be someone else. Use the computer network to gain unauthorised access to any other computer network. In addition, Students need to be aware that thoughtless use of email and the Internet may jeopardise their personal safety either at College or outside College. Students should therefore: Remember that anything they read online may not be accurate, or may misrepresent a person or situation, and thus take care in the use of this information. Attempt to spread computer viruses. Bring to College via any device or email, any games or other software or any material that is inappropriate or offensive. Ignore offers that involve either financial transactions or personal meetings. Open all email attachments before saving them to allow virus scanning before being opened. Not disclose any personal details, such as their home address or telephone number, across the Internet. Plug in any device to College computers other than a simple USB memory stick, or a memory stick approved specifically by the IT teacher. Ensure that personal Internet browsing and email use is conducted at home. Engage in any activities that contravene the St Paul’s College Student Expectations. Engage in activities that are prohibited under Australian Law. Thus the transmission of material subject to copyright or Australian Law is forbidden, as of course is any threatening or obscene matter. INAPPROPRIATE MATERIAL Unless required by a particular educational context, the following are to be considered inappropriate or offensive: Gambling sites Games or game sites Nudity Page 5 of 28 Sexually explicit or suggestive material Material relating to violence until the College is satisfied that the contents on it are appropriate. Material that is discriminatory or offensive to a person’s nature or to a particular social group. This can include: physical, intellectual, emotional aspects; religious beliefs; race; gender and gender preference. Language that is generally considered obscene or blasphemous. USE OF COMPUTER STORAGE DEVICES The use of multi‐functional storage devices such as USB memory sticks, handheld computers/PDAs/iPods/USB keys/mp3 players, etc. Storage devices such as CDs/DVDs and USB memory sticks can be used to store and transfer files to or from College computers. Mp3 devices, PDA’s, iPods, mobile phones and other storage devices must not be used to transfer files to or from College computers unless supervised by specialist teachers. No devices may be used to listen to music, watch videos, send messages or play games within the College, unless the device is provided by the teacher, and the teacher has approved the content. The penalty for this will include confiscation of the device. Other consequences may be applied in keeping with the College’s AUP and general rules and expectations. Guidelines on the Use of Computer Storage Devices External hard drives are not to be used by students in the junior school, unless the IT teacher has given specific permission for them to do so for a period of time. The only senior students who may use an external hard drive are those who study IT and Industrial technology at school, and who have the specific permission of the IT teacher. The IT teacher will nominate the specific external hard drive to be used on the school network. Other types of external hard drives are not to be used. Students are permitted to use the school approved USB/memory sticks/flash if the course teachers require them to do so. However, in using these devices the students are asked to keep in mind their obligation to the school. In terms of the security of the College’s computer system students are asked to ensure that these devices are free of viruses or any malicious software of any kind. Consequences of Computer Misuse The following are policy consequences for failure to comply with acceptable computer usage in class or at home. The consequences are not final and may be adjusted by the LTC or Principal due to considerations. They provide a basis by which disciplinary matters can be resolved. List of offenses may include: • Gaming • Off topic use of Internet/computer • Not having computer ready for class (forgetting computer) • Not having battery charged • Damage to computers Consequences Further students must be aware that the school has the right to see the contents on these devices. This may entail that the student hands in the memory stick, or such device, to any teacher who requests it. The memory stick will be kept Page 6 of 28 1. Warning in class – teachers can give warnings in class but a repeat offense of issue can result in: a. Turning off computer / restriction of classroom use b. Sending to LTC c. Sent to collect computer for lesson if not brought or charged. (subject to supply) 2. For continued misuse or failure to comply with acceptable usage policy’s students are to be sent to the LTC. They may incur: a. A warning from the LTC b. A letter home to parents c. Detention d. Possible Suspension 3. Further infringement of the policies will incur: a. A letter to parents b. Possible Suspension c. Afternoon detention d. Removal of computer take home privileges e. Being placed on a computer progress behavioral report with the LTC collaborate, exchange and contribute, for the benefit of your professional and personal development, the college is endeavouring to formulate a social media policy. This will give you some guidelines and guidance as to the proper etiquette when engaging with these online tools, for the protection of your personal and professional reputation and that of the college. In the meantime I have sourced the DET social media guidelines, and did a little plagiarism from other policies that you might find helpful. General Social Media Use Guidelines Social media is not about technology but about using it to connect with people, so remember that your conduct reflects not only on yourself but on the college. Social media is blurring the lines between the personal and professional aspects of many people’s lives, and anything posted can have an impact on both. Please bear this in mind when posting.  Be transparent.  Protect your privacy.  Be accurate.  Be respectful.  Be responsible.  Always think before you post.  .Maintain personal and organisational confidentiality.  Respect College time and resources. 
