Common use of Illegal Incidents Clause in Contracts

Illegal Incidents. If there is any suspicion that the web site(s) concerned may contain child abuse images, or if there is any other suspected illegal activity, refer to the right hand side of the Flowchart (below and appendix) for responding to online safety incidents and report immediately to the police. Other Incidents It is hoped that all members of the school community will be responsible users of digital technologies, who understand and follow school policy. However, there may be times when infringements of the policy could take place, through careless or irresponsible or, very rarely, through deliberate misuse. In the event of suspicion, all steps in this procedure should be followed: • Have more than one senior member of staff involved in this process. This is vital to protect individuals if accusations are subsequently reported. • Conduct the procedure using a designated computer that will not be used by young people and if necessary can be taken off site by the police should the need arise. Use the same computer for the duration of the procedure. • It is important to ensure that the relevant staff should have appropriate internet access to conduct the procedure, but also that the sites and content visited are closely monitored and recorded (to provide further protection). • Record the URL of any site containing the alleged misuse and describe the nature of the content causing concern. It may also be necessary to record and store screenshots of the content on the machine being used for investigation. These may be printed, signed and attached to the form (except in the case of images of child sexual abuse – see below) • Once this has been completed and fully investigated the group will need to judge whether this concern has substance or not. If it does, then appropriate action will be required and could include the following: o Internal response or discipline procedures o Involvement by Local Authority or national/local organisation (as relevant). o Police involvement and/or action • If content being reviewed includes images of child abuse, then the monitoring should be halted and referred to the Police immediately. Other instances to report to the police would include: o incidents of ‘grooming’ behaviour o the sending of obscene materials to a child o adult material which potentially breaches the Obscene Publications Act o criminally racist material o promotion of terrorism or extremism o offences under the Computer Misuse Act (see User Actions chart above) o other criminal conduct, activity or materials • Isolate the computer in question as best you can. Any change to its state may hinder a later police investigation. It is important that all of the above steps are taken as they will provide an evidence trail for the school and possibly the police and demonstrate that visits to these sites were carried out for safeguarding purposes. The completed form should be retained by the group for evidence and reference purposes. School actions & sanctions It is more likely that the school will need to deal with incidents that involve inappropriate rather than illegal misuse. It is important that any incidents are dealt with as soon as possible in a proportionate manner, and that members of the school community are aware that incidents have been dealt with. It is intended that incidents of misuse will be dealt with through normal behaviour/disciplinary procedures as follows: Actions/Sanctions Students/Pupils Incidents Refer to class teacher Refer to DSL Team Refer to Headteacher Refer to Police Refer to technical support staff for action re filtering/security etc. Inform parents/carers Removal of network/internet access rights Warning Further sanction – Behaviour Policy Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable/inappropriate activities). X X X Unauthorised use of non-educational sites during lessons X X Unauthorised/inappropriate use of mobile phone/digital camera/other mobile device X X X Unauthorised/inappropriate use of social media/ messaging apps/personal email X X X X X Unauthorised downloading or uploading of files X X X X X X Allowing others to access school network by sharing username and passwords X X X X X Attempting to access or accessing the school network, using another student’s/pupil’s account X X X X X Attempting to access or accessing the school network, using the account of a member of staff X X X X X Corrupting or destroying the data of other users X X X X X Sending an email, text or message that is regarded as offensive, harassment or of a bullying nature X X X X Continued infringements of the above, following previous warnings or sanctions X X X X Actions which could bring the school into disrepute or breach the integrity of the ethos of the school X X X X X Using proxy sites or other means to subvert the school’s filtering system X X X X Accidentally accessing offensive or pornographic material and failing to report the incident X X X X Deliberately accessing or trying to access offensive or pornographic material X X X X Receipt or transmission of material that infringes the copyright of another person or infringes the Data Protection Act X X X Actions/Sanctions Staff Incidents Refer to line manager Refer to Headteacher Refer to Local Authority/HR Refer to Police Refer to Technical Support Staff for action re filtering etc. Warning Suspension Disciplinary action Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable/inappropriate activities). X X X Inappropriate personal use of the internet/social media/personal email X X Unauthorised downloading or uploading of files X X X Allowing others to access school network by sharing username and passwords or attempting to access or accessing the school network, using another person’s account X X Careless use of personal data e.g. holding or transferring data in an insecure manner X X X Deliberate actions to breach data protection or network security rules X X X X X X Corrupting or destroying the data of other users or causing deliberate damage to hardware or software X X X X X X Sending an email, text or message that is regarded as offensive, harassment or of a bullying nature X X X X X Using personal email/social networking/instant messaging/text messaging to carrying out digital communications with pupils X X X X Actions which could compromise the staff member’s professional standing X X X X Actions which could bring the school into disrepute or breach the integrity of the ethos of the school X X Using proxy sites or other means to subvert the school’s filtering system X X X X X Accidentally accessing offensive or pornographic material and failing to report the incident X X X X Deliberately accessing or trying to access offensive or pornographic material X X X X X Continued infringements of the above, following previous warnings or sanctions X X Appendices Pupil Acceptable Use Agreement – kS2 21 Pupil Acceptable Use Policy Agreement – (Foundation/KS1) 24 Parent/Carer Acceptable Use Agreement 24 Staff (and Volunteer) Acceptable Use Policy Agreement 25 Acceptable Use Agreement for Community Users 28 Responding to incidents of misuse – flow chart 29 Record of reviewing devices/internet sites (responding to incidents of misuse) 30 Reporting Log 31 Training Needs Audit Log 32 School Technical Security Policy (including filtering and passwords) 33 School Personal Data Advice and Guidance 38 School policy template: Electronic Devices - Searching & Deletion 48 Mobile Technologies Policy (inc. BYOD/BYOT) 52 Social Media Policy 55 School Policy – Online Safety Group Terms of Reference 59 Legislation 61 Glossary of Terms 68

