SlideShare a Scribd company logo
1 of 4
Download to read offline
CYBERSAFETY AT CLEVEDON SCHOOL
CYBERSAFETY USE AGREEMENT
FOR YR 0 ­ 3 STUDENTS
This document is comprised of this cover page and three sections:
Section A:  Introduction
Section B:  Cybersafety Rules for Yr 0 ­ 3 Students
Section C:  Cybersafety Use Agreement Form.
Instructions for parents*/caregivers/legal guardians
1. Please read sections A and B carefully. If there are any points you would like                           
to discuss with the school, let the school office know as soon as possible.
2. Discuss the cybersafety rules with your child.
3. Sign the Use Agreement Form (Section C) and return that section only to the                         
School Office
4. Please keep sections A and B for future reference.
* The term ‘parent’ used throughout this document also refers to caregivers and legal guardians.
Important terms used in this document:
a.
The abbreviation ‘ICT’ in this document refers to the term ‘Information and Communication                       
Technologies’
b.
‘Cybersafety’ refers to the safe use of the Internet and ICT equipment/devices, including                       
mobile phones
c.
‘School ICT’ refers to the school’s computer network, Internet access facilities, computers,                     
and other school ICT equipment/devices as outlined in (d) below
d.
The term ‘ICT equipment/devices’ used in this document, includes but is not limited to,                         
computers (such as desktops, laptops, PDAs), storage devices (such as USB and flash                       
memory devices, CDs, DVDs, floppy disks, iPods, MP3 players), cameras (such as video,                       
digital, webcams), all types of mobile phones, gaming consoles, video and audio                     
players/receivers (such as portable CD and DVD players), and any other, similar,                     
technologies as they come into use
e.
‘Objectionable’ in this agreement means material that deals with matters such as sex,                       
cruelty, or violence in such a manner that it is likely to be injurious to the good of students or                                     
incompatible with a school environment. This is intended to be inclusive of the definition used                           
in the Films, Videos and Publications Classification Act 1993.
Additional information can be found on NetSafe’s website www.netsafe.org.nz/ua
SECTION A
INTRODUCTION
The measures to ensure the cybersafety of Clevedon School outlined in this document are based on our core                                 
values.
The school’s computer network, Internet access facilities, computers and other school ICT equipment/devices bring                         
great benefits to the teaching and learning programmes at Clevedon School, and to the effective operation of the                                 
school.
Our school has rigorous cybersafety practices in place, which include cybersafety use agreements for all school staff                               
and students.
The overall goal of the school in this matter is to create and maintain a cybersafety culture which is in keeping with                                         
the values of the school, and legislative and professional obligations. This use agreement includes information about                             
your obligations, responsibilities, and the nature of possible consequences associated with cybersafety breaches                       
which undermine the safety of the school environment.
All students will be issued with a use agreement and once signed consent has been returned to school, students will                                     
be able to use the school ICT equipment/devices.
The school’s computer network, Internet access facilities, computers and other school ICT equipment/devices are                         
for educational purposes appropriate to the school environment. This applies whether the ICT equipment is owned                             
or leased either partially or wholly by the school, and used on or off the school site.
The school may monitor traffic and material sent and received using the school’s ICT network. The school may use                                   
filtering and/or monitoring software to restrict access to certain sites and data, including email.
The school may audit its computer network, Internet access facilities, computers and other school ICT                           
equipment/devices or commission an independent forensic audit.
SECTION B
RULES TO HELP KEEP  CLEVEDON SCHOOL YR 0 ­ 3 STUDENTS  CYBERSAFE
These rules will help us to stay safe when using ICT at school
1. I cannot use school ICT equipment until my parent/s have signed my use agreement form (see                             
Section C) and the completed form has been returned to school.
2. I can only use the computers and other ICT equipment for my schoolwork and only with my                               
teacher’s permission.
3. I can only go online or use the Internet at school when a teacher gives permission and an adult is                                     
present.
4. If there is something I’m not sure about I will ask my teacher.
5. I will not use the Internet, email, mobile phones or any other ICT equipment to be mean,                               
inappropriate, or unkind to other people.
6. I will not tell anyone my password.
7. If I find anything that upsets me, that is inappropriate, or that I know is not acceptable at our                                   
school, I will:
●
Not show others
●
Click on the ‘Hector Safety Button’ or turn off the screen and
●
Get a teacher straight away
8.
I must not bring any ICT equipment/devices to school. This includes things like mobile phones,                           
iPods, games, cameras, USB drives and software.
9. I will ask my teacher’s permission before I put any personal information online.
Personal information includes:
Name Address
Email address Phone numbers Photos.
10. I will be careful and will look after all our school lCT equipment by:
● Being sensible around it
● Following our school cybersafety rules
● Telling a teacher about anything wrong or damaged.
11. I understand that if I break these rules the school will inform my parent(s).
SECTION C
CLEVEDON SCHOOL YR 0 ­ 3 CYBERSAFETY USE AGREEMENT FORM
To the parent/caregiver/legal guardian, please:
1. Read this page carefully, to check you understand your responsibilities under this
agreement
2. Sign the appropriate section – Section C ­  on this form
3. Detach and return this form –  Section C only –
to the School Office.
4. Keep the document for future reference.
I understand that Clevedon School will:
● Do its best to enhance learning through the safe use of ICT. This includes working to restrict access to                                   
inappropriate, illegal or harmful material on the Internet or school ICT equipment/devices at school, or                           
at school related activities
● Work progressively with children and their families to encourage and develop an understanding of the                           
importance of cybersafety through education designed to complement and support the use agreement                       
initiative. This includes providing children with strategies to keep themselves safe in cyberspace
● Keep a copy of this signed use agreement on file
● Respond to any breaches in an appropriate manner
● Welcome enquiries from parents or students about cybersafety issues.
My responsibilities include:
● I will read this cybersafety use agreement document
● I will discuss the information with my child and explain why it is important
● I will return the signed agreement to the school
● I will support the school’s cybersafety programme by encouraging my child to follow the cybersafety                           
rules, and to always ask the teacher if they are unsure about any use of ICT
● I will contact the principal or school cybersafety manager to discuss any questions I might have about                               
cybersafety and/or this use agreement and I am welcome to do this at any time.
Additional information can be found on the NetSafe website www.netsafe.org.nz/ua
IMPORTANT – To be completed and returned to the School Office to enable
your child to participate and use ICT at school.
I have read this cybersafety use agreement and I am aware of the school’s initiatives to maintain                               
a cybersafe learning environment, including my child’s responsibilities.
Name of student: ………………………………………………………………………………………………………..
Name of parent/caregiver/legal guardian: ………………………………………………………………………..
Parent’s signature: …………………………………………………………….  Date: ………………………………
Please note: This agreement for your child will remain in force as long as he/she is enrolled at this                                   
school. If it becomes necessary to add/amend any information or rule, parents will be advised in                             
writing.