A work plan may include completion of IT progress behavioral form signed by every class teacher for appropriate use of computer. This would be handed in to the LTC with the collection and returning of computer to LTC every day When representing St Paul’s online Social Media Use Tips for Staff Please be considerate, transparent and understand that as a St Paul’s College staff member you are representing your employer and their reputation but we do value your engagement in and positive use of social media on behalf of St Paul’s as it is vital we stay relevant and connected. With more staff using online social media both personally and professionally to learn, advocate, As well as the general guidelines above, you should also consider the following. Page 7 of 28  Be personable. Be honest about your identity, and speak in the first person. Be transparent about being a St Paul’s College staff member and why you are posting. If you are posting for publicity or promotional reasons please see Michael first. communities in a way that adds value to your online and offline profile.  Reference your work. Always provide links or references when posting content. Don’t breach copyright laws, abide by creative commons licences, and obtain consent when citing colleagues or organisational links when reposting content.  Be appropriate. Consider the context in which you’re representing St Paul’s and choose your tone appropriately based on your audience. Social media means just that – it’s about communicating with people so always post smartly, with respect and empathy.  Use a disclaimer. Make it clear this is the content you are authorised to post or the information you have to hand.  Be connected. Wherever possible connect with other St Paul’s websites.  Be committed. Successfully engaging in social media means committing to regularly posting fresh content.  Ensure continuity. Social media requires two way interaction, open dialogue and continuous fresh content. Ensure you not only have a plan for when to begin engaging, but when to handover to other colleagues or areas, and when and how to leave a community, thread or group.  Be active and add value. Make sure you are contributing valuable insights. . For authenticity and credibility, monitor your comments, delete spam and abusive posts, and build your networks and  Think about your customers. Remember you’re not just communicating your also providing customer service. Be personable, relaxed and friendly, as appropriate to the channel or site you’re communicating on. Source: Curtin University Social Media Policy Website Sources and Advice Source: Curtin University Social Media Policy Online resources for Appropriate Usage and Cyber‐Safety http://www.cybersmart.gov.au/ http://www. Page 8 of 28 St.. Pau
ul’s Colle
C ege
PO Box 145, West Kempsey,
NSW 2440
T e le ph one (02) 656 2 -7 20 0
Fax : (02) 6563-1364
E m a i l : spckemp@lism.catholic.edu.au
Date: …………
…..
Deaar Parent / G
Guardian,
It has coome to our attention th
hat …………
…………………………
…….has beeen using theeir College
Netb
book/iPad tto access inaappropriate content, naamely:
……
…………………………
…………………………
……………
………………
……………
………………
………
……
…………………………
…………………………
……………
………………
……………
………………
………
……
…………………………
…………………………
……………
………………
……………
………………
………
……
…………………………
…………………………
……………
………………
……………
………………
………
n or daughteer that acceessing, or atttempting too access, inaappropriate
We would ask you to remiind your son
b
maay result in a loss of acccess privileeges.
matterial is in breach of thee Acceptablle Use Policcy. Further breaches
Thaank you for your support in this maatter.
urs sincerelyy,
You
Jam
mes Westmaan
……
……………
………………
…………
Leaarning Technnologies Cooordinator
Teacher
Plea
ase tear offf this bottom
m portion an
nd return too the Colleg
ge.
I haave receivedd the Accepttable Use Policy breachh notificatio
on dated …………….. for
……
……………………
ould / wouldd not like yoou to contacct me to disscuss the maatter.
