THE DOWNS COMPTON FEDERATION ICT POLICY Please...

19
February 2016 THE DOWNS COMPTON FEDERATION ICT POLICY Please see separate policy (attached) for each school.

Transcript of THE DOWNS COMPTON FEDERATION ICT POLICY Please...

February 2016

THE DOWNS COMPTON FEDERATION

ICT POLICY

Please see separate policy (attached) for each school.

February 2016

THE DOWNS SCHOOL

ICT POLICY

Date established: July 2011

Date of last review: March 2015

Date of next review: March 2017

Monitoring and Evaluation:

The ICT policy and its implementation will be reviewed annually by members of The Downs ICT Strategy

Group and reported to the Senior Leadership Team and the ICT governor.

There will be ongoing monitoring of the use of the school system and related personal mobile media devices

in order to establish relevant and responsive implementation as technological developments advance

throughout each year.

February 2016

Status:

Recommended guidance (building on Kent County Council ICT e–Safety policy)

Purpose of the policy:

to develop an e-confident school

to ensure a duty of care to all users of the school systems

to manage the resources of the school efficiently and effectively

The aims of the school are to develop in young people the ability:

To challenge themselves to achieve more than they first believed;

To grow as independent, self-motivated, caring adults;

To be successful and contributing members of a global society.

The Downs Compton Federation is committed to the safeguarding and welfare of its students and young

people.

Consultation:

This policy is established through consultation with The Downs ICT Strategy Group, The Downs Senior

Leadership team, staff, governors and students.

Relationship with other policies:

Anti-Bullying, Behaviour, Child Protection, Staff Wellbeing, Health and Safety, Complaint and Disciplinary,

Race Equality, Sex and Relationships, Equal Opportunities, Code of Conduct for employees, Data protection

Roles and Responsibilities:

All users should be aware of both the school and the legal framework in which they will operate as users of

The Downs ICT system and related communications systems.

Users must have a good understanding of the expectations of their roles and their responsibilities.

Sanctions and Consequences

Failure to adhere to these expectations and accept these responsibilities may lead to the use of sanctions that

can have serious consequences (see school Behaviour Policy and school Disciplinary Policy).

February 2016

Policy Guidelines - The Downs School ICT Policy including E-Safety

1. This policy covers the use of all major technology and its benefits and risks. All users of the school

network, Internet and related technologies; students, teachers, associate staff, parents, governors

and visitors to the school must adhere to this policy.

This ICT policy (including e-Safety) has been written by the school, building on the WBC ICT

e-Safety Policy and government guidance.

The school has designated the role of ICT policy (including e-Safety) Co-ordinator to a member

of staff.

The ICT policy (including e-Safety) and its implementation will be reviewed annually.

2. Teaching and Learning:

ICT is an essential facility to improve Teaching & Learning and therefore any teacher wishing to have a

laptop for work use may apply for one.

2.1. Network and Internet use

The purpose of Internet use in school is to raise educational standards, to promote student

achievement, to support the professional work of staff and to enhance the school’s management

functions.

Network/Internet use is part of the statutory curriculum and a necessary tool for learning.

Network/Internet access is an entitlement for those students who show a responsible and mature

approach to its use.

The internet is an essential element in 21st century life for education, business and social

interaction. The school has a duty to provide students with quality Internet access as part of their

learning experience.

2.2. The benefits of Internet use in education

access to world-wide educational resources;

educational and cultural exchanges between students world-wide;

access to experts in many fields;

professional development for staff through access to national developments, educational

materials and effective curriculum practice;

collaboration across support services and professional associations;

improved access to technical support including remote management of networks and automatic

system updates;

exchange of curriculum and administration data with WBC and DFE;

access to learning anytime, anywhere as appropriate.

2.3. The use of the internet to enhance learning

The Downs School Internet access will be tailored expressly for the school and will include

filtering appropriate to the needs of the school.

Students will be taught what Internet use is acceptable and what is not and given clear outcomes

to achieve through Internet use.

Network/Internet access will be planned to enrich and extend learning activities. Access levels

will be reviewed to reflect the curriculum requirements and age of users.

Staff will guide students in on-line activities that will support the learning outcomes planned for

the students’ age and maturity.

February 2016

Students will be educated in the effective use of the internet in research, including the skills of

knowledge location, retrieval and evaluation.