More Related Content

What's hot

Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Security
SecuritySecurity
SecurityNabatah
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Saint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own TechnologySaint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own Technologytcitrano
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Educationmwolfrey
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2Ira Sagu
 
CYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLECYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLEInterMediaKT
 
Tahunanui cluster walk_through
Tahunanui cluster walk_throughTahunanui cluster walk_through
Tahunanui cluster walk_throughEmma Watts
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreementPaula Naugle
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policyiamprosperous
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Paula Naugle
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use PolicyBarb Jansen
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbookJG4191
 
Staff training session
Staff training sessionStaff training session
Staff training sessionmander5208
 
Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyJulie Evans
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
Cybersafety rules 2010 years 1 and 2
Cybersafety rules 2010 years 1 and 2Cybersafety rules 2010 years 1 and 2
Cybersafety rules 2010 years 1 and 2RochelleStansfield
 
internetsafety
internetsafetyinternetsafety
internetsafetyawadly
 

What's hot (20)

Social media policy
Social media policySocial media policy
Social media policy
 
Security
SecuritySecurity
Security
 
E safety inset
E safety insetE safety inset
E safety inset
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Saint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own TechnologySaint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own Technology
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Education
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2
 
CYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLECYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLE
 
Tahunanui cluster walk_through
Tahunanui cluster walk_throughTahunanui cluster walk_through
Tahunanui cluster walk_through
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbook
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
AUP Student Edition 2011
AUP Student Edition 2011AUP Student Edition 2011
AUP Student Edition 2011
 
Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 Journey
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Cybersafety rules 2010 years 1 and 2
Cybersafety rules 2010 years 1 and 2Cybersafety rules 2010 years 1 and 2
Cybersafety rules 2010 years 1 and 2
 
internetsafety
internetsafetyinternetsafety
internetsafety
 

Viewers also liked

2615 Cullen Mkt Pkg
2615 Cullen Mkt Pkg2615 Cullen Mkt Pkg
2615 Cullen Mkt Pkgsrosenberg
 
Aviation - Pass Criteria
Aviation - Pass CriteriaAviation - Pass Criteria
Aviation - Pass CriteriaMohit Koyande
 
Sabr 39 Team Trivia Preliminary
Sabr 39 Team Trivia PreliminarySabr 39 Team Trivia Preliminary
Sabr 39 Team Trivia PreliminarySABR Office
 
Imerl网络营销
Imerl网络营销Imerl网络营销
Imerl网络营销qiang0204
 
Potene's Whats
Potene's WhatsPotene's Whats
Potene's WhatsLSSROOM16
 
Office Suites Plus
Office Suites PlusOffice Suites Plus
Office Suites Plusdeneene9
 
Teen Drinking
Teen DrinkingTeen Drinking
Teen Drinkingsveros
 
Highlights Of My Life
Highlights Of My LifeHighlights Of My Life
Highlights Of My LifeTomoya Shoji
 
TöRéKeny öNbecsüLéS ElőAdáS
TöRéKeny öNbecsüLéS  ElőAdáSTöRéKeny öNbecsüLéS  ElőAdáS
TöRéKeny öNbecsüLéS ElőAdáSJulcsilany
 
2013 04 rca_foresight
2013 04 rca_foresight2013 04 rca_foresight
2013 04 rca_foresightDuncan Wilson
 
Team C presentation - Tresure Hunt Pudong, 05.04.09
Team C presentation - Tresure Hunt Pudong, 05.04.09Team C presentation - Tresure Hunt Pudong, 05.04.09
Team C presentation - Tresure Hunt Pudong, 05.04.09Ciceoi Roxana
 
Accessing And Using Reference Usa, Slide Share
Accessing And Using Reference Usa, Slide ShareAccessing And Using Reference Usa, Slide Share
Accessing And Using Reference Usa, Slide Shareguestd567a0
 
Как заставить инвестора сказать «да»
Как заставить инвестора сказать «да»Как заставить инвестора сказать «да»
Как заставить инвестора сказать «да»Nata Isaevich
 
Avondale intermediate to day
Avondale intermediate to dayAvondale intermediate to day
Avondale intermediate to dayAngie Simmons
 
Houses in different place and time
Houses in different place and timeHouses in different place and time
Houses in different place and timeAngie Simmons
 
Conclusiones finales plagio
Conclusiones finales plagioConclusiones finales plagio
Conclusiones finales plagiomaria73
 

Viewers also liked (20)

2615 Cullen Mkt Pkg
2615 Cullen Mkt Pkg2615 Cullen Mkt Pkg
2615 Cullen Mkt Pkg
 
Aviation - Pass Criteria
Aviation - Pass CriteriaAviation - Pass Criteria
Aviation - Pass Criteria
 
Sabr 39 Team Trivia Preliminary
Sabr 39 Team Trivia PreliminarySabr 39 Team Trivia Preliminary
Sabr 39 Team Trivia Preliminary
 
Ancient Greece
Ancient GreeceAncient Greece
Ancient Greece
 
Imerl网络营销
Imerl网络营销Imerl网络营销
Imerl网络营销
 
Potene's Whats
Potene's WhatsPotene's Whats
Potene's Whats
 
Office Suites Plus
Office Suites PlusOffice Suites Plus
Office Suites Plus
 
Teen Drinking
Teen DrinkingTeen Drinking
Teen Drinking
 
Highlights Of My Life
Highlights Of My LifeHighlights Of My Life
Highlights Of My Life
 
brents slide
brents slidebrents slide
brents slide
 
TöRéKeny öNbecsüLéS ElőAdáS
TöRéKeny öNbecsüLéS  ElőAdáSTöRéKeny öNbecsüLéS  ElőAdáS
TöRéKeny öNbecsüLéS ElőAdáS
 
2013 04 rca_foresight
2013 04 rca_foresight2013 04 rca_foresight
2013 04 rca_foresight
 