I wo
Pareent / Guardiian Name: ……………
…
………………
………
Date: …………………
…………
PPage 9 of 28
8 Page 10 of 28 St. P
Paul’s C
College
IT
T Compu
uter/iPad
d Use Prrogress and Beh
havioura
al Reportt
S
Student:
_______
_________
_________
__________
_
Y
Year:
_______
_________
_________
__________
_
D
Date:
_______
_________
_________
__________
_
T
Teachers th
he student requires yo
ou to fill ou
ut this form and sign e
each lesson. The stud
dent is to
show me att the start o
of each dayy and returrn the shee
et to me at the end of the week. If you have
any issues/cconcerns p
please makke a comm
ment and se
ee me if ne
eeded.
M
Mr Westman
D
Day 1
S
Subject
her
Teach
Compute
er
Ready for
Class
Yes/No
App
propriate
Use
e of
Com
mputer
Yes
s/No
Teacher Commen
nt
Teach
her
Compute
er
Ready for
Class
Yes/No
App
propriate
Use
e of
Com
mputer
Yes
s/No
Teacher Commen
nt
D
Day 2
S
Subject
S
St. Paul
P l’s Colle
C ege
Progre
ess and Behavio
oural Re
eport
D
Day 3
S
Subject
Teach
her
Computerr/iPad
Ready forr
Class
Y
Yes/No
Ap
ppropriate
Us
se of
Co
omputer
Ye
es/No
Teache
er Comme
ent
Teach
her
Computerr/iPad
Ready forr
Class
Y
Yes/No
Ap
ppropriate
Us
se of
Co
omputer
Ye
es/No
Teache
er Comme
ent
Teach
her
Computerr/iPad
Ready forr
Class
Y
Yes/No
Ap
ppropriate
Us
se of
Co
omputer
Ye
es/No
Teache
er Comme
ent
D
Day 4
S
Subject
D
Day 5
S
Subject
1 ST PAULS COLLEGE KEMPSEY
iPad and Policies Manual
iPad User Guide
2 ST PAULS COLLEGE KEMPSEY
iPad User Guide
Mr Westman
St Paul’s College Kempsey
Phone 02 65627200 • Fax 02 65631364
Table of Contents
Contents
St Paul’s College: iPad Pledge................................................ 12 Some benefits of using an iPad................................................. 2 Issues and how to handle them................................................. 2 How to apply restrictions ........................................................... 3 How to turn on parental controls for the iPad .................................. 3 Getting started and setting up an account................................. 5 Redemption codes example sheet ............................................ 5 Computer Policy Handbook....................................................... 6 Remember................................................................................. 6 APPENDIX ................................................................................ 7 Some benefits of using an iPad
1. Saving money by combining books, diaries, writing implements, calculators, word processors, etc. all in one media tablet. 2. Allowing students to take control of their own learning. 3. The touch‐screen interface allows students to engage more interactively with content. 4. Education programs can be tailor made for each student. 5. Wi‐Fi and 3/4G connectivity allow for almost instantaneous and continuous access of information. The ability to quickly switch between applications makes it easier for students to switch between different modes of learning (i.e. research and creation). 6. Mobile data collection is generally streamlined and easy. 7. The iPad easily integrates with existing IT systems. With cloud‐based computing, students have connectivity anywhere within the school grounds. There is no need for schools to continue to allocate large budgets for computer power that is no longer necessary. 8. School districts have been creative in finding ways to save money using the iPad. From digital textbooks, to tests and to homework, there’s the potential to save huge amounts of money through paperless innovation. 9. iPad’s are accessible to students with disabilities. Apps are available for children with cognitive learning problems and there are also accessibility tools built into the latest iOS such as Speak Auto‐Text, White on Black, Voice Over and Siri, a voice recognition technology. 10. The iPad can easily be positioned for comfortable use on your desk or lap. Students can also purchase cases and stands which allow devices to be propped up at an appropriate viewing and typing angle. 11. The iPad can also be paired with an external keyboard to ease and speed up typing. 12. There is no delay to boot up iPad’s like there is with netbooks or laptops, and no time lost figuring out complex software applications. 13. The iPad’s intuitive design and easy‐to‐use interface makes it simple for even young children to navigate, thereby optimizing the learning experience of all students. 14. The App Store/iTunes Store offers a vast amount of free or low cost apps, many of which are excellent for the classroom. 15. Its light weight and portability means it can easily be carried from class to class without having to close and reopen the screen. Data can be accessed while standing and notes can be taken on the go, thus extending learning far beyond the classroom. 16. It has far less of a strain on children’s backs since one iPad replaces a bag full of books. 17. Children are eager to embrace new technology and many are able to troubleshoot computer issues and resolve them quicker than adults. Issues and how to handle them
