Common use of Policy Statements Clause in Contracts

Policy Statements. Education – Pupils and Sixth-Formers ICT acceptable use, E-Safety and GDPR (all referred to as E-Safety) should be a focus in all areas of the curriculum and staff should reinforce E-Safety messages across the curriculum. • A planned E-Safety curriculum should be provided as part of Computing / PSHRE / other lessons and should be regularly revisited. • Key E-Safety messages should be reinforced as part of a planned programme of assemblies and tutorial / pastoral activities. • Pupils should be taught to be critically aware of the materials / content they access on-line and be guided to validate the accuracy of information including ‘Prevent’ awareness. • Pupils should be helped to understand the need for the pupil Acceptable Use Agreement (PAUP) and encouraged to adopt safe and responsible use both within and outside school. • Where pupils are allowed to freely search the internet, staff should be vigilant in monitoring the content of the websites the young people visit. • It is accepted that from time to time, for good educational reasons, students may need to research topics (e.g. racism, drugs, discrimination) that would normally result in internet searches being blocked. Internet filters can be relaxed by the ICT support team on request. Education & Training – Staff / Volunteers It is essential that all staff receive E-Safety training and understand their responsibilities, as outlined in this policy. Training will be offered as follows: • A planned programme of formal E-Safety training will be made available to staff. This will be regularly updated and reinforced, with online training offered. • All new staff will receive E-Safety training as part of their induction programme. • The E-Safety Coordinator will receive regular updates through attendance at external training events, e.g., CEOP. • This E-Safety policy and its updates will be presented to and discussed by staff including regular ‘Prevent’ training drawing on partners and external agencies for support, information and intelligence. Training – Governors Governors should take part in E-Safety training / awareness sessions, with particular importance for those who are members of any sub-committee / group involved in technology / E-Safety / health and safety / child protection. Technical – infrastructure / equipment, filtering and monitoring The school will be responsible for ensuring that the school infrastructure / network is as safe and secure as is reasonably possible and that policies and procedures approved within this policy are implemented. • School technical systems will be managed in ways that ensure that the school meets recommended technical requirements. • All users (at KS3 and above) will be provided with a username and secure password by the department who will keep an up to date record of users and their usernames. Users are responsible for the security of their username and password. • The Network Manager is responsible for ensuring that software licence logs are accurate and up to date and that regular checks are made to reconcile the number of licences purchased against the number of software installations. • Internet access is filtered for all users. Illegal content (such as child sexual abuse images or incitement of extremist views) is filtered by the broadband or filtering provider. • All users are able to report any actual / potential technical incident / security breach to the DPO. • All users must not download or install software without first consulting and obtaining permission from the Network Manager. • The provision of temporary access is conducted via induction. • Appropriate security measures are in place to protect the servers, firewalls, routers, wireless systems, work stations, mobile devices etc., from accidental or malicious attempts which might threaten the security of the school systems and data. • Personal data cannot be sent over the internet or taken off the school site unless safely encrypted or otherwise secured. Memory sticks should not contain sensitive data and should be encrypted. Staff should seek assistance from the ICT support team regarding encrypted memory sticks. • The Network Manager will monitor any printer discrepancies with regard to security.