Medispec Patent
Medispec PatentMedispec Patent
Medispec Patent
 
Team C presentation - Tresure Hunt Pudong, 05.04.09
Team C presentation - Tresure Hunt Pudong, 05.04.09Team C presentation - Tresure Hunt Pudong, 05.04.09
Team C presentation - Tresure Hunt Pudong, 05.04.09
 
Accessing And Using Reference Usa, Slide Share
Accessing And Using Reference Usa, Slide ShareAccessing And Using Reference Usa, Slide Share
Accessing And Using Reference Usa, Slide Share
 
Как заставить инвестора сказать «да»
Как заставить инвестора сказать «да»Как заставить инвестора сказать «да»
Как заставить инвестора сказать «да»
 
Avondale intermediate to day
Avondale intermediate to dayAvondale intermediate to day
Avondale intermediate to day
 
Houses in different place and time
Houses in different place and timeHouses in different place and time
Houses in different place and time
 
Orion Racing India
Orion Racing IndiaOrion Racing India
Orion Racing India
 
Conclusiones finales plagio
Conclusiones finales plagioConclusiones finales plagio
Conclusiones finales plagio
 

Similar to Cybersafety yr0 3

Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]Debbie Oliver
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813jennifer_lawrence
 
BYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade ReadingBYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade ReadingTuPham99
 
Junior student e learning agreements for home
Junior student e learning agreements for homeJunior student e learning agreements for home
Junior student e learning agreements for homeEmma Watts
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policyBadaiaEnglish
 
Safety Presentation
Safety PresentationSafety Presentation
Safety PresentationSarah Sutter
 

Similar to Cybersafety yr0 3 (20)

Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
2015 parent presentation yr 7 12 slideshare
2015 parent presentation yr 7   12 slideshare2015 parent presentation yr 7   12 slideshare
2015 parent presentation yr 7 12 slideshare
 
Aup
AupAup
Aup
 
E safety for governors & carers
E safety for governors & carersE safety for governors & carers
E safety for governors & carers
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813
 
BYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade ReadingBYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade Reading
 
Ofsted & E Safety Show Dormat
Ofsted & E Safety Show DormatOfsted & E Safety Show Dormat
Ofsted & E Safety Show Dormat
 
Junior student e learning agreements for home
Junior student e learning agreements for homeJunior student e learning agreements for home
Junior student e learning agreements for home
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policy
 
BYOD/BYOT
BYOD/BYOTBYOD/BYOT
BYOD/BYOT
 
Ict Issues
Ict IssuesIct Issues
Ict Issues
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Resources
ResourcesResources
Resources
 

More from Angie Simmons

Blended elearning project (1)
Blended elearning project (1)Blended elearning project (1)
Blended elearning project (1)Angie Simmons
 
Engaging students with digital literacy tools
Engaging students with digital literacy toolsEngaging students with digital literacy tools
Engaging students with digital literacy toolsAngie Simmons
 
Blended elearning project
Blended elearning projectBlended elearning project
Blended elearning projectAngie Simmons
 
Student and teacher interviews be l project 2013
Student and teacher interviews be l project 2013Student and teacher interviews be l project 2013
Student and teacher interviews be l project 2013Angie Simmons
 
E learning exemplars
E learning exemplarsE learning exemplars
E learning exemplarsAngie Simmons
 
Professional inquiry
Professional inquiryProfessional inquiry
Professional inquiryAngie Simmons
 
Avondale int term 2 - Student voice about e-learning
Avondale int term 2 - Student voice about e-learningAvondale int term 2 - Student voice about e-learning
Avondale int term 2 - Student voice about e-learningAngie Simmons
 
2012 mid year special ed programme report
2012   mid year special ed programme report2012   mid year special ed programme report
2012 mid year special ed programme reportAngie Simmons
 
Jeanette meyer class
Jeanette meyer classJeanette meyer class
Jeanette meyer classAngie Simmons
 
Jeanette meyer class
Jeanette meyer classJeanette meyer class
Jeanette meyer classAngie Simmons
 
An ictpd cluster journey
An ictpd cluster journeyAn ictpd cluster journey
An ictpd cluster journeyAngie Simmons
 
Maritime museumcompressed
Maritime museumcompressedMaritime museumcompressed
Maritime museumcompressedAngie Simmons
 
Biodiversity games day manuka dc
Biodiversity games day manuka dcBiodiversity games day manuka dc
Biodiversity games day manuka dcAngie Simmons
 