As with all electronic devices, iPad, phones and computers there is a great tendency for students to become distracted by the extra activities that these devices can display. It can be a distraction from school work and also family life. There needs to be a policy for at home use as well as while being used at school. The student needs to realise that the device is not theirs but the parents property and under their control while at home. This is always the case even if the device has been given as a gift for a birthday or Christmas. Also they need to understand that while the device is at school it is under the control of the school much the same way it is under the parent’s authority at home. 2 If yo
ou find that a child/stud
dent is having trouble haandling the rresponsibilitties of using a device the
en I recomm
mend thatt the use of rrestrictions be applied tto that devicce. Resttrictions can
n be used to
o limit what aapps can bee placed upo
on a device a
as well as whhat apps can
n be used att any time
e. This is don
ne by settingg restrictions and applyiing a pin num
mber that re
estricts who o has rights o
over an iPad. Thiss year the restrictions solution s
will be appliedd to any stu
udent iPad that t
misusees it during school timee. All gam
mes and inap
ppropriate aapps will be wiped (thiss does not m
mean that p
paid apps arre lost they just need tto be relo
oaded at parrent discretion) and a restriction r
ccode will be
e applied. Pa
arents may receive thiss code from
m the scho
ool at any tim
me or may p
place their o
own codes on if needed.. The following iss how to placce restriction if needed – these mayy be differen
nt or changeed as new IO
OS standards are applied but can be found online. Ho
ow to ap
pply res
striction
ns
The iPad's parental controls allow you to restrict hhow your child uses the iPad, from ddisabling the Safari brow
wser websites you
ur child can view to puttting an age restriction o
on the apps downloade
ed. You can eeven to limit which w
n off app dow
wnloads com
mpletely, wh
hich allows yyou to closely monitor w
what your chhild is doing on the iPad. turn
The iPad parental control w
works by se
etting a fourr digit passcode on the iPad that iss required w
when settingg the diffe
erent restricctions. Once enabled, yo
ou can set reestrictions fo
or apps, television, musiic and movie
es. How
w to turn
n on paren
ntal contrrols for th
he iPad
The first step is to tap into tthe iPad setttings by touching the se
ettings icon. It looks like a bunch of gears and iss one of th
he default iccons for the iPad. Oncce in settings, choose th
he general ssettings from
m the left‐haand menu. Y
You should reach a scre
een like thee one show
wn above. Nexxt, choose Reestrictions to
o enter the iiPad settingss for parentaal control. 3 The next step fo
or enabling parental controls on thhe iPad is to turn on the
e iPad restricctions. Simp
ply touch thee top he screen where it says Enable Resttrictions. of th
You will be prompted for aa four digit p
passcode. Chhoose some
ething you w
will remembber, but not something your child
d can guesss like a birth
hday or the
e last digits of a driver's license. Iff there is a significant date d
you likke to rem
member in yo
our past besides birthdaays and anniversaries that would be
e perfect. The passcode fo
or the iPad'ss restrictions will need tto be entere
ed twice to make sure yyou don't acccidentally ttap a diffe
erent numbeer than intended. Oncce you have the iPad's parental conttrols enabled, you will b
be able to se
et different rrestrictions aand even resstrict som
me of the deffault applicaations that ccame with thhe iPad. Thiss includes th
he Safari broowser, YouT
Tube and iTu
unes, so yyou can restrrict your chilld's ability to
o view webssites, watch videos and p
purchase muusic from their iPad. You can also turrn off the ab
bility to instaall apps. Youu can still ge
et apps on th
he iPad by innstalling them to iTuness and synccing them to
o the iPad, w
which will allow you to hhave comple
ete control over which a pps are on tthe iPad. If yo
ou don't neeed that much
h control, yo