Appears in 1 contract

Samples: www.ackworthhowardschool.co.uk

AutoNDA by SimpleDocs

Illegal Incidents. If there is any suspicion that the web site(s) concerned may contain child abuse images, or if there is any other suspected illegal activity, refer to the right hand side of the Flowchart (below and appendix) for responding to online safety incidents and report immediately to the police. Other Incidents It is hoped that all members of the school community will be responsible users of digital technologies, who understand and follow school / academy policy. However, there may be times when infringements of the policy could take place, through careless or irresponsible or, very rarely, through deliberate misuse. In the event of suspicion, all steps in this procedure should be followed: Have more than one senior member of staff / volunteer involved in this process. This is vital to protect individuals if accusations are subsequently reported. Conduct the procedure using a designated computer that will not be used by young people and if necessary can be taken off site by the police should the need arise. Use the same computer for the duration of the procedure. It is important to ensure that the relevant staff should have appropriate internet access to conduct the procedure, but also that the sites and content visited are closely monitored and recorded (to provide further protection). Record the URL url of any site containing the alleged misuse and describe the nature of the content causing concern. It may also be necessary to record and store screenshots of the content on the machine being used for investigation. These may be printed, signed and attached to the form (except in the case of images of child sexual abuse – see below) Once this has been completed and fully investigated the group will need to judge whether this concern has substance or not. If it does, does then appropriate action will be required and could include the following: o Internal response or discipline procedures o Involvement by Local Authority or national/national / local organisation (as relevant). o Police involvement and/or action If content being reviewed includes images of child abuse, Child abuse then the monitoring should be halted and referred to the Police immediately. Other instances to report to the police would include: o incidents of ‘grooming’ behaviour o the sending of obscene materials to a child o adult material which potentially breaches the Obscene Publications Act o criminally racist material o promotion of terrorism or extremism o offences under the Computer Misuse Act (see User Actions chart above) o other criminal conduct, activity or materials Isolate the computer in question as best you can. Any change to its state may hinder a later police investigation. It is important that all of the above steps are taken as they will provide an evidence trail for the school / academy and possibly the police and demonstrate that visits to these sites were carried out for safeguarding child protection purposes. The completed form should be retained by the group for evidence and reference purposes. School actions & sanctions It is more likely that the school will need to deal with incidents that involve inappropriate rather than illegal misuse. It is important that any incidents are dealt with as soon as possible in a proportionate manner, and that members of the school community are aware that incidents have been dealt with. It is intended that incidents of misuse will be dealt with through normal behaviour/disciplinary procedures as follows: Actions/Sanctions Students/Pupils Incidents Refer to class teacher Refer to DSL Team Refer to Headteacher Refer to Police Refer to technical support staff for action re filtering/security etc. Inform parents/carers Removal of network/internet access rights Warning Further sanction – Behaviour Policy Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable/inappropriate activities). X X X Unauthorised use of non-educational sites during lessons X X Unauthorised/inappropriate use of mobile phone/digital camera/other mobile device X X X Unauthorised/inappropriate use of social media/ messaging apps/personal email X X X X X Unauthorised downloading or uploading of files X X X X X X Allowing others to access school network by sharing username and passwords X X X X X Attempting to access or accessing the school network, using another student’s/pupil’s account X X X X X Attempting to access or accessing the school network, using the account of a member of staff X X X X X Corrupting or destroying the data of other users X X X X X Sending an email, text or message that is regarded as offensive, harassment or of a bullying nature X X X X Continued infringements of the above, following previous warnings or sanctions X X X X Actions which could bring the school into disrepute or breach the integrity of the ethos of the school X X X X X Using proxy sites or other means to subvert the school’s filtering system X X X X Accidentally accessing offensive or pornographic material and failing to report the incident X X X X Deliberately accessing or trying to access offensive or pornographic material X X X X Receipt or transmission of material that infringes the copyright of another person or infringes the Data Protection Act X X X Actions/Sanctions Staff Incidents Refer to line manager Refer to Headteacher Refer to Local Authority/HR Refer to Police Refer to Technical Support Staff for action re filtering etc. Warning Suspension Disciplinary action Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable/inappropriate activities). X X X Inappropriate personal use of the internet/social media/personal email X X Unauthorised downloading or uploading of files X X X Allowing others to access school network by sharing username and passwords or attempting to access or accessing the school network, using another person’s account X X Careless use of personal data e.g. holding or transferring data in an insecure manner X X X Deliberate actions to breach data protection or network security rules X X X X X X Corrupting or destroying the data of other users or causing deliberate damage to hardware or software X X X X X X Sending an email, text or message that is regarded as offensive, harassment or of a bullying nature X X X X X Using personal email/social networking/instant messaging/text messaging to carrying out digital communications with pupils X X X X Actions which could compromise the staff member’s professional standing X X X X Actions which could bring the school into disrepute or breach the integrity of the ethos of the school X X Using proxy sites or other means to subvert the school’s filtering system X X X X X Accidentally accessing offensive or pornographic material and failing to report the incident X X X X Deliberately accessing or trying to access offensive or pornographic material X X X X X Continued infringements of the above, following previous warnings or sanctions X X Appendices Pupil Acceptable Use Agreement – kS2 21 Pupil Acceptable Use Policy Agreement – (Foundation/KS1) 24 Parent/Carer Acceptable Use Agreement 24 Staff (and Volunteer) Acceptable Use Policy Agreement 25 Acceptable Use Agreement for Community Users 28 Responding to incidents of misuse – flow chart 29 Record of reviewing devices/internet sites (responding to incidents of misuse) 30 Reporting Log 31 Training Needs Audit Log 32 School Technical Security Policy (including filtering and passwords) 33 School Personal Data Advice and Guidance 38 School policy template: Electronic Devices - Searching & Deletion 48 Mobile Technologies Policy (inc. BYOD/BYOT) 52 Social Media Policy 55 School Policy – Online Safety Group Terms of Reference 59 Legislation 61 Glossary of Terms 68.