Bays club workshop sept 17th 2011
Bays club workshop sept 17th 2011Bays club workshop sept 17th 2011
Bays club workshop sept 17th 2011Angie Simmons
 
Creativ eby the sea retreat
Creativ eby the sea retreatCreativ eby the sea retreat
Creativ eby the sea retreatAngie Simmons
 

More from Angie Simmons (20)

Blended elearning project (1)
Blended elearning project (1)Blended elearning project (1)
Blended elearning project (1)
 
Engaging students with digital literacy tools
Engaging students with digital literacy toolsEngaging students with digital literacy tools
Engaging students with digital literacy tools
 
Blended elearning project
Blended elearning projectBlended elearning project
Blended elearning project
 
Student and teacher interviews be l project 2013
Student and teacher interviews be l project 2013Student and teacher interviews be l project 2013
Student and teacher interviews be l project 2013
 
E learning exemplars
E learning exemplarsE learning exemplars
E learning exemplars
 
Professional inquiry
Professional inquiryProfessional inquiry
Professional inquiry
 
Avondale int term 2 - Student voice about e-learning
Avondale int term 2 - Student voice about e-learningAvondale int term 2 - Student voice about e-learning
Avondale int term 2 - Student voice about e-learning
 
2012 mid year special ed programme report
2012   mid year special ed programme report2012   mid year special ed programme report
2012 mid year special ed programme report
 
Jeanette meyer class
Jeanette meyer classJeanette meyer class
Jeanette meyer class
 
Jeanette meyer class
Jeanette meyer classJeanette meyer class
Jeanette meyer class
 
Keynote whangerei
Keynote whangereiKeynote whangerei
Keynote whangerei
 
The Social Web
The Social WebThe Social Web
The Social Web
 
An ictpd cluster journey
An ictpd cluster journeyAn ictpd cluster journey
An ictpd cluster journey
 
Maritime museumcompressed
Maritime museumcompressedMaritime museumcompressed
Maritime museumcompressed
 
Homework houses
Homework housesHomework houses
Homework houses
 
Biodiversity games day manuka dc
Biodiversity games day manuka dcBiodiversity games day manuka dc
Biodiversity games day manuka dc
 
Bays club workshop sept 17th 2011
Bays club workshop sept 17th 2011Bays club workshop sept 17th 2011
Bays club workshop sept 17th 2011
 
Migration feast
Migration feastMigration feast
Migration feast
 
Market inquiry
Market inquiryMarket inquiry
Market inquiry
 
Creativ eby the sea retreat
Creativ eby the sea retreatCreativ eby the sea retreat
Creativ eby the sea retreat
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Cybersafety yr0 3