ou can set raatings restricctions for what type of aapps can be
e installed on
n the iPad
d. 4 Another good thing to turn off is in‐app purchases. Many free apps allow in‐app purchases, which is how they make their money. This type of monetisation can be seen in apps like Pocket Legends, which is a great iPad app, but parents must be aware that it allows for the purchase of in‐game money. Getting started and setting up an account
Before we begin to hand out apps for downloading you need to have an Apple ID and iTunes account. An appendix at the back of this manual shows over a number of pages how to create the account on your iPad. It is recommended that you use a username and password that is easy to remember as the student may need to tell the IT coordinator them if they need issues solved for them. It is recommended that iTunes is downloaded on your computer at home to sync the iPad and computer for greater ease of transferring items between them. This is not necessary but can save a lot of issues in future. You will be receiving a number of App codes and you may like to rewrite or stick them into this manual for later reference (a page example is provided) Redemption codes example sheet
This Sheet is to give you your redemption vouchers and also set out the basic guidelines to behaviour. See Appendix 2 Redemption of iPad Vouchers on how to use the codes To understand how to use your redemption vouchers read the following ‐ Redemption Vouchers for Dummies sheets (see appendix) Name of App Voucher Code
Pages Keynote Numbers Notability imovie Garageband 5 Co
omputerr Policy
y Handbook
The is included in the Appendix a St P
Pauls Collegee Computerr Policy Han
nd book as yyour studen
nt will come into conttact and usee computerss during theiir schooling.. Many of th
he policies co
over the usee iPad’s in a number of w
ways like bullying, Intternet usagee, use of mobile devices and other aareas so plea
ase have a loook. Re
emembe
er
1. Rememb
ber if a teach
her asks for yyour iPad at any time don’t argue jusst hand it oveer. 2. iPad’s arre not to be open at any time until yoour teacher asks you to u
use them 3. iPad’s arre not to be used outside
e of class tim
me unless in tthe library may be confisscated by tea
achers and sttudent sent tto Mr Westm
man 4. iPad’s m
HAV
VE FUN BU
UT USE THE
E DEVICES
S IN SCHOO
OL AND AT
T HOME WIITH RESPE
ECT AND AS
A INTENDE
ED
BY TEACHERS
T
S AND PAR
RENTS
6 APPENDIX
1. Creating an Apple ID/iTunes Account
2. Redemption of iPad vouchers
3. St Paul’s College Netbook/Computer Acceptable Use Policy
7 S Paul
St
P l’s Coll
C lege
e
Stud
S dentt ICT
A
Acc
cepttable Use
U Policy
y
8 St Paul’s College Student ICT Acceptable Use Policy
1. Policy Purpose
Computing devices and network access are provided to students to enhance teaching and
learning. The use of these devices and services requires informed parental consent and
appropriate management.
2. Background
Students, Teachers and other St Paul’s College community members need to have clear
guidelines to ensure that information technology resources are used appropriately. These
guidelines will assist teachers at St Paul’s College implement procedures that both protect and
educate the students in their care.
3. Definitions
Computing Device – Includes Desktop computers, Laptop computers, Netbook computers, Tablet
computers, mobile phones and other devices capable of accessing the College network.
Inappropriate Material – Any material that is offensive, abusive, discriminatory, defamatory,
violent, illegal or lewd and lascivious (including, but not limited to, pornography) is considered
inappropriate. If a student is unsure if material is appropriate they should check with their teacher
before attempting to access it.
Bullying – Persistent and/or repeated behavior4 that is intended to cause hurt or distress to
another person. Bullying may include, but is not limited to, social ostracism, repeated and
persistent teasing and/or belittling, the sending of repeated harassing emails or text messages, the
creation of websites design to defame or denigrate a person (including social media groups) or
repeated harassment via Twitter.
4. Access and Security
Access to the College network is carefully monitored and controlled to safeguard student welfare
and augment learning. Users are not to attempt to subvert the College network security systems,
including, but not limited to, the College proxy server and installed anti-virus software.
Intentionally subverting these security measures may seriously compromise the safety and
security of other users and will result in a loss of access privileges.