Appears in 2 contracts

Samples: Acceptable Use Agreement, Acceptable Use Agreement

AutoNDA by SimpleDocs

Policy Statements. Education – Pupils and Sixth-Formers ICT acceptable use, E-Safety safety and GDPR (all referred to as E-Safetysafety) should be a focus in all areas of the curriculum and staff should reinforce Ee-Safety safety messages across the curriculum. • A planned E-Safety curriculum should be provided as part of Computing / PSHRE PHSE / other lessons and should be regularly revisited. • Key E-Safety messages should be reinforced as part of a planned programme of assemblies and tutorial / pastoral activities. • Pupils should be taught to be critically aware of the materials / content they access on-line and be guided to validate the accuracy of information including ‘Prevent’ awareness. • Pupils should be helped to understand the need for the pupil Acceptable Use Agreement (PAUP) and encouraged to adopt safe and responsible use both within and outside school. • Where pupils are allowed to freely search the internet, staff should be vigilant in monitoring the content of the websites the young people visit. • It is accepted that from time to time, for good educational reasons, students may need to research topics (e.g. racism, drugs, discrimination) that would normally result in internet searches being blocked. Internet filters can be relaxed by the ICT support team on request. Education & Training – Staff / Volunteers It is essential that all staff receive Ee-Safety safety training and understand their responsibilities, as outlined in this policy. Training will be offered as follows: • A planned programme of formal Ee-Safety safety training will be made available to staff. This will be regularly updated and reinforced, with online training offered. • All new staff will receive Ee-Safety safety training as part of their induction programme. • The E-Safety Coordinator will receive regular updates through attendance at external training events, e.g., CEOP. • This E-Safety policy and its updates will be presented to and discussed by staff including regular ‘Prevent’ training drawing on partners and external agencies for support, information and intelligence. Training – Governors Governors should take part in E-Safety training / awareness sessions, with particular importance for those who are members of any sub-committee / group involved in technology / E-Safety / health and safety / child protection. Technical – infrastructure / equipment, filtering and monitoring The school will be responsible for ensuring that the school infrastructure / network is as safe and secure as is reasonably possible and that policies and procedures approved within this policy are implemented. • School technical systems will be managed in ways that ensure that the school meets recommended technical requirements. • All users (at KS3 and above) will be provided with a username and secure password by the department ICT Department who will keep an up to date record of users and their usernames. Users are responsible for the security of their username and password. • The Network Manager is responsible for ensuring that software licence logs are accurate and up to date and that regular checks are made to reconcile the number of licences purchased against the number of software installations. • Internet access is filtered for all users. Illegal content (such as child sexual abuse images or incitement of extremist views) is filtered by the broadband or filtering provider. • All users are able to report any actual / potential technical incident / security breach to the DPO. • All users must not download or install software without first consulting and obtaining permission from the Network Manager. • The provision of temporary access is conducted via induction. • Appropriate security measures are in place to protect the servers, firewalls, routers, wireless systems, work stations, mobile devices etc., from accidental or malicious attempts which might threaten the security of the school systems and data. • Personal data cannot be sent over the internet or taken off the school site unless safely encrypted or otherwise secured. Memory sticks should not contain sensitive data and should be encrypted. Staff should seek assistance from the ICT support team regarding Free encrypted memory sticks. • The Network Manager will monitor any printer discrepancies with regard sticks are provided to securityall staff that require them.