Appears in 1 contract

Samples: files.schudio.com

Illegal Incidents. If there is any suspicion that the web site(s) concerned may contain child abuse images, or if there is any other suspected illegal activity, refer to the right hand side of the Flowchart (below and appendix) for responding to online safety incidents and report immediately to the police. Other Incidents It is hoped that all members of the school community will be responsible users of digital technologies, who understand and follow school policy. However, there may be times when infringements of the policy could take place, through careless or irresponsible or, very rarely, through deliberate misuse. In the event of suspicion, all steps in this procedure should be followed: • Have more than one senior member of staff involved in this process. This is vital to protect individuals if accusations are subsequently reported. • Conduct the procedure using a designated computer that will not be used by young people and if necessary can be taken off site by the police should the need arise. Use the same computer for the duration of the procedure. • It is important to ensure that the relevant staff should have appropriate internet access to conduct the procedure, but also that the sites and content visited are closely monitored and recorded (to provide further protection). • Record the URL of any site containing the alleged misuse and describe the nature of the content causing concern. It may also be necessary to record and store screenshots of the content on the machine being used for investigation. These may be printed, signed and attached to the form (except in the case of images of child sexual abuse – see below) • Once this has been completed and fully investigated the group will need to judge whether this concern has substance or not. If it does, then appropriate action will be required and could include the following: o Internal response or discipline procedures o Involvement by Local Authority or national/local organisation (as relevant). o Police involvement and/or action • If content being reviewed includes images of child abuse, then the monitoring should be halted and referred to the Police immediately. Other instances to report to the police would include: o incidents of ‘grooming’ behaviour o the sending of obscene materials to a child o adult material which potentially breaches the Obscene Publications Act o criminally racist material o promotion of terrorism or extremism o offences under the Computer Misuse Act (see User Actions chart above) o other criminal conduct, activity or materials • Isolate the computer in question as best you can. Any change to its state may hinder a later police investigation. It is important that all of the above steps are taken as they will provide an evidence trail for the school and possibly the police and demonstrate that visits to these sites were carried out for safeguarding purposes. The completed form should be retained by the group for evidence and reference purposes. School actions & sanctions It is more likely that the school will need to deal with incidents that involve inappropriate rather than illegal misuse. It is important that any incidents are dealt with as soon as possible in a proportionate manner, and that members of the school community are aware that incidents have been dealt with. It is intended that incidents of misuse will be dealt with through normal behaviour/disciplinary procedures as follows: Actions/Sanctions Students/Pupils Incidents Refer to class teacher teacher/tutor Refer to DSL Team Safeguarding Lead / Online Safety Lead Refer to Headteacher Refer to Police Refer to technical support staff for action re filtering/security etc. Inform parents/carers Removal of network/internet access rights Warning Further sanction – Behaviour Policy e.g. detention/exclusion Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable/inappropriate activities). X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ Unauthorised use of non-educational sites during lessons X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ Unauthorised/inappropriate use of mobile phone/digital camera/other mobile device X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ Unauthorised/inappropriate use of social media/ messaging apps/personal email X X X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ Unauthorised downloading or uploading of files X X X