Any user who inadvertently discovers a breach of the College’s security systems or who
witnesses’ inappropriate use of the College’s network of computing devices is to report the
incident immediately to their teacher.
5. Personal Information, Privacy and Confidentiality
College staff have to balance the privacy rights of individuals against their moral and legal
obligation to protect students from harm and ensure that any computing resources are used to
enhance teaching and learning. As such, teachers will inspect the contents of any computing
device provided by the College from time to time. Furthermore, access to the Internet and the
College network will be monitored and reviewed.
The College encourages Parents and Guardians to similarly monitor usage and access of the
Netbook computers in the home.
6. Intellectual Property and Copyright
All users are expected to only use legal content on their College provided computing device. Using
College resources to access illegal or pirated material is strictly prohibited and will result in a loss
9 of access privileges. Further breaches may result in the matter being referred to the appropriate
authorities.
Parents and students need to be aware that issues around intellectual property have not been fully
explored by our legal system. It is possible that schools, like Internet service providers, may be
subject to legal action related to inappropriate use.
Furthermore, users are to ensure that any work that they submit or host on a College computing
device or network is original and appropriately referenced. Plagiarism is a serious academic
matter and may lead to disciplinary action.
7. Appropriate Use – Terms and Conditions
Students:
 agree to adhere to the terms and conditions set out in this Acceptable Use Policy each time
they use a computing device provided by the College and/or access the College network.
 will ensure that all communication using the computing device provided by the College and/or
separate online services is related to learning or school activities
 will keep passwords confidential, and change them when prompted or when known by another
user
 will never knowingly allow others to use their computing device or network account unless
directed to by a teacher for the purposes of collaborative learning
 will not send or publish unacceptable or unlawful material or remarks including offensive,
abusive, defamatory or discriminatory comments
 will not access or attempt to access inappropriate material
 will not attempt to impersonate any other person when using the College provided computing
device or College network
 will not engage in any bullying, intimidation or other inappropriate behaviour online
 will immediately tell a teacher if they receive a computer virus or a message that is
inappropriate or makes them feel uncomfortable
 will never knowingly initiate or forward emails containing:
o a message that was sent to them privately
o a computer virus or attachments that are capable of damaging the recipients’ computers
o chain letters and hoax emails
o “spam”, like unsolicited advertising material, or mail unrelated to learning
 will not damage or disable computers, computer systems or networks of the College or other
entity
 will not attempt any repairs on the computing device provided by the College, nor open the
machine’s enclosure in any way.
 will ensure that online services are not used for unauthorised commercial activities, political
lobbying, gambling or any unlawful purpose.
 will not attempt to access the College’s network using an unapproved private device, including
but not limited to, smartphones or games devices
 will ensure that they have an appropriate data backup strategy. For example, all important data
(e.g. assignments) should be backed up to an external device every week. Furthermore,
important documents should also be stored in a “cloud-based” backup facility like Dropbox
(www.dropbox.com).
 will not install software on any College computing device without completing the appropriate
Software Installation Request document and receiving the approval of the Learning
Technologies Coordinator.
 will promptly comply with all instructions from their teachers relating to the use of College
computing devices and network systems.
 will ensure that any computing device is charged at night for use at school the following day.
 will not use any College computing device while travelling to and from the College or between
10 classes. Any computing device must only be transported secured inside an appropriately
padded bag.
 will not use any College computing device in the playground at recess or lunch.
 will complete regular cleaning and maintenance tasks as outlined in the Netbook User Manual.
 will not attempt to subvert any security measures installed on a College computing device
including, but not limited to, removing pre-installed security software or installing alternative
security software.
 will not install any games or unapproved entertainment software on a College computing
device.
 will not use a College computing device to host, store, access or attempt to access any illegal
or “pirate” content that the student is not able to prove that they legally own.
 Will not use any device to film or photograph at any time at school unless with teacher
permission.
Teachers:
• are responsible for supervising student use of the College provided computing devices and
access to the College network.
• are to maintain an informed view of the relative risks and educational benefits of online activity
by their students. A variety of resources are available from the Inernet sites listed in Section 8
of this policy document.
• are to ensure that students are aware of the possible negative consequences of publishing
identifying information online including their own or other students’ images
• are to refrain from publishing student images or any student-identifying information on the
Internet.
