Computer Use

Computer Use

Nowra Christian School Computer Network Policy

Last updated: 28/8/2013

1. NCS Computer Department Mission

The mission of NCS Computer Department is to improve learning and teaching through interpersonal communication, access to information, research, training, collaboration and spread of successful educational practices, methods, and materials.

The use of technology within our society in general and education in particular is ubiquitous, and is generally no longer viewed as a privilege, but as a right. But even within this environment, the abuse of technology to gratify humanity’s sinful nature is widespread. In implementing this policy and, as necessary, imposing consequences for misuse, the School acknowledges that responses must be within the framework of dealing assisting the user to act appropriately. Simple bans of computer use are simplistic and have proved to be unhelpful, and must never be a first response to breaches of this policy.

2. NCS Computer Department Code of Conduct

The Code of Conduct applies to all Users of the NCS Computer Network, (referred to as “The Network” and it includes all devices at NCS and all technology accessible from these PC’s including the Internet and facsimile facilities. It reads:

“I will strive to act in all situations with honesty, integrity and respect for the rights of others and to help others to behave in a similar fashion. I will make a conscious effort to shine like a star in the universe (Philippians 2:15b), to be of service to others and to the community. I agree to follow the Usage, Content, Copyright and Computer Room Guidelines as put forth in the Computer Department Work Policy Statement.”

3. NCS Computer Department Policy Statement

a) Usage Guidelines

The network user is held responsible for his/her actions. Some, but not all, examples of unacceptable use are listed below:

i) Wilfully using the network for any illegal activity, including violation of copyright or other contracts;

ii) Using the network for financial or commercial gain;

iii) Attempts to interfere with hardware, software or system settings;

iv) Vandalizing data or copying data without permission;

v) Wastefully using finite resources such as printing excessive copies and playing games or using the computer resources for activities other than those approved by the school;

vi) Gaining or attempting to gain unauthorized access to data, resources or entities;

vii) Finding out or attempting to find out a password of another user or the giving out of a password to another person without the express permission of the IT Manager;

viii) Using another person’s account, with or without their permission, to gain access to the network;

ix) Storing files in another person’s folder, with or without their permission, intentionally invading the privacy of others or posting anonymous messages;

x) Downloading, creating, storing or printing files or messages that are profane, obscene, or that use language that offends or tends to degrade others;

xi) Not reporting to a teacher immediately after becoming aware that the Usage or Content Guidelines have been breached either deliberately or unintentionally;

xii) Using computers in an area that has been declared out of bounds either temporarily or indefinitely;

xiii) Using external storage devices such as memory sticks and hard-drives, to bring non-school related files into the school; (using external storage devises for activities outside the scope of this policy (eg games, movies etc),

xiv) Transferring non-school related files onto the Network;

xv) Coercing, suggesting or tricking another person to access information that may offend or breach the Content Guidelines.

xvi) Breaching the Content Guidelines listed below.

xvii) Breeching the Data Storage Guidelines listed below.

b) Content Guidelines

Some, but not all, content constraints placed on Network Users are listed below:

i) In the case of student work to be published to the Internet, no personal information about a student will be allowed. This includes, name, telephone numbers and addresses as well as information regarding the specific location of any student at any time; (NB This excludes information that may appear on the School’s official web site where students may volunteer to be on a directory of email addresses.)

ii) No text, image, movie or sound that contains pornography, profanity, obscenity, or language that offends or tends to degrade others is to be viewed, copied or transmitted in any way. This includes all “adult” web sites and emails;

iii) Email transmissions by students will only be allowed with teacher permission:

· For school purposes only

· Must be polite, non-abusive and void of vulgar language;

· Should only communicate with correspondents believed to be of reputable motives and that no rendezvous shall be arranged with any person without the authorisation of a teacher;

iv) No use of chatting or social networking sites (including youtube, flickr, facebook etc) at school without explicit teacher permission. This permission, if given, is for the purpose of a specific task only and does not extend beyond that specific task

c) Data Storage Guidelines

Each Network User will be given their own personal storage space on the network File Server into which all files are to be stored. No file should be stored on a work station except in special cases approved by a teacher. This storage area will be protected by the user’s password.

In this regard, students must:

i) Not disclose their password to any other student.

ii) Not attempt to access the password or files of any other student or staff member. Nor tamper with any other program or system file.

iii) Understand that the Computer Management will have all passwords on file and that teachers will have access to all student files.

iv) Organize their files so that their total size is kept to a minimum. (Old files, if wanted, should be archived onto a flash drive or some other storage device owned by the student.

v) Understand that Staff may, without notice, delete files that are stored in areas other than in personal folders or are unapproved.

vi) Make backup copies of all important work onto flash drives or some other storage device owned by the student, as data loss is no excuse for lateness in completion of assignments – particularly official assessment tasks. While the school endeavours to back up all work files each night, no 100% guarantee is made as to its reliability.

d) Use of students own devices

Refer to the school's BYOD policy.