X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ Allowing others to access school network by sharing username and passwords X X X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ Attempting to access or accessing the school network, using another student’s/pupil’s account X X X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ Attempting to access or accessing the school network, using the account of a member of staff X X X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ Corrupting or destroying the data of other users X X X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ Sending an email, text or message that is regarded as offensive, harassment or of a bullying nature X X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ Continued infringements of the above, following previous warnings or sanctions X X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ Actions which could bring the school into disrepute or breach the integrity of the ethos of the school X X X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ Using proxy sites or other means to subvert the school’s filtering system X X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ Accidentally accessing offensive or pornographic material and failing to report the incident X X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ Deliberately accessing or trying to access offensive or pornographic material X X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ Receipt or transmission of material that infringes the copyright of another person or infringes the Data Protection Act X X X ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ Actions/Sanctions Staff Incidents Refer to line manager Refer to Headteacher Refer to Local Authority/HR Refer to Police Refer to Technical Support Staff for action re filtering etc. Warning Suspension Disciplinary action Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable/inappropriate activities). X X X ✓ ✓ ✓ ✓ ✓ ✓ Inappropriate personal use of the internet/social media/personal email X X ✓ ✓ ✓ ✓ ✓ Unauthorised downloading or uploading of files X X X ✓ ✓ ✓ ✓ ✓ Allowing others to access school network by sharing username and passwords or attempting to access or accessing the school network, using another person’s account X X ✓ ✓ ✓ ✓ ✓ Careless use of personal data e.g. holding or transferring data in an insecure manner X X X ✓ ✓ ✓ ✓ ✓ Deliberate actions to breach data protection or network security rules X X X X X X ✓ ✓ ✓ ✓ ✓ Corrupting or destroying the data of other users or causing deliberate damage to hardware or software X X X X X X ✓ ✓ ✓ ✓ ✓ Sending an email, text or message that is regarded as offensive, harassment or of a bullying nature X X X X X ✓ ✓ ✓ ✓ ✓ Using personal email/social networking/instant messaging/text messaging to carrying out digital communications with students/pupils X X X X ✓ ✓ ✓ ✓ ✓ Actions which could compromise the staff member’s professional standing X X X X ✓ ✓ ✓ ✓ Actions which could bring the school into disrepute or breach the integrity of the ethos of the school X X ✓ ✓ ✓ ✓ Using proxy sites or other means to subvert the school’s filtering system X X X X X ✓ ✓ ✓ ✓ ✓ Accidentally accessing offensive or pornographic material and failing to report the incident X X X X ✓ ✓ ✓ ✓ ✓ ✓ Deliberately accessing or trying to access offensive or pornographic material X X X X X ✓ ✓ ✓ ✓ ✓ ✓ Breaching copyright or licensing regulations ✓ ✓ ✓ ✓ ✓ ✓ Continued infringements of the above, following previous warnings or sanctions X X Appendices Pupil Acceptable ✓ ✓ ✓ ✓ ✓ Additional policies to refer to: • Computing & IT Policy • Behaviour • Safeguarding • Code of conduct • Remote Learning Policy • Staff Use Agreement – kS2 21 Pupil Acceptable Use Policy Agreement – (Foundation/KS1) 24 Parent/Carer Acceptable Use Agreement 24 Staff (and Volunteer) Acceptable Use Policy Agreement 25 Acceptable Use Agreement for Community Users 28 Responding to incidents of misuse – flow chart 29 Record of reviewing devices/internet sites (responding to incidents of misuse) 30 Reporting Log 31 Training Needs Audit Log 32 School Technical Security Policy (including filtering and passwords) 33 School Personal Data Advice and Guidance 38 School policy template: Electronic Devices - Searching & Deletion 48 Mobile Technologies Policy (inc. BYOD/BYOT) 52 Social Media Policy 55 School Policy – Online Safety Group Terms of Reference 59 Legislation 61 Glossary of Terms 68ICT • RHE Policy