2.4 Evaluating Internet content:

The quality of information received via all media is variable and everyone needs to develop skills in

selection and evaluation. In a perfect world, inappropriate material would not be visible to users of the

internet, but this is not easy to achieve and cannot be guaranteed. It is a sad fact that users may occasionally

be confronted with inappropriate material, despite all attempts at filtering. Users should be informed what to

do if they experience material that they find distasteful, uncomfortable or threatening. For example: students

should close the page and report the incident immediately to the teacher.

The school will endeavour to ensure that the copying and subsequent use of Internet derived

materials by users complies with copyright law.

Users should be critically aware of the materials they read and shown how to validate

information before accepting its accuracy.

Users should acknowledge the source of information used and respect copyright when using

Internet material in their own work.

The evaluation of on-line materials is an integral part of research.

2.5 Curriculum:

Year 7

In ICT, we deliver a specific unit to the students about eSafety in the first term. We watch the “Kara and

Winston” animated movies where we focus on the word SMART (S – Safe, M – Meeting, A – Accepting, R

– Reliable, T – Tell).

There are five movies each focusing on a letter and after each movie, we discuss the content.

S = Keeping Safe on the internet i.e. Not sharing personal information about yourselves (name, address,

phone number, email etc.)

M = Don’t meet up with people you don’t know. We discuss how people can pretend to be other people on

the internet and how it is difficult to judge. We also stress that, if students do decide to meet up with people

that they have met on the internet, they should take a responsible adult with them.

A = Don’t accept emails or invites from people you don’t know. We talk about the risks to your data and

your computer from viruses and talk about not opening attachments if it is unclear who they are from or what

they contain.

R = Reliable. We talk about whether you can trust what people say on the

internet as well as trusting people are who they say they are.

T = Tell. We urge students to tell a responsible adult if they feel uncomfortable about anything they see or

hear on the internet. We talk about cyber-bullying; its impact as well as what it is.

Throughout the unit, students are enthusiastic about sharing their own opinions and online experiences and it

leads to an informative discussion about any issues or concerns raised, and promotion of how students can be

safe online.

Year 10 - GCSE

Students create an interactive quiz on being safe on the internet as part of their skills building for their

controlled assessment. This covers a range of aspects from choosing a secure password to cyber-bullying.

Year 12 - BTEC

February 2016

Students create a leaflet and poster about cyber-bullying, spam and phishing as part of their Unit 1

assignment (“Using ICT to communicate information”)

Year 12 – AS

Students cover a large topic of how ICT has impacted on lives and society in the modern age. We discuss the

positive and negative aspects of this – one of the main negative ones being eSafety so this is covered and

discussed in lessons at length. Students will then reproduce elements of the discussion in their coursework.

3 Maintaining the security of the System

This is a major responsibility of everyone in the school and all users must be vigilant and take responsibility

for maintaining security.

3.1 The system:

Security strategies will be developed in house and in consultation with partner providers, and

reviewed regularly.

The security of the school’s ICT systems will be reviewed regularly.

Antivirus and anti-malware definitions will be updated on an appropriate frequency, at least

daily.

Personal data sent over the internet via systems maintained by The Downs School will be

encrypted or otherwise secured, however it is the responsibility of the user to ensure that other

systems that they may use are similarly secure.

Measures are in place to ensure that security is not compromised through the use of portable

media devices.

Users are not permitted to bring or otherwise send executable files into school, unless

authorised.

Files held on the school’s network may be subject to random inspection.

Users’ activity on the school’s network will be monitored.

The system is secured, as much as is practicable, against user mistakes and deliberate actions.

Servers will be located securely and physical access restricted.

The operating systems of managed client devices, and the software of back-end servers will have

security updates applied at appropriate intervals.

Access by wireless devices will be pro-actively managed so as to minimise the risk of access by

unprotected devices.

Any tampering with or circumvention of security systems and measures is likely to result in

serious sanctions.

E-mail management:

Users may only use authorised e-mail accounts. For school based users this will be provided by

IT Technical Services.

Unauthorised e-mail services will be blocked wherever practicably possible.

Students must tell a member of staff immediately if they receive an “offensive” e-mail e.g.

involving content inappropriate for the recipient.

Users must not reveal personal details of themselves or others in any electronic communication.

The School e-mail system should not be used for social purposes at any time.

February 2016

E-mail sent to external organisations should be written carefully before sending. Anything that is

not officially authorised is the responsibility of the sender in the same way as a letter written on

school headed paper.

Any e-mail containing controversial information should be authorised in advance by the

Headteacher.

The forwarding of chain e-mail is not permitted.

All users are responsible for maintaining their e-mailboxes.