The use of students own wireless devices in the school context, in all cases, is subject to the content and copyright guidelines, as well as relevant guidelines all other relevant School Policies, including Mobile Phone Policy, Child Protection Policy, Sexual Harassment, Learning Support Tools, and Welfare and Discipline Policies.

e) Copyright Guidelines

The Copyright Act makes certain allowance for students copying material for study or research under the "fair dealing" clause of the Act. This allows you to copy a certain amount of a resource without asking the copyright owner for permission. It is reliant on the resource being used for your own personal study or research.

Generally, you may copy:

i) Up to 10%, or one chapter of a work if it is a print resource.

ii) Up to 10% of the words from an electronic source such as the internet, however you should check the website for any copyright notices. It is hard to claim that material you have copied is for your personal use if you have e-mailed a copy to another person. If you need more than 10% of the material you should e-mail the website manager.

iii) You may copy an article from a newspaper or magazine, or more than one article if it is on the same subject.

iv) If a book is no longer published (and is not about to be re- published) you may copy the whole of the book. Under these circumstances, permission must be given by the School’s Librarian.

v) Digital media (eg CDs, DVDs, MP3, MP4, WMV etc) – under no circumstances are students to copy any digital media for another person without the explicit, written permission of the copyright holder

 

vi) You may copy a video or tape a TV programme provided it is for your own personal study and complies with the "fair trading" clause of the Act.

It is required that when you use material for research for assignments, etc. you acknowledge where you got your information.

You may copy material into an assignment but you cannot pretend that it is your own work. This is called plagiarism and usually results in you failing your assignment!

Ask your teacher about how you can quote from information sources in assignments

f) Computer Room Guidelines (Refers to all areas where computers exist)

i)At all times

· You must not consume or have with you in the computer room, any food or drink.

· Internet use is for approved school tasks only. If, by accident, you access an inappropriate or suspicious site, report this immediately to The Network Manager.

· You are not to access any email programs including Hotmail, Yahoo, MSN, or any other chat rooms via the school’s Internet. The only exception is when it is clearly for school related tasks and authorised by a teacher.

· Be warned: All Internet activity will be monitored and logged by The Network Manager and users can be identified.

· No additional programs of any kind are to be downloaded, installed or executed without the approval of The Network Manager.

· Keep all noise to a minimum.

· Close all programs and log off after each session.

Do not let anyone know your password. If you suspect that someone else knows your password, see The Network Manager immediately

ii) During lessons

· You are to stay on the work that you have been set in that class. Do not access games, other schoolwork or the Internet without permission from your teacher.

· Passing messages via the intranet is the same as passing notes in class, and is not allowed.

· Students wishing to use computers in an area different to their timetabled classroom must have written consent from their teacher. Should another class occupy the area sought, the student should politely ask the teacher in charge for permission to enter. It is understood that the teacher concerned may refuse such permission and in that case the student must return to their class. If permission is granted, the guest student will make no disruption whatsoever to the host class.

 

iii) During lunch break

· Junior High Students may use Room 11 only and Library computers during lunchtime, only if they have written permission (signed and dated) from a teacher, to work on specific school tasks.

· Any teacher may demand to see permission notes which ideally should be placed on the computer “box”.

· Senior High Students may use only the Room 11 and Library computers during lunchtime, without written permission to work on school tasks.

· No student is permitted to play games or access Internet sites which are not school task related.

· Students are to log off and leave the computer room 5 minutes before the end of the lunch break.

iv) Last class of the day

· Students are to close all programs on ALL computers and log off. Computers are to be left on.

· All rubbish is to be placed in the bin or in the recycling box.

· Close all glass windows, including overhead louvers in the annex, and place tables and chairs neatly.

4. Consequences

Students are warned that NCS Staff have the right to view the content of any of their work produced on the Network either by means of visual observance or electronic surveillance. Violators of the NCS Computer Code of Conduct, described above, will face disciplinary action, may lose School and User privileges or in some cases face suspension or expulsion from NCS. Additionally, please note that the school reserves the right to ban students from using any peripherals (eg external drives etc). The length of any such bans is entirely at the School’s discretion).

5. Disclaimer

a) NCS makes no warranties of any kind, whether expressed or implied, for the service it is providing. The school will not be responsible for any damages suffered. This includes loss of data resulting from delays, non-deliveries, misdeliveries, or service interruptions caused by negligence, errors or omissions. Use of any information obtained via the NCS is at the user's own risk. The school is not responsible for the accuracy or quality of information obtained.

b) All terms and conditions as stated in this document are applicable to Nowra Christian School. These terms and conditions reflect the entire agreement of the parties and supersede all prior oral or written agreements and understandings of the parties.

c) The School reserves the unilateral right to amend, add or delete any part of this policy. Notification of any change to these regulations will be made to users.

d) It is understood that while every effort will be taken to monitor computer usage at NCS, the nature of the Network makes it impossible to control all activities. Thus, all users of the network do so, on the basis of good will and trust. NCS takes no responsibility for any possible consequences that users, who breech the above guidelines, may incur. NCS believes that the potential benefits to educators and students, in allowing access to the Network, far outweigh the denial of these services.

NCS Skoolbag