Appears in 1 contract

Samples: docs-cdn.schooljotter3.com

Illegal Incidents. If there is any suspicion that the web site(s) concerned may contain child abuse images, or if there is any other suspected illegal activity, refer to the right hand side of the Flowchart (below and appendix) for responding to online safety incidents and report immediately to the police. Other Incidents It is hoped that all members of the school community will be responsible users of digital technologies, who understand and follow school / academy policy. However, there may be times when infringements of the policy could take place, through careless or irresponsible or, very rarely, through deliberate misuse. In the event of suspicion, all steps in this procedure should be followed: • Have more than one senior member of staff / volunteer involved in this process. This is vital to protect individuals if accusations are subsequently reported. • Conduct the procedure using a designated computer that will not be used by young people and if necessary can be taken off site by the police should the need arise. Use the same computer for the duration of the procedure. • It is important to ensure that the relevant staff should have appropriate internet access to conduct the procedure, but also that the sites and content visited are closely monitored and recorded (to provide further protection). • Record the URL url of any site containing the alleged misuse and describe the nature of the content causing concern. It may also be necessary to record and store screenshots of the content on the machine being used for investigation. These may be printed, signed and attached to the form (except in the case of images of child sexual abuse – see below) • Once this has been completed and fully investigated the group will need to judge whether this concern has substance or not. If it does, does then appropriate action will be required and could include the following: o Internal response or discipline procedures o Involvement by Local Authority or national/national / local organisation (as relevant). o Police involvement and/or action • If content being reviewed includes images of child abuse, Child abuse then the monitoring should be halted and referred to the Police immediately. Other instances to report to the police would include: o incidents of ‘grooming’ behaviour o the sending of obscene materials to a child o adult material which potentially breaches the Obscene Publications Act o criminally racist material o promotion of terrorism or extremism o offences under the Computer Misuse Act (see User Actions chart above) o other criminal conduct, activity or materials • Isolate the computer in question as best you can. Any change to its state may hinder a later police investigation. It is important that all of the above steps are taken as they will provide an evidence trail for the school / academy and possibly the police and demonstrate that visits to these sites were carried out for safeguarding child protection purposes. The completed form should be retained by the group for evidence and reference purposes. School actions & sanctions It is more likely that the school will need to deal with incidents that involve inappropriate rather than illegal misuse. It is important that any incidents are dealt with as soon as possible in a proportionate manner, and that members of the school community are aware that incidents have been dealt with. It is intended that incidents of misuse will be dealt with through normal behaviour/disciplinary procedures as follows: Actions/Sanctions Students/Pupils Incidents Refer to class teacher Refer to DSL Team Refer to Headteacher Refer to Police Refer to technical support staff for action re filtering/security etc. Inform parents/carers Removal of network/internet access rights Warning Further sanction – Behaviour Policy Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable/inappropriate activities). X X X Unauthorised use of non-educational sites during lessons X X Unauthorised/inappropriate use of mobile phone/digital camera/other mobile device X X X Unauthorised/inappropriate use of social media/ messaging apps/personal email X X X X X Unauthorised downloading or uploading of files X X X X X X Allowing others to access school network by sharing username and passwords X X X X X Attempting to access or accessing the school network, using another student’s/pupil’s account X X X X X Attempting to access or accessing the school network, using the account of a member of staff X X X X X Corrupting or destroying the data of other users X X X X X Sending an email, text or message that is regarded as offensive, harassment or of a bullying nature X X X X Continued infringements of the above, following previous warnings or sanctions X X X X Actions which could bring the school into disrepute or breach the integrity of the ethos of the school X X X X X Using proxy sites or other means to subvert the school’s filtering system X X X X Accidentally accessing offensive or pornographic material and failing to report the incident X X X X Deliberately accessing or trying to access offensive or pornographic material X X X X Receipt or transmission of material that infringes the copyright of another person or infringes the Data Protection Act X X X Actions/Sanctions Staff Incidents Refer to line manager Refer to Headteacher Refer to Local Authority/HR Refer to Police Refer to Technical Support Staff for action re filtering etc. Warning Suspension Disciplinary action Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable/inappropriate activities). X X X Inappropriate personal use of the internet/social media/personal email X X Unauthorised downloading or uploading of files X X X Allowing others to access school network by sharing username and passwords or attempting to access or accessing the school network, using another person’s account X X Careless use of personal data e.g. holding or transferring data in an insecure manner X X X Deliberate actions to breach data protection or network security rules X X X X X X Corrupting or destroying the data of other users or causing deliberate damage to hardware or software X X X X X X Sending an email, text or message that is regarded as offensive, harassment or of a bullying nature X X X X X Using personal email/social networking/instant messaging/text messaging to carrying out digital communications with pupils X X X X Actions which could compromise the staff member’s professional standing X X X X Actions which could bring the school into disrepute or breach the integrity of the ethos of the school X X Using proxy sites or other means to subvert the school’s filtering system X X X X X Accidentally accessing offensive or pornographic material and failing to report the incident X X X X Deliberately accessing or trying to access offensive or pornographic material X X X X X Continued infringements of the above, following previous warnings or sanctions X X Appendices Pupil Acceptable Use Agreement – kS2 21 Pupil Acceptable Use Policy Agreement – (Foundation/KS1) 24 Parent/Carer Acceptable Use Agreement 24 Staff (and Volunteer) Acceptable Use Policy Agreement 25 Acceptable Use Agreement for Community Users 28 Responding to incidents of misuse – flow chart 29 Record of reviewing devices/internet sites (responding to incidents of misuse) 30 Reporting Log 31 Training Needs Audit Log 32 School Technical Security Policy (including filtering and passwords) 33 School Personal Data Advice and Guidance 38 School policy template: Electronic Devices - Searching & Deletion 48 Mobile Technologies Policy (inc. BYOD/BYOT) 52 Social Media Policy 55 School Policy – Online Safety Group Terms of Reference 59 Legislation 61 Glossary of Terms 68.

Appears in 1 contract

Samples: files.schudio.com

AutoNDA by SimpleDocs

Illegal Incidents. If there is any suspicion that the web site(s) concerned may contain child abuse images, or if there is any other suspected illegal activity, refer to the right hand side of the Flowchart (below and appendix) for responding to online safety incidents and report immediately to the police. Other Incidents It is hoped that all members of the school community will be responsible users of digital technologies, who understand and follow school policy. However, there may be times when infringements of the policy could take place, through careless or irresponsible or, very rarely, through deliberate misuse. In the event of suspicion, all steps in this procedure should be followed: • Have more than one senior member of staff involved in this process. This is vital to protect individuals if accusations are subsequently reported. • Conduct the procedure using a designated computer that will not be used by young people and if necessary can be taken off site by the police should the need arise. Use the same computer for the duration of the procedure. • It is important to ensure that the relevant staff should have appropriate internet access to conduct the procedure, but also that the sites and content visited are closely monitored and recorded (to provide further protection). • Record the URL of any site containing the alleged misuse and describe the nature of the content causing concern. It may also be necessary to record and store screenshots of the content on the machine being used for investigation. These may be printed, signed and attached to the form (except in the case of images of child sexual abuse – see below) • Once this has been completed and fully investigated the group will need to judge whether this concern has substance or not. If it does, then appropriate action will be required and could include the following: o Internal response or discipline procedures o Involvement by WPAT and Warrington Local Authority or national/local organisation (as relevant). o Police involvement and/or action • If content being reviewed includes images of child abuse, then the monitoring should be halted and referred to the Police immediately. Other instances to report to the police would include: o incidents of ‘grooming’ behaviour o the sending of obscene materials to a child o adult material which potentially breaches the Obscene Publications Act o criminally racist material o promotion of terrorism or extremism o offences under the Computer Misuse Act (see User Actions chart above) o other criminal conduct, activity or materials • Isolate the computer in question as best you can. Any change to its state may hinder a later police investigation. It is important that all of the above steps are taken as they will provide an evidence trail for the school school/academy and possibly the police and demonstrate that visits to these sites were carried out for safeguarding purposes. The completed form should be retained by the group for evidence and reference purposes. Appendix Appendices Penketh Primary School 0 Online Safety Policy 0 Contents 1 Introduction 2 Development/Monitoring/Review of this Policy 4 Roles and Responsibilities 5 Policy Statements 8 Communications 14 Dealing with unsuitable/inappropriate activities 16 Responding to incidents of misuse 18 Illegal Incidents 18 Other Incidents 20 School actions & sanctions It is more likely that the school will need to deal with incidents that involve inappropriate rather than illegal misuseError! Bookmark not defined. It is important that any incidents are dealt with as soon as possible in a proportionate manner, and that members of the school community are aware that incidents have been dealt with. It is intended that incidents of misuse will be dealt with through normal behaviour/disciplinary procedures as follows: Actions/Sanctions Students/Pupils Incidents Refer to class teacher Refer to DSL Team Refer to Headteacher Refer to Police Refer to technical support staff for action re filtering/security etc. Inform parents/carers Removal of network/internet access rights Warning Further sanction – Behaviour Policy Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable/inappropriate activities). X X X Unauthorised use of non-educational sites during lessons X X Unauthorised/inappropriate use of mobile phone/digital camera/other mobile device X X X Unauthorised/inappropriate use of social media/ messaging apps/personal email X X X X X Unauthorised downloading or uploading of files X X X X X X Allowing others to access school network by sharing username and passwords X X X X X Attempting to access or accessing the school network, using another student’s/pupil’s account X X X X X Attempting to access or accessing the school network, using the account of a member of staff X X X X X Corrupting or destroying the data of other users X X X X X Sending an email, text or message that is regarded as offensive, harassment or of a bullying nature X X X X Continued infringements of the above, following previous warnings or sanctions X X X X Actions which could bring the school into disrepute or breach the integrity of the ethos of the school X X X X X Using proxy sites or other means to subvert the school’s filtering system X X X X Accidentally accessing offensive or pornographic material and failing to report the incident X X X X Deliberately accessing or trying to access offensive or pornographic material X X X X Receipt or transmission of material that infringes the copyright of another person or infringes the Data Protection Act X X X Actions/Sanctions Staff Incidents Refer to line manager Refer to Headteacher Refer to Local Authority/HR Refer to Police Refer to Technical Support Staff for action re filtering etc. Warning Suspension Disciplinary action Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable/inappropriate activities). X X X Inappropriate personal use of the internet/social media/personal email X X Unauthorised downloading or uploading of files X X X Allowing others to access school network by sharing username and passwords or attempting to access or accessing the school network, using another person’s account X X Careless use of personal data e.g. holding or transferring data in an insecure manner X X X Deliberate actions to breach data protection or network security rules X X X X X X Corrupting or destroying the data of other users or causing deliberate damage to hardware or software X X X X X X Sending an email, text or message that is regarded as offensive, harassment or of a bullying nature X X X X X Using personal email/social networking/instant messaging/text messaging to carrying out digital communications with pupils X X X X Actions which could compromise the staff member’s professional standing X X X X Actions which could bring the school into disrepute or breach the integrity of the ethos of the school X X Using proxy sites or other means to subvert the school’s filtering system X X X X X Accidentally accessing offensive or pornographic material and failing to report the incident X X X X Deliberately accessing or trying to access offensive or pornographic material X X X X X Continued infringements of the above, following previous warnings or sanctions X X Appendices Appendix 21 Pupil Acceptable Use Agreement – kS2 21 for older students/pupils 22 Pupil Acceptable Use Policy Agreement – for younger pupils (Foundation/KS1) 24 25 Parent/Carer Acceptable Use Agreement 24 26 Staff (and Volunteer) Acceptable Use Policy Agreement 25 Template 29 Acceptable Use Agreement for Community Users 28 Error! Bookmark not defined. Responding to incidents of misuse – flow chart 29 32 Record of reviewing devices/internet sites (responding to incidents of misuse) 30 33 Reporting Log 31 34 Training Needs Audit Log 32 35 School Technical Security Policy (including filtering and passwords) 33 School Error! Bookmark not defined. School/academy Personal Data Advice and Guidance 38 School 36 School/academy policy template: Electronic Devices - Searching & Deletion 48 Error! Bookmark not defined. Mobile Technologies Policy Template (inc. BYOD/BYOT) 52 Error! Bookmark not defined. Social Media Policy 55 Template Error! Bookmark not defined. School Policy – Online Safety Group Terms of Reference 59 46 Legislation 61 47 Glossary of Terms 6851 Pupil Acceptable Use Agreement – for older students/pupils School policy Digital technologies have become integral to the lives of children and young people, both within schools and outside school. These technologies are powerful tools, which open up new opportunities for everyone. These technologies can stimulate discussion, promote creativity and stimulate awareness of context to promote effective learning. Young people should have an entitlement to safe access to these digital technologies. This acceptable use agreement is intended to ensure: • that young people will be responsible users and stay safe while using the internet and other digital technologies for educational, personal and recreational use. • that school systems and users are protected from accidental or deliberate misuse that could put the security of the systems and will have good access to digital technologies to enhance their learning and will, in return, expect the pupils to agree to be responsible users.