Appears in 1 contract

Samples: Acceptable Use Agreement

Policy Statements. Education – Pupils and Sixth-Formers ICT acceptable use, E-Safety safety and GDPR (all referred to as E-Safetysafety) should be a focus in all areas of the curriculum and staff should reinforce Ee-Safety safety messages across the curriculum. • A planned E-Safety curriculum should be provided as part of Computing / PSHRE PHSE / other lessons and should be regularly revisited. • Key E-Safety messages should be reinforced as part of a planned programme of assemblies and tutorial / pastoral activities. • Pupils should be taught to be critically aware of the materials / content they access on-line and be guided to validate the accuracy of information including ‘Prevent’ awareness. • Pupils should be helped to understand the need for the pupil Acceptable Use Agreement (PAUP) and encouraged to adopt safe and responsible use both within and outside school. • Where pupils are allowed to freely search the internet, staff should be vigilant in monitoring the content of the websites the young people visit. • It is accepted that from time to time, for good educational reasons, students may need to research topics (e.g. racism, drugs, discrimination) that would normally result in internet searches being blocked. Internet filters can be relaxed by the ICT support team on request. Education & Training – Staff / Volunteers It is essential that all staff receive E-Safety safety training and understand their responsibilities, as outlined in this policy. Training will be offered as follows: • A planned programme of formal E-Safety safety training will be made available to staff. This will be regularly updated and reinforced, with online training offered. • All new staff will receive E-Safety safety training as part of their induction programme. • The E-Safety Coordinator will receive regular updates through attendance at external training events, e.g., CEOP. • This E-Safety policy and its updates will be presented to and discussed by staff including regular ‘Prevent’ training drawing on partners and external agencies for support, information and intelligence. Training – Governors Governors should take part in E-Safety training / awareness sessions, with particular importance for those who are members of any sub-committee / group involved in technology / E-Safety / health and safety / child protection. Technical – infrastructure / equipment, filtering and monitoring The school will be responsible for ensuring that the school infrastructure / network is as safe and secure as is reasonably possible and that policies and procedures approved within this policy are implemented. • School technical systems will be managed in ways that ensure that the school meets recommended technical requirements. • All users (at KS3 and above) will be provided with a username and secure password by the department Department who will keep an up to date record of users and their usernames. Users are responsible for the security of their username and password. • The Network Manager is responsible for ensuring that software licence logs are accurate and up to date and that regular checks are made to reconcile the number of licences purchased against the number of software installations. • Internet access is filtered for all users. Illegal content (such as child sexual abuse images or incitement of extremist views) is filtered by the broadband or filtering provider. • All users are able to report any actual / potential technical incident / security breach to the DPO. • All users must not download or install software without first consulting and obtaining permission from the Network Manager. • The provision of temporary access is conducted via induction. • Appropriate security measures are in place to protect the servers, firewalls, routers, wireless systems, work stations, mobile devices etc., from accidental or malicious attempts which might threaten the security of the school systems and data. • Personal data cannot be sent over the internet or taken off the school site unless safely encrypted or otherwise secured. Memory sticks should not contain sensitive data and should be encrypted. Staff should seek assistance from the ICT support team regarding encrypted memory sticks. • The Network Manager will monitor any printer discrepancies with regard to security.

Appears in 1 contract

Samples: Acceptable Use Agreement

Policy Statements. Education – Pupils and Sixth-Formers ICT acceptable use, E-Safety safety and GDPR (all referred to as E-Safetysafety) should be a focus in all areas of the curriculum and staff should reinforce Ee-Safety safety messages across the curriculum. • A planned E-Safety curriculum should be provided as part of Computing / PSHRE PHSE / other lessons and should be regularly revisited. • Key E-Safety messages should be reinforced as part of a planned programme of assemblies and tutorial / pastoral activities. • Pupils should be taught to be critically aware of the materials / content they access on-line and be guided to validate the accuracy of information including ‘Prevent’ awareness. • Pupils should be helped to understand the need for the pupil Acceptable Use Agreement (PAUP) and encouraged to adopt safe and responsible use both within and outside school. • Where pupils are allowed to freely search the internet, staff should be vigilant in monitoring the content of the websites the young people visit. • It is accepted that from time to time, for good educational reasons, students may need to research topics (e.g. racism, drugs, discrimination) that would normally result in internet searches being blocked. Internet filters can be relaxed by the ICT support team on request. Education & Training – Staff / Volunteers It is essential that all staff receive Ee-Safety safety training and understand their responsibilities, as outlined in this policy. Training will be offered as follows: • A planned programme of formal Ee-Safety safety training will be made available to staff. This will be regularly updated and reinforced, with online training offered. • All new staff will receive Ee-Safety safety training as part of their induction programme. • The E-Safety Coordinator will receive regular updates through attendance at external training events, e.g., CEOP. • This E-Safety policy and its updates will be presented to and discussed by staff including regular ‘Prevent’ training drawing on partners and external agencies for support, information and intelligence. Training – Governors Governors should take part in E-Safety training / awareness sessions, with particular importance for those who are members of any sub-committee / group involved in technology / E-Safety / health and safety / child protection. Technical – infrastructure / equipment, filtering and monitoring The school will be responsible for ensuring that the school infrastructure / network is as safe and secure as is reasonably possible and that policies and procedures approved within this policy are implemented. • School technical systems will be managed in ways that ensure that the school meets recommended technical requirements. • All users (at KS3 and above) will be provided with a username and secure password by the department ICT Department who will keep an up to date record of users and their usernames. Users are responsible for the security of their username and password. • The Network Manager is responsible for ensuring that software licence logs are accurate and up to date and that regular checks are made to reconcile the number of licences purchased against the number of software installations. • Internet access is filtered for all users. Illegal content (such as child sexual abuse images or incitement of extremist views) is filtered by the broadband or filtering provider. • All users are able to report any actual / potential technical incident / security breach to the DPO. • All users must not download or install software without first consulting and obtaining permission from the Network Manager. • The provision of temporary access is conducted via induction. • Appropriate security measures are in place to protect the servers, firewalls, routers, wireless systems, work stations, mobile devices etc., from accidental or malicious attempts which might threaten the security of the school systems and data. • Personal data cannot be sent over the internet or taken off the school site unless safely encrypted or otherwise secured. Memory sticks should not contain sensitive data and should be encrypted. Staff should seek assistance from the ICT support team regarding encrypted memory sticks. • The Network Manager will monitor any printer discrepancies with regard to security.