E-mails sent to distribution lists should only be sent if applicable to the majority of recipients.

E-mails should not be used to impart responsibility for an action. Sending is no guarantee of

receipt or understanding

E-mail must not be relied upon for communications which are urgent or require immediate

action

E-mail must not be used for controversial communication or sent as a result of anger

Users should consider whether face-to-face communication would be more appropriate before

sending an e-mail

E-mail communication should be short and contain only essential detail

Users should not conduct a prolonged dialogue via e-mail but instead should make efforts to

speak directly to recipients

Users should reflect on the effect of the over use of e-mail as a barrier to work/life balance. Sending an e-mail instructs someone to spend some of their time and this should be taken into

account before sending it. It will be considered contrary to the promotion of wellbeing to

send long, detailed e-mails unless the recipient has given approval

3.2 Managing publically published content

The school contact details will be published on the school website.

Users’ personal information, including e-mail addresses will not be published.

The IT Technical Services Engineer – Web and e-Learning will make all reasonable efforts to ensure

that content is accurate, up to date and appropriate.

The school website will comply with the school’s guidelines including respect for intellectual

property rights and copyright.

3.3 Publishing students’ images or work

The security of users is paramount. The publishing of students’ full names with their images is only

acceptable with parental permission. Strategies include using relatively small images of groups of students

or using images that do not show faces at all. Individuals in photographs should be appropriately clothed.

The school will give students/parents the opportunity to decline their permission to use static, moving images

and live links on admission to The Downs or at any point on request.

Users will be made aware of the reasons for caution in publishing personal information and images in social

publishing sites.

Images that include students will be selected carefully.

The full name of a student will not be used anywhere on the school website in association with

photographs unless permission has been given.

Students will be informed if their work is going to be publically published.

3.4 Social networking/ applications and personal publishing – this section has been included for the

protection of individuals

Users should be encouraged to think about the consequence of uploading personal information to sites and

the impossibility of removing an inappropriate comment, photo, or address once published. Social

networking applications include, but are not limited to: Blogs, Online discussion forums, Collaborative

spaces, Media sharing services, ‘Microblogging’ applications. Examples include Twitter, Facebook,

February 2016

YouTube, Whatsapp, Snapchat, MySpace, Bebo forum/bulletin boards, multi-player online gaming,

chatrooms, and instant messaging. Do not write anything you would not be prepared to see on the front

page of a daily newspaper.

Where collaborative tools are used in an educational context this is done within the protected school

environment.

The schools will block access to social networking sites.

Newsgroups will be blocked unless a specific use is approved.

Students will be instructed never to give out personal details of any kind which may identify them

and/or their location. Examples would include real name, address, mobile or landline phone

numbers, school attended, instant messaging and e-mail addresses, full names of friends, specific

interests and clubs etc.

Students will be advised not to place personal photos on any social network space. They should

consider how public the information is and consider using private areas. Students will be advised on

security and encouraged to set passwords, deny access to unknown individuals and instructed how to

block unwanted communications.

Students should be encouraged to invite known friends only and deny access to others.

Users should take adequate precautions when using social networking sites/applications, both in

vetting material that could be connected to them (through their own or friends’ profiles) and through

the use of appropriate security settings.

Students will be advised not to publish specific and detailed private thoughts.

Staff should not run websites or social network spaces for student use external to the school system.

Staff should not be “friends” with students on non-school social networking sites as this could be

viewed as a safeguarding issue unless specific permission is sought and given by the headteacher.

The way in which users present and conduct themselves on social networking sites can have an

impact on the public perception of the school and influence the way in which those users are

perceived by others.

In their use of social networking sites, staff should be aware that their online behaviour could affect

their professional standing, integrity and dignity.

Staff should not identify their school as their employer on social networking sites as this could

directly link their behaviour outside of work with the reputation of the school.

Staff should report concerns about the inappropriate use of a social networking site/application by

another member of staff to the Headteacher.

Breach of the rules in relation to social networking or any inappropriate use of social networking

sites and applications by staff will be dealt with through the School’s Disciplinary Procedure.

Harassment and bullying occurring through electronic communication will result in sanctions being

applied. Referral to the legal framework will be made as appropriate.

February 2016

3.5 Managing access

3.5.1 Identity and Access

Each user is given a network account once he or she has signed the ‘IT Code of Conduct’, on starting

at the school.

The network account credentials are made up of a username and a password.

The password is a secret and must not be written down or shared with anybody.

The password must be a ‘strong password’ such that it does not include part of the username or

name, is at least 8 characters, and contain at least 3 types of character from the below list:

o Lowercase letters

o Uppercase letters

o Numbers

o Symbols such as &, %, $

The username and password is used to verify the credentials of a person.

The network account gives appropriate access to the network based on the user’s role in the school.

Users must not use other people’s network accounts to gain access to the network, in any

circumstances.

Users are responsible for everything that happens under their account.

If access to other people’s files or e-mail inbox is required, then a request must be made to IT

Technical Services who will verify this with the required line manager and modify the user’s own

account to provide access.

Network account passwords must be reset only in person (to verify identity), by going to the IT

Technical Services office.

Special accounts may be generated for visitors, but an assigned member of staff must take

responsibly for them. Visitor account passwords are also a secret and must not be written down or

shared.

3.5.2 Managing access to the internet

The technical strategies used to restrict access to inappropriate material on the internet, fall into several

overlapping types:

Network accounts and associated permissions will be used to ensure an appropriate level of access to

the internet for individual users.

Blocking strategies will be in place to minimise access to unsuitable sites “walled-garden” or “allow-

list” will restrict access to a list of approved sites. Such lists inevitably limit students’ access to a

narrow range of information.

Dynamic filtering will examine web page content or e-mail for unsuitable words. Filtering of

outgoing information such as web search requests will also occur.

Access monitoring will record the internet sites visited by individual users.

If staff or students discover unsuitable sites, the URL must be reported to The Head of IT Technical

Services.

Any material that the school believes is illegal will be reported to appropriate agencies.

February 2016

3.6 Managing videoconferencing

Videoconferencing enables users to see and hear each other between different locations. It is a ‘real time’

interactive technology and has many uses in education.

All videoconferencing equipment in the classroom must be switched off when not in use and not set

to auto answer.

The equipment must be secure and if necessary locked away when not in use.

Videoconferencing will be supervised appropriately for the students’ age.

Unique log on and password details for the educational videoconferencing services will only be

issued to members of staff and kept secure.

When recording a videoconference lesson, written permission will be given by all sides and

participants. The reason for the recording must be given and the recording of the videoconference

should be clear to all parties at the start of the conference.

When recording a lesson, the reason for the recording must be given.

Recorded material will be stored securely.

3.7 Managing technologies

Many communication technologies offer the potential to develop new teaching and learning tools, including

mobile communications, virtual classrooms, virtual communities, wide Internet access and multimedia. New

approaches such as mentoring and parent access to assessment scores are emerging. An on-line community

can be one way to encourage a disaffected student to keep in touch. Technologies will be examined for

educational benefit and a risk assessment will be carried out before use in school is allowed.

Smartphones, PMPs (Personal Media Players), and tablets will only be used during lessons

under the direction and supervision of staff. At all times this should be for constructive

educational use. The school is not responsible for any damage or loss to any technology brought on

to the site by students including for their use during structured learning time.

The sending of abusive or inappropriate text messages or images is forbidden. Abusive text

messages will be dealt with under the school bullying policy.

The use of such technology by students, during the school day but outside the direction and

supervision of staff, is forbidden and any visible sign of such technologies beyond structured

learning time will result in confiscation.

Staff should place personal mobile phones on silent and should ensure they are not active during

lesson/working time, unless their use is integral to their role in school

Staff will be issued with a school phone where contact with students is required and should not issue

their personal phone number to students

3.7.1 Smartphones, PMPs (Personal Media Players), and Tablets

Members of staff should not use personal devices to capture still or recorded images of students, either in

school or on off-site activities. School cameras are available should staff wish to use them.

All media devices such as smartphones, PMPs (Personal Media Players), tablets, and cameras, if brought in

to school, are the sole responsibility of the owner. The school cannot accept liability for the loss, theft or

damage of such devices.

Although it is recognised that mobile phones in certain circumstances may be beneficial to students (in

situations such as contacting parents before and after school hours to change arrangements), students must

not use a mobile phone on the school premises unless explicitly allowed to do so by a member of staff.

Such devices should be switched off during the school day unless explicitly allowed by a member of

staff. They should not be seen. This includes headphones.

February 2016

The only exception to this relates to sixth form students who can use devices in their private study

areas and in the Common Room. They should not be used around the main school site without the

permission of a member of staff.

In the event of an emergency, the school will contact the parent/carer during school hours

Students will be allowed to use a school phone if necessary.

Such devices or cameras should never be used to record or capture images during the school day

unless the use is permitted by a teacher as part of a lesson. Such devices must only be used with the

express permission of a member of staff and must never contain inappropriate material.

Should use in the classroom be permitted, then the school cannot accept liability for the loss, theft or

damage of such equipment.

Such devices should not be loaned to others.

Such devices must not be used to send voice, text or image communication to send abusive, impolite

or otherwise inappropriate material.

Such devices must not be used to view or share inappropriate materials or to access the internet in

order to download or view inappropriate material. Serious sanctions will be applied in these

circumstances.

In the case of misuse, e.g. a phone or PMP being used during school hours, the device will be

confiscated for 3 days and held securely for collection at 3.15pm on the third day unless collected

beforehand by the parent or carer of the student.

Further misuse would result in the device being confiscated and held for collection by the

parent/carer of the student. In such cases a student will not be allowed to bring such devices into

school.

During examinations, such devices must not be taken into the examination room. There are strict

regulations applied by examination boards which the school must abide by. Failure to follow these

can result in an examination paper being declared void and in some cases a student being banned

from further examination entry with that examination board.

Staff should report any identified inappropriate usage.

Smart watches will be treated in a similar way to mobile phones.

Students may wear smart watches in school, but if a member of staff witnesses a student using his or

her smart watch in a way that could negatively impact on the student’s learning, such as by sending

messages or using social media, then the member of staff will confiscate the smart watch. Just as

with mobile phones that are confiscated, the smart watch will be kept in the school safe for three

days or until a parent or carer comes into school to collect the watch from reception.

It should be stressed that the judgment over whether or not a student is misusing the smart watch will

rest with the member of staff witnessing the incident.

Students will not be permitted to wear smart watches during examinations, tests and controlled as-

sessments, in accordance with the rules of the Joint Council for Qualifications, which oversees pub-

lic examinations.

Smart watches, like all media devices, are the sole responsibility of the owner. The school cannot

accept liability for the loss, theft or damage of such devices.

February 2016

3.8 Security of personal or sensitive information taken or sent out of school

Personal and sensitive data is protected within the school network but once it is sent or taken out of school

then users must be aware of the need to maintain appropriate security measures. Unless necessary, personal

and sensitive data should not be taken out of school in either electronic or paper form. This includes sending

content over the internet through e-mail or other information transmission system.

Users should ensure that any personal or sensitive data sent over the internet will use encrypted transmission.

Personal or sensitive data will only be carried in portable storage where the contents are stored encrypted.

This includes laptops and other portable computers.

Systems will be in implemented which enable secure remote access to school information systems.

3.9 Protecting personal data

The Data Protection Act 1998 (“the Act”) gives individuals the right to know what information is held about

them and it provides a framework to ensure that personal information is handled properly. It promotes

openness in the use of personal information. Under the Act every organisation that processes personal

information (personal data) must notify the Information Commissioner's Office, unless they are exempt.

The Data Protection Act 1998 applies to anyone who handles or has access to information concerning

individuals. Everyone in the workplace has a legal duty to protect the privacy of information relating to

individuals

Personal data will be recorded, processed, transferred and made available according to the Data Protection

Act 1998.

4 Policy Decisions

4.1 Authorising Network/Internet access

The school will allocate network/internet access for users on the basis of educational need. Authorisation is

on an individual basis. Parental permission will be required for student access. This is given when students

join the school and when students’ details are checked.

The school will maintain a current record of all users who are granted access to the school’s

electronic communications.

All users must read and sign the ‘ICT Code of Conduct’, to indicate their agreement, before using

any school ICT resource.

Staff will be asked to sign the ‘Code of conduct for employees’ before using any school ICT

resource.

Parents will be asked to sign and return a consent form and Code of Conduct for student access.

4.2 Assessing risks

As the quantity and breadth of information available through the internet continues to grow it is not possible

to guard against every undesirable situation. It is difficult to remove completely the risk that users might

access unsuitable materials via the school system.

The use of computer systems without permission or for inappropriate purposes could constitute a

criminal offence under the Computer Misuse Act 1990.

February 2016

The school will take all reasonable precautions to ensure that users access only appropriate material.

However, due to the global and connected nature of Internet content, it is not possible to guarantee

that access to unsuitable material will never occur via a school system. Neither the school nor WBC

can accept liability for the material accessed, or any consequences resulting from Internet use. The

publishing of an “obscene” article is a criminal offence.

The school will audit ICT use to establish if the ICT policy (including e-Safety) is adequate and that

the implementation of the ICT policy (including e-Safety) is appropriate.

Methods to identify, assess and minimise risks will be reviewed regularly.

4.3 Handling complaints

Parents, staff and students can submit a complaint about network/Internet misuse following the usual school

procedure. The facts of the case will be investigated, access to the communication technology will be

temporarily disabled as a precaution, and the school’s disciplinary policy will be followed. Potential child

protection or illegal issues will be referred to the school Designated Child Protection Officer or ICT policy

(including e-Safety) Co-ordinator

Discussions may be held with the local Police to establish procedures for handling potentially illegal

issues.

Complaints of equipment/network/internet misuse will be dealt with initially by a senior member of

staff and the schools disciplinary procedures will be followed.

Any complaint about adult misuse will be referred to the headteacher.

Students and parents will be informed of the complaints procedure.

Parents and students should work in partnership with staff to resolve issues.

4.4 Using the internet access across the community

The school will liaise with local organisations to establish a common approach to ICT policy

(including e-Safety).

The school will be sensitive to Internet related issues experienced by students out of school (e.g.

social networking sites) and offer appropriate advice.

5 Communicating Policy

5.1 Introducing the policy to users

The ICT Code of Conduct will be posted in rooms with ICT access.

All users will be informed that network and Internet use will be monitored.

It will be the responsibility of all staff to communicate and promote the importance of safe and

responsible ICT use.

The policy will be explained to students in assemblies or PDP

5.2 Discussing the policy with staff

The School ICT policy (including e-Safety) will only be effective if all staff subscribe to its values and

methods. Staff must understand that the rules for information systems misuse are quite specific. Instances

resulting in dismissal have occurred. If a member of staff is concerned about any aspect of their ICT use in

school, they should discuss this with their line manager to avoid any possible misunderstanding.

Users must take responsibility for their network/internet use. For users of The Downs School ICT

system, flouting the ICT policy is regarded as a disciplinary matter.

Induction of new staff will include a discussion of the school’s ICT policy (including e-Safety).

February 2016

All staff will be given the school ICT policy (including e-Safety) and its application and importance

explained.

Staff will be made aware that Internet traffic can be monitored and traced to the individual user.

Discretion and professional conduct is essential.

Staff that manage filtering systems or monitor ICT use will be supervised by a senior leader and

have clear procedures for reporting issues.

Staff training in safe and responsible network/Internet use and on the school ICT policy (including e-

Safety) will be provided as required.

5.3 Enlisting parents’ support

Parents’ attention will be drawn to the school’s ICT policy (including e-Safety) and ICT Code of

Conduct in newsletters, the school prospectus and on the school website.

Network/Internet issues will be handled sensitively and parents will be advised accordingly.

A partnership approach with parents will be encouraged

February 2016

Legal Framework

Notes on the legal framework

This section is designed to inform users of legal issues relevant to the use of electronic communications. It is

not professional advice.

Many young people and indeed some staff use the internet regularly without being aware that some of the

activities they take part in are potentially illegal. The law is developing rapidly and recent changes have

been enacted through:

The Sexual Offences Act 2003, which introduces new offences of grooming, and, in relation to

making/distributing indecent images of children, raised the age of the a child to 18 years old;

The Racial and Religious Hatred Act 2006 which creates new offences involving stirring up hatred

against persons on religious grounds; and

The Police and Justice Act 2006 which extended the reach of the Computer Misuse Act 1990 making

denial of service attacks a criminal offence.

Racial and Religious Hatred Act 2006

This Act makes it a criminal offence to threaten people because of their faith, or to provoke religious hatred

by displaying, publishing or distributing written material which is threatening. Other laws already protect

people from threats based on their race, nationality or ethnic background.

Sexual Offences Act 2003

The new grooming offence is committed if you are over 18 and have communicated with a child under 16 at

least twice (including by phone or using the internet) and arrange to meet them or travel to meet them

anywhere in the world with the intention of committing a sexual offence.

Causing a child under 16 to watch a sexual act is illegal, including looking at images such as videos, photos

or webcams, for your own gratification.

It is also an offence for a person in a position of trust to engage in sexual activity with any person under 18,

with whom they are in a position of trust. (Typically, teachers, social workers, health professionals,

connexions staff fall in this category of trust).

Any sexual intercourse with a child under the age of 13 commits the offence of rape.

N.B. Schools should already have a copy of “Children & Families: Safer from Sexual Crime” document as

part of their child protection packs.

More information about the 2003 Act can be found at www.teachernet.gov.uk

Communications Act 2003 (section 127)

Sending by means of the internet a message or other matter that is grossly offensive or of an indecent,

obscene or menacing character; or sending a false message by means of or persistently making use of the

internet for the purpose of causing annoyance, inconvenience or needless anxiety is guilty of an offence

liable, on conviction, to imprisonment.

This wording is important because an offence is complete as soon as the message has been sent; there is no

need to prove any intent or purpose.

Data Protection Act 1998

The Act requires anyone who handles personal information to notify the Information Commissioner’s Office

of the type of processing it administers, and must comply with important data protection principles when

treating personal data relating to any living individual. The Act also grants individuals rights of access to

their personal data, compensation and prevention of processing.

February 2016

The Computer Misuse Act 1990 (sections 1 – 3)

Regardless of an individual’s motivation, the Act makes it a criminal offence to:

gain access to computer files or software without permission (for example using someone else’s

password to access files);

gain unauthorised access, as above, in order to commit a further criminal act (such as fraud); or

impair the operation of a computer or program (for example caused by viruses or denial of service

attacks).

UK citizens or residents may be extradited to another country if they are suspected of committing any of the

above offences.

Malicious Communications Act 1988 (section 1)

This legislation makes it a criminal offence to send an electronic message (e-mail) that conveys indecent,

grossly offensive, threatening material or information that is false; or is of an indecent or grossly offensive

nature if the purpose was to cause a recipient to suffer distress or anxiety.

Copyright, Design and Patents Act 1988

Copyright is the right to prevent others from copying or using his or her “work” without permission.

The material to which copyright may attach (known in the business as “work”) must be the author’s own

creation and the result of some skill and judgement. It comes about when an individual expresses an idea in a

tangible form. Works such as text, music, sound, film and programs all qualify for copyright protection. The

author of the work is usually the copyright owner, but if it was created during the course of employment it

belongs to the employer.

It is an infringement of copyright to copy all or a substantial part of anyone’s work without obtaining the

author’s permission. Usually a licence associated with the work will allow a user to copy or use it for limited

purposes. It is advisable always to read the terms of a licence before you copy or use someone else’s

material.

It is also illegal to adapt or use software without a licence or in ways prohibited by the terms of the software

licence.

Public Order Act 1986 (sections 17 – 29)

This Act makes it a criminal offence to stir up racial hatred by displaying, publishing or distributing written

material which is threatening. Like the Racial and Religious Hatred Act 2006 it also makes the possession of

inflammatory material with a view of releasing it a criminal offence.

Protection of Children Act 1978 (Section 1)

It is an offence to take, permit to be taken, make, possess, show, distribute or advertise indecent images of

children in the United Kingdom. A child for these purposes is anyone under the age of 18. Viewing an

indecent image of a child on your computer means that you have made a digital image. An image of a child

also covers pseudo-photographs (digitally collated or otherwise). A person convicted of such an offence may

face up to 10 years in prison.

Obscene Publications Act 1959 and 1964

Publishing an “obscene” article is a criminal offence. Publishing includes electronic transmission.

Protection from Harassment Act 1997

A person must not pursue a course of conduct, which amounts to harassment of another, and which he knows

or ought to know amounts to harassment of the other.

A person whose course of conduct causes another to fear, on at least two occasions, that violence will be

used against him is guilty of an offence if he knows or ought to know that his course of conduct will cause

the other so to fear on each of those occasions.

February 2016

Regulation of Investigatory Powers Act 2000

The Regulation of Investigatory Powers Act 2000 (RIP) regulates the interception of communications and

makes it an offence to intercept or monitor communications without the consent of the parties involved in the

communication. The RIP was enacted to comply with the Human Rights Act 1998.

The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000,

however, permit a degree of monitoring and record keeping, for example, to ensure communications are

relevant to school activity or to investigate or detect unauthorised use of the network. Nevertheless, any

monitoring is subject to informed consent, which means steps must have been taken to ensure that everyone

who may use the system is informed that communications may be monitored.

Covert monitoring without informing users that surveillance is taking place risks breaching data protection

and privacy legislation.

With acknowledgement to Kent County Council

The DOWNS SCHOOL

ICT Code of Conduct (Student)

The Downs School ICT system is to support your learning. It is NOT provided for your own personal use. The

following rules have been set up to ensure a safe and reliable environment for all Downs School users:

I understand this Code of Conduct applies to all ICT facilities, both inside and outside the school provided by The

Downs School. I understand that the school network, including Moodle, web based applications and e-mail are

made available to me to assist my learning or for staff professional activity and is not there for my own personal

use.