Appears in 1 contract

Samples: www.penkethprimary.co.uk

Illegal Incidents. If there is any suspicion that the web site(s) concerned may contain child abuse images, or if there is any other suspected illegal activity, refer to the right hand side of the Flowchart (below and appendix) for responding to online safety incidents and report immediately to the police. Other Incidents It is hoped that all members of the school community will be responsible users of digital technologies, who understand and follow school / academy policy. However, there may be times when infringements of the policy could take place, through careless or irresponsible or, very rarely, through deliberate misuse. In the event of suspicion, all steps in this procedure should be followed: Have more than one senior member of staff / volunteer involved in this process. This is vital to protect individuals if accusations are subsequently reported. Conduct the procedure using a designated computer that will not be used by young people and if necessary can be taken off site by the police should the need arise. Use the same computer for the duration of the procedure. It is important to ensure that the relevant staff should have appropriate internet access to conduct the procedure, but also that the sites and content visited are closely monitored and recorded (to provide further protection). Record the URL url of any site containing the alleged misuse and describe the nature of the content causing concern. It may also be necessary to record and store screenshots of the content on the machine being used for investigation. These may be printed, signed and attached to the form (except in the case of images of child sexual abuse – see below) Once this has been completed and fully investigated the group will need to judge whether this concern has substance or not. If it does, does then appropriate action will be required and could include the following: o Internal response or discipline procedures o Involvement by Local Authority or national/national / local organisation (as relevant). o Police involvement and/or action If content being reviewed includes images of child abuse, Child abuse then the monitoring should be halted and referred to the Police immediately. Other instances to report to the police would include: o incidents of ‘grooming’ behaviour o the sending of obscene materials to a child o adult material which potentially breaches the Obscene Publications Act o criminally racist material o promotion of terrorism or extremism o offences under the Computer Misuse Act (see User Actions chart above) o other criminal conduct, activity or materials Isolate the computer in question as best you can. Any change to its state may hinder a later police investigation. It is important that all of the above steps are taken as they will provide an evidence trail for the school / academy and possibly the police and demonstrate that visits to these sites were carried out for safeguarding child protection purposes. The completed form should be retained by the group for evidence and reference purposes. School actions & sanctions It is more likely that the school will need to deal with incidents that involve inappropriate rather than illegal misuse. It is important that any incidents are dealt with as soon as possible in a proportionate manner, and that members of the school community are aware that incidents have been dealt with. It is intended that incidents of misuse will be dealt with through normal behaviour/disciplinary procedures as follows: Actions/Sanctions Students/Pupils Incidents Refer to class teacher Refer to DSL Team Refer to Headteacher Refer to Police Refer to technical support staff for action re filtering/security etc. Inform parents/carers Removal of network/internet access rights Warning Further sanction – Behaviour Policy Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable/inappropriate activities). X X X Unauthorised use of non-educational sites during lessons X X Unauthorised/inappropriate use of mobile phone/digital camera/other mobile device X X X Unauthorised/inappropriate use of social media/ messaging apps/personal email X X X X X Unauthorised downloading or uploading of files X X X X X X Allowing others to access school network by sharing username and passwords X X X X X Attempting to access or accessing the school network, using another student’s/pupil’s account X X X X X Attempting to access or accessing the school network, using the account of a member of staff X X X X X Corrupting or destroying the data of other users X X X X X Sending an email, text or message that is regarded as offensive, harassment or of a bullying nature X X X X Continued infringements of the above, following previous warnings or sanctions X X X X Actions which could bring the school into disrepute or breach the integrity of the ethos of the school X X X X X Using proxy sites or other means to subvert the school’s filtering system X X X X Accidentally accessing offensive or pornographic material and failing to report the incident X X X X Deliberately accessing or trying to access offensive or pornographic material X X X X Receipt or transmission of material that infringes the copyright of another person or infringes the Data Protection Act X X X Actions/Sanctions Staff Incidents Refer to line manager Refer to Headteacher Refer to Local Authority/HR Refer to Police Refer to Technical Support Staff for action re filtering etc. Warning Suspension Disciplinary action Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable/inappropriate activities). X X X Inappropriate personal use of the internet/social media/personal email X X Unauthorised downloading or uploading of files X X X Allowing others to access school network by sharing username and passwords or attempting to access or accessing the school network, using another person’s account X X Careless use of personal data e.g. holding or transferring data in an insecure manner X X X Deliberate actions to breach data protection or network security rules X X X X X X Corrupting or destroying the data of other users or causing deliberate damage to hardware or software X X X X X X Sending an email, text or message that is regarded as offensive, harassment or of a bullying nature X X X X X Using personal email/social networking/instant messaging/text messaging to carrying out digital communications with pupils X X X X Actions which could compromise the staff member’s professional standing X X X X Actions which could bring the school into disrepute or breach the integrity of the ethos of the school X X Using proxy sites or other means to subvert the school’s filtering system X X X X X Accidentally accessing offensive or pornographic material and failing to report the incident X X X X Deliberately accessing or trying to access offensive or pornographic material X X X X X Continued infringements of the above, following previous warnings or sanctions X X Appendices Pupil Acceptable Use Agreement – kS2 21 Pupil Acceptable Use Policy Agreement – (Foundation/KS1) 24 Parent/Carer Acceptable Use Agreement 24 Staff (and Volunteer) Acceptable Use Policy Agreement 25 Acceptable Use Agreement for Community Users 28 Responding to incidents of misuse – flow chart 29 Record of reviewing devices/internet sites (responding to incidents of misuse) 30 Reporting Log 31 Training Needs Audit Log 32 School Technical Security Policy (including filtering and passwords) 33 School Personal Data Advice and Guidance 38 School policy template: Electronic Devices - Searching & Deletion 48 Mobile Technologies Policy (inc. BYOD/BYOT) 52 Social Media Policy 55 School Policy – Online Safety Group Terms of Reference 59 Legislation 61 Glossary of Terms 68.

Appears in 1 contract

Samples: stmarysnewchurch.co.uk

Time is Money Join Law Insider Premium to draft better contracts faster.