Appears in 1 contract

Samples: Acceptable Use Agreement

AutoNDA by SimpleDocs

Policy Statements. Education – Students/Pupils Whilst regulation and Sixth-Formers ICT acceptable usetechnical solutions are very important, E-Safety their use must be balanced by educating pupils to take a responsible approach. The education of pupils in online safety/digital literacy is therefore an essential part of the school’s online safety provision. Children and GDPR (all referred young people need the help and support of the school to as E-Safety) recognise and avoid online safety risks and build their resilience. Online safety should be a focus in all areas of the curriculum and staff should reinforce E-Safety online safety messages across the curriculum. The online safety curriculum should be broad, relevant and provide progression, with opportunities for creative activities and will be provided in the following ways: • A planned E-Safety online safety curriculum should be provided as part of Computing / PSHRE / Computing/PHSE/other lessons and should be regularly revisited. As a school we use EAware to support our delivery • Key E-Safety online safety messages should be reinforced as part of a planned programme of assemblies and tutorial / pastoral activities. activities • Pupils should be taught in all lessons to be critically aware of the materials / materials/content they access on-on- line and be guided to validate the accuracy of information. • Pupils should be taught to acknowledge the source of information including ‘Prevent’ awarenessused and to respect copyright when using material accessed on the internet • Pupils should be supported in building resilience to radicalisation by providing a safe environment for debating controversial issues and helping them to understand how they can influence and participate in decision-making. There are additional duties for schools under the Counter Terrorism and Securities Act 2015 which requires schools to ensure that children are safe from terrorist and extremist material on the internet. • Pupils should be helped to understand the need for the pupil Acceptable Use Agreement (PAUP) acceptable use agreement and encouraged to adopt safe and responsible use both within and outside school. • Staff should act as good role models in their use of digital technologies, the internet and mobile • In lessons where internet use is pre-planned, it is best practice that pupils should be guided to sites checked as suitable for their use and that processes are in place for dealing with any unsuitable material that is found in internet searches. • Where pupils are allowed to freely search the internet, staff should be vigilant in monitoring the content of the websites the young people visit. Education – Parents/carers Many parents and carers have only a limited understanding of online safety risks and issues, yet they play an essential role in the education of their children and in the monitoring/regulation of the children’s online behaviours. Parents may underestimate how often children and young people come across potentially harmful and inappropriate material on the internet and may be unsure about how to respond. The school will therefore seek to provide information and awareness to parents and carers through: It is accepted that Curriculum activities • Letters, newsletters, web site, • Parents/carers evenings/sessions • High profile events/campaigns e.g. Safer Internet Day • Reference to the relevant web sites/publications e.g. swgfl.orguk, xxx.xxxxxxxxxxxxx.xxx.xx/, xxxx://xxx.xxxxxxxx.xxx/parents-and-carers Education – The Wider Community The school will provide opportunities for local community groups/members of the community to gain from time to time, the school’s online safety knowledge and experience. This may be offered through the following: • Online safety messages targeted towards grandparents and other relatives as well as parents. • The school website will provide online safety information for the wider community • Sharing their online safety expertise/good educational reasons, students may need to research topics (e.g. racism, drugs, discrimination) that would normally result in internet searches being blocked. Internet filters can be relaxed by the ICT support team on request. practice Education & Training – Staff / Staff/Volunteers It is essential that all staff receive E-Safety online safety training and understand their responsibilities, as outlined in this policy. Training will be offered as follows: • A planned programme of formal E-Safety online safety training will be made available to staff. This will be regularly updated and reinforced, with . An audit of the online safety training offeredneeds of all staff will be carried out regularly. • All new staff will should receive E-Safety online safety training as part of their induction programme, ensuring that they fully understand the school/academy online safety policy and acceptable use agreements. • The E-Online Safety Coordinator Lead will receive regular updates through attendance at external training events, e.g., CEOPevents and by reviewing guidance documents released by relevant organisations. • This E-Safety online safety policy and its updates will be presented to and discussed by staff including regular ‘Prevent’ in staff/team meetings/training drawing on partners and external agencies for support, information and intelligencesessions. • The Online Safety Lead will provide advice/guidance/training to individuals as required. Training – Governors Governors should take part in E-Safety training / online safety training/awareness sessions, with particular importance for those who are members of any sub-committee / group involved in technology / E-Safety / technology/online safety/health and safety / child protection/safeguarding. This may be offered in a number of ways: • Attendance at training provided by WarringtonLocal Authority/WPAT/National Governors Association/or other relevant organisation (e.g. SWGfL). • Participation in school training/information sessions for staff or parents Technical – infrastructure / infrastructure/equipment, filtering and monitoring Penketh has a managed ICT service provided by an outside contractor –EDAC Solutions. The managed service provider carries out all the online safety measures that would otherwise be the responsibility of the school. The managed service provider is fully aware of the school online safety policy/acceptable use agreements. The school will be responsible for ensuring that the school infrastructure / infrastructure/network is as safe and secure as is reasonably possible and that policies and procedures approved within this policy are implemented. • School technical systems will be managed in ways that ensure that the school meets recommended technical requirementsrequirements • There will be regular reviews and audits of the safety and security of school/academy technical systems • Servers, wireless systems and cabling must be securely located and physical access restricted • All users will have clearly defined access rights to school/academy technical systems and devices. • All users (at KS3 KS2 and above) will be provided with a username and secure password by the department Xxxx who will keep an up to date record of users and their usernames. Users are responsible for the security of their username and password. • The “master/administrator” passwords for the school systems, used by the Network Manager must also be available to the Headteacher or Online Safety Lead and Business Manager and kept in a secure place • EDAC Solutions is responsible for ensuring that software licence logs are accurate and up to date and that regular checks are made to reconcile the number of licences purchased against the number of software installations. installations • Internet access is filtered for all users. Illegal content (such as child sexual abuse images or incitement of extremist viewsimages) is filtered by the broadband or filtering providerprovider by actively employing the Internet Watch Foundation CAIC list. Content lists are regularly updated and internet use is logged and regularly monitored. There is a clear process in place to deal with requests for filtering changes • Internet filtering/monitoring should ensure that children are safe from terrorist and extremist material when accessing the internet. • All WBC regularly monitor and record the activity of users on the school technical systems and users are able made aware of this in the acceptable use agreement. Our contracted technical support team will review information from WBC and alert as required. • An appropriate system is in place for users to report any actual / actual/potential technical incident / incident/security breach to the DPO. • All users must not download relevant person, as agreed- Report to Xxx Xxxxxx or install software without first consulting and obtaining permission from the Network Manager. • The provision of temporary access is conducted via inductionMrs Xxxxx as internet safety leads ). • Appropriate security measures are in place to protect the servers, firewalls, routers, wireless systems, work stations, mobile devices devices, etc., . from accidental or malicious attempts which might threaten the security of the school systems and data. • Personal data cannot be sent over the internet or taken off the These are tested regularly. The school site unless safely encrypted or otherwise secured. Memory sticks should not contain sensitive data infrastructure and should be encrypted. Staff should seek assistance from the ICT support team regarding encrypted memory sticks. • The Network Manager will monitor any printer discrepancies with regard individual devices are protected by up to securitydate virus software.

Appears in 1 contract

Samples: www.penkethprimary.co.uk

Time is Money Join Law Insider Premium to draft better contracts faster.