• are to check that any material planned for publication on the Internet or College network has
the approval of the Principal and has appropriate copyright and privacy clearance
• are aware of the steps to take and advice to give if students notify them of inappropriate or
unwelcome online activity by fellow students or members of the public. Such steps may
include:
o collecting as much information as possible about the incident including copies of
communications
o emphasising to the student that the event is not necessarily their fault
o identifying any risky behaviours on the part of the reporting student and counseling them on the
need to adopt more protective behaviours
o if the incident warrants further attention inform the Principal of the incident (for example, if the
teacher suspects the student may have been placed in a position of harm).
• are to inform parents that student Internet access from home or other non-school sites does
not occur via the College’s network and therefore Internet browsing may not be filtered
• should promote the use of strong passwords for students who can cope with the complexity.
Stronger passwords:
o
contain a mixture of alphabetic and non-alphabetic characters
o
are changed frequently
o
do not contain dictionary words
o
do not contain easily identified personal information such as name, date of birth, etc.
o
do not contain any part of the account identifier such as the username
o
are not written down.
8. Online resources for Appropriate Usage and Cyber-Safety
http://www.cybersmart.gov.au/
http://www.theline.gov.au/
I have read and agree to abide by the conditions of use as outlined in the ICT Acceptable Use Policy.
Student’s Name :.............................................................
PC Class:..................................
11 Student’s Signature :............................................................. Date:..................................
Parent’s Signature :............................................................. Date:..................................
St Paul’s College: iPad Pledge
1. I will keep the iPad in my possession, unless it is locked in my locker. 2. I will never loan the iPad to other individuals. 3. I will arrive at school with the iPad fully charged every day. 4. I will protect my iPad by keeping it in a protective cover. 5. I will not change or remove profile settings on the iPad. 6. I understand that the iPad is subject to inspection at any time. 7. I will hand my iPad to a teacher on demand and supply the password if necessary. 8. I will only use my Apple ID on the iPad. Do not allow friends to use your Apple ID. 9. I will not handle another student’s iPad without their permission. 10. I will follow the St Paul’s College Kempsey Responsible Use Agreement. 11. I will use the school Internet resources for educational purposes only. 12. I will file a police report immediately if the iPad is stolen, and tell school about it. 13. I am responsible for damage caused by neglect or abuse. 14. I understand that the iPad is an educational tool which is available to my parents/carers at all times. I will make it available to them on request. 15. I will not use the camera or video on my iPad without teacher permission 16. I have the option to purchase insurance and I am responsible for all costs personally. iPad Management: 1. School purchased apps will be given out to students and expected to loaded on iPads 2. Each user or user’s parent must create a personal iTunes account to “purchase” personal apps, free school‐related apps, and iBooks. A credit card is not required to set up an iTunes account. 3. Personalised apps such as games are not to be used at school without permission. 4. iPads may be confiscated and held at the school if misused, until disciplinary action is undertaken or parents contacted to collect device. 5. At home use is at the discretion of parents and their rules. I have read the STUDENT iPad Pledge and understand that I am responsible at all times for the care and appropriate use of technology. I understand if I violate the guidelines agreed to in the St Pauls College Computer Policy Handbook, my privilege to use technology may be restricted or removed, and I may be subject to disciplinary action. _____________________________________ Parent Signature Date _____________________________________ Student Signature Date 12 COLLEGE COPY
St Paul’s College Student ICT Acceptable Use Policy
I have read and agree to abide by the conditions of use as outlined in the ICT Acceptable Use Policy.
Student’s Name :.............................................................
PC Class:..................................
Student’s Signature :............................................................. Date:..................................
Parent’s Signature :............................................................. Date:..................................
_________________________________________________________________________________
St Paul’s College: iPad Pledge I have read the STUDENT iPad Pledge and understand that I am responsible at all times for the care and appropriate use of technology. I understand if I violate the guidelines agreed to in the St Pauls College Computer Policy Handbook, my privilege to use technology may be restricted or removed, and I may be subject to disciplinary action. _____________________________________ Parent Signature Date _____________________________________ Student Signature Date 13 
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising