[Year 12 IPM] off-topic request: laptop usage policy

Stephen Digby digby.stephen.p at edumail.vic.gov.au
Tue May 16 14:57:15 EST 2006


1.	Plain language simple 1 page document buried in policy, but displayed and given to students on each transgression.



	Computer Use Agreement

	The College provides a range of computer resources for the educational opportunities that they provide to all students.
There are rules concerning their use just as in any other area of school life.  These rules ensure that computers are used to
achieve the educational goals of the school program, and that all students take responsibility for their actions when using
computers.

	We understand and agree to abide by College rules, in particular: 

	
 

	Inappropriate Internet Use:  When visiting internet sites, students must abide by the college's Research Policy, by  not
accessing sites that provide pornographic, violent, drug related, racist, illegal (by either State, National or International Law)
or socially unacceptable material.

	q       Surf, Chat & Email: Students should not: "Surf" the internet for amusement; use "chat" software or sites; access any
personal email.  Students should be using the internet for educational research ONLY under the supervision of a teacher for purposes
set by the teacher.

	Inappropriate Network Use

	q       Password Violation:  Students must not, under any circumstances, attempt to discover passwords or log on to the
network as another person.  Students are to accept full responsibility (and penalties) for use of any personal passwords by others.

	q       Non-educational Files:  Students must not store files unrelated to their studies on the network.  Network storage
space is provided to students to enable them to store and access information related to their educational courses at this school.
Storage of other files such as programs and pictures for entertainment and general interest are not permitted.  Such files may be
deleted without warning if they are taking up too much network storage space.

	q       Games:  Students are NOT to use, download, or store on network or floppy discs any unauthorised games. 

	q       Excess Storage in Network Folder after being warned with logon notice.

	Inappropriate Hardware & Software Use

	q       Hardware must be used carefully and software settings must not be changed without the permission of the teacher.

	q       Any floppy disks owned by students but used on school computer must be protected from dust at all times so that they
do not damage school disc drives, and scanned for viruses prior to use on College computers

	q       Students must not engage in any activity which will either infringe existing laws (including copyright) or impinge
on the school's or individual's reputation. 

	q       The Cheltenham Secondary College must not be used in the registering of addresses, purchase of products, adding to
mailing addresses or registering interest in a web site, product, mail order, competition unless approved by a member of staff. 

	Punishment: 

	Loss of network AND/ OR internet access      q Return of this letter   OR    q Date:_________________________ 

	 

	After school detention (3:20pm - 3:50pm).        q Date:  _______________________________________________ 

	 

	Repeated or serious breaches of the rules will lead to permanent withdrawal of access to the college computer facilities
and/or suspension (regardless of whether or not computers are required for course or study purposes).

	 

	Student Signature:

Parent/Guardian Signature:
Date:_____________________

	

2.	Record keeping - all student transgressions recorded database shared with all other teachers so it is not a separate and
ignored "tech" transgression.
3.	Public action - All serious breaches referred to normal school behaviour system AND criminal breaches (e.g. serious
pornography) referred to police

We do not want to try to hold back the tide of portable storage availability.  BUT we need to communicate to the students & admin
that the inevitable increase in storage power mean the increase in potential for abuse.  Admin will try to make it a technical issue
(can't you get software to stop them, detect the source of the files etc etc)  It is not a technical issue.  It is a rights vs..
responsibility issue.
 

======================================================================================
Stephen Digby, Learning Technology Manager digby.stephen.p at edumail.vic.gov.au
Cheltenham Secondary College www.cheltsec.vic.edu.au Ph: 613 955 55 955  Fx: 9555 8617
======================================================================================








The most important thing in communication is hearing What isn't being said. - Anonymous

-----Original Message-----
From: ipm-bounces at edulists.com.au [mailto:ipm-bounces at edulists.com.au] On Behalf Of Neil Carmona-Vickery
Sent: Tuesday, 16 May 2006 2:38 PM
To: Year 12 Information Technology Processing and Management Teachers'Mailing List
Subject: [Year 12 IPM] off-topic request: laptop usage policy

Hi Everyone,

Apologies for this off-topic request.

I'm helping put together a 1:1 Laptop Learning Programme for Year 9 students here at Ringwood SC.
At present we have a Network Usage Policy that covers such things as obscene material and cyberbullying. Unfortunately much of the
guts of the policy is buried in policy speak and doesn't translate well to student language.

My question is, what other approaches have other schools used to a) prevent the circulation of obscene material on student laptops
and b) clearly outline the consequences for going against school policy ?

Thanks in advance,

Neil


_______________________________________________
http://www.edulists.com.au - FAQ, resources, subscribe, unsubscribe IPM Mailing List kindly supported by http://www.vcaa.vic.edu.au
- Victorian Curriculum and Assessment Authority and http://www.vitta.org.au  - VITTA Victorian Information Technology Teachers
Association Inc



Important - 
This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of the Department of Education & Training.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.edulists.com.au/pipermail/ipm/attachments/20060516/aefb896e/attachment-0001.html


More information about the ipm mailing list