I shall only access the system using my own username and password, which I will keep secret from everyone. I

accept that I am responsible for any activity carried out under my username.

I will never allow others to use my network account.

I will not access other people's personal files or e-mails.

I will only use the computers for schoolwork and homework.

I will only send e-mail to people I know, or those my teacher has approved.

I will not send unpleasant, offensive or improper material, or messages, to others, including the bullying, harass-

ment or intimidation of others.

I will not post inappropriate material on forums or blogs.

I will not give out my home address or telephone number, or arrange to meet someone, unless my parent, carer or

teacher has given permission. This includes competing on-line forms.

I will report to a member of staff if I am aware of any misuse of the system by others or of any unpleasant websites,

material or messages sent to me. I understand this report would be confidential and would help protect others and

myself.

I understand that the school will check my computer files, my e-mails and my ICT usage and will monitor the in-

ternet sites that I visit.

I will not attempt to open, download, or e-mail to myself at the school site, any executable files including but not

limited to those with an exe, dll or scr extension, or bring this material into the school on a portable storage device.

I understand that I may not keep any images for the purpose of setting a screen-saver or desktop images.

I will not do anything with the intention of disrupting the service for use by others.

I understand that various security measures have been taken to protect the users and the network from external or

internal attack, including but not limited to blocking of certain websites. I will not attempt to bypass these

measures thereby defeating those security measures. This includes the use of proxy services.

I also understand that I must not play games using the school system, as it is provided for my educational benefit

I shall not cause any ICT equipment to be unavailable to others through misuse including but not limited to:

corrupting the operating system, unplugging cables and changing settings.

I fully realise that if I break any of the items in this ICT Code of Conduct that my ICT access may be disabled, per-

haps permanently, and that other disciplinary action may be taken and, if a student, a letter will be sent to my par-

ents informing them of how I have breached the rules.

The school requires confirmation that both student and parent/guardian accept this Code of Conduct. Therefore,

please see the enclosed Parental Consent Form.

The Downs School - ICT Code of Conduct (Staff)

The Downs School ICT system is to support learning and teaching. It is NOT provided for your own

personal use. The school’s ICT Policy, including E-Safety, can be found on the school’s website

www.thedownsschool.org). Please read the ICT Policy thoroughly before signing this Code of Conduct.

The following rules have been set up to ensure a safe and reliable environment for all Downs School users:

I understand this Code of Conduct applies to all ICT facilities (both inside and outside the school)

provided by The Downs School I understand that the school network, including Moodle, web based

applications and e-mail are made available to me to assist my learning and staff professional activity and

are not there for my own personal use.

I will only access the system using my own username and password, which I will keep secret from

everyone, or other accounts specifically provided for that purpose.

I will never allow others to use my username.

I will not access other people's files or e-mails (unless, as a member of staff it forms part of the job role)

I will only use the computers for school related work unless specific permission is sought and given

from my line manager.

I will not send unpleasant, offensive or improper material, or messages, to others.

I will report to IT Technical Services if I become aware of any misuse of the system by others or of any

unpleasant websites, material or messages sent to me. I understand this report would be confidential and

would help protect other users and myself.

I understand that the school will check my computer files, my e-mails and my ICT usage and will

monitor the internet sites I visit.

I will not attempt to open, download, or e-mail to myself at the school site, any executable files

including but not limited to those with an exe, dll or scr extension, or bring this material into the school

on a portable storage device.

I shall not cause any ICT equipment to be unavailable to others through misuse including but not limited

to: corrupting the operating system, unplugging cables and changing settings.

I also understand that I must not play personal games using the school system, as it is provided for my

educational benefit. ‘Games’ forming part of the taught curriculum may be made available to me.

I shall not take or send personal or sensitive information out of school unless secured against loss.

I fully realise that if I break any of the items in this ICT Code of Conduct or fail to adhere to the ICT

policy, then my ICT access may be disabled, and that other disciplinary action may be taken.

--------------------------------------------------------------------------------------------------------------------------------

I confirm that I have read The Downs School’s ICT policy, including e-Safety, and this ICT Code of

Conduct.

I agree to follow The Down’s School ICT Code of Conduct.

Name (Please Print) _____________________________________ Date ________________________

Signature __________________________________________

For school office use only--------------------------------------------------------------------------------------------------