  • 1. CYBERSAFETY AT CLEVEDON SCHOOL CYBERSAFETY USE AGREEMENT FOR YR 0 ­ 3 STUDENTS This document is comprised of this cover page and three sections: Section A:  Introduction Section B:  Cybersafety Rules for Yr 0 ­ 3 Students Section C:  Cybersafety Use Agreement Form. Instructions for parents*/caregivers/legal guardians 1. Please read sections A and B carefully. If there are any points you would like                            to discuss with the school, let the school office know as soon as possible. 2. Discuss the cybersafety rules with your child. 3. Sign the Use Agreement Form (Section C) and return that section only to the                          School Office 4. Please keep sections A and B for future reference. * The term ‘parent’ used throughout this document also refers to caregivers and legal guardians. Important terms used in this document: a. The abbreviation ‘ICT’ in this document refers to the term ‘Information and Communication                        Technologies’ b. ‘Cybersafety’ refers to the safe use of the Internet and ICT equipment/devices, including                        mobile phones c. ‘School ICT’ refers to the school’s computer network, Internet access facilities, computers,                      and other school ICT equipment/devices as outlined in (d) below d. The term ‘ICT equipment/devices’ used in this document, includes but is not limited to,                          computers (such as desktops, laptops, PDAs), storage devices (such as USB and flash                        memory devices, CDs, DVDs, floppy disks, iPods, MP3 players), cameras (such as video,                        digital, webcams), all types of mobile phones, gaming consoles, video and audio                      players/receivers (such as portable CD and DVD players), and any other, similar,                     
  • 2. technologies as they come into use e. ‘Objectionable’ in this agreement means material that deals with matters such as sex,                        cruelty, or violence in such a manner that it is likely to be injurious to the good of students or                                      incompatible with a school environment. This is intended to be inclusive of the definition used                            in the Films, Videos and Publications Classification Act 1993. Additional information can be found on NetSafe’s website www.netsafe.org.nz/ua SECTION A INTRODUCTION The measures to ensure the cybersafety of Clevedon School outlined in this document are based on our core                                  values. The school’s computer network, Internet access facilities, computers and other school ICT equipment/devices bring                          great benefits to the teaching and learning programmes at Clevedon School, and to the effective operation of the                                  school. Our school has rigorous cybersafety practices in place, which include cybersafety use agreements for all school staff                                and students. The overall goal of the school in this matter is to create and maintain a cybersafety culture which is in keeping with                                          the values of the school, and legislative and professional obligations. This use agreement includes information about                              your obligations, responsibilities, and the nature of possible consequences associated with cybersafety breaches                        which undermine the safety of the school environment. All students will be issued with a use agreement and once signed consent has been returned to school, students will                                      be able to use the school ICT equipment/devices. The school’s computer network, Internet access facilities, computers and other school ICT equipment/devices are                          for educational purposes appropriate to the school environment. This applies whether the ICT equipment is owned                              or leased either partially or wholly by the school, and used on or off the school site. The school may monitor traffic and material sent and received using the school’s ICT network. The school may use                                    filtering and/or monitoring software to restrict access to certain sites and data, including email. The school may audit its computer network, Internet access facilities, computers and other school ICT                            equipment/devices or commission an independent forensic audit. SECTION B RULES TO HELP KEEP  CLEVEDON SCHOOL YR 0 ­ 3 STUDENTS  CYBERSAFE These rules will help us to stay safe when using ICT at school 1. I cannot use school ICT equipment until my parent/s have signed my use agreement form (see                              Section C) and the completed form has been returned to school. 2. I can only use the computers and other ICT equipment for my schoolwork and only with my                                teacher’s permission. 3. I can only go online or use the Internet at school when a teacher gives permission and an adult is                                      present. 4. If there is something I’m not sure about I will ask my teacher. 5. I will not use the Internet, email, mobile phones or any other ICT equipment to be mean,                                inappropriate, or unkind to other people. 6. I will not tell anyone my password.
  • 3. 7. If I find anything that upsets me, that is inappropriate, or that I know is not acceptable at our                                    school, I will: ● Not show others ● Click on the ‘Hector Safety Button’ or turn off the screen and ● Get a teacher straight away 8. I must not bring any ICT equipment/devices to school. This includes things like mobile phones,                            iPods, games, cameras, USB drives and software. 9. I will ask my teacher’s permission before I put any personal information online. Personal information includes: Name Address Email address Phone numbers Photos. 10. I will be careful and will look after all our school lCT equipment by: ● Being sensible around it ● Following our school cybersafety rules ● Telling a teacher about anything wrong or damaged. 11. I understand that if I break these rules the school will inform my parent(s). SECTION C CLEVEDON SCHOOL YR 0 ­ 3 CYBERSAFETY USE AGREEMENT FORM To the parent/caregiver/legal guardian, please: 1. Read this page carefully, to check you understand your responsibilities under this agreement 2. Sign the appropriate section – Section C ­  on this form 3. Detach and return this form –  Section C only – to the School Office. 4. Keep the document for future reference. I understand that Clevedon School will: ● Do its best to enhance learning through the safe use of ICT. This includes working to restrict access to                                    inappropriate, illegal or harmful material on the Internet or school ICT equipment/devices at school, or                            at school related activities ● Work progressively with children and their families to encourage and develop an understanding of the                            importance of cybersafety through education designed to complement and support the use agreement                        initiative. This includes providing children with strategies to keep themselves safe in cyberspace ● Keep a copy of this signed use agreement on file ● Respond to any breaches in an appropriate manner ● Welcome enquiries from parents or students about cybersafety issues. My responsibilities include: ● I will read this cybersafety use agreement document ● I will discuss the information with my child and explain why it is important ● I will return the signed agreement to the school ● I will support the school’s cybersafety programme by encouraging my child to follow the cybersafety                           
  • 4. rules, and to always ask the teacher if they are unsure about any use of ICT ● I will contact the principal or school cybersafety manager to discuss any questions I might have about                                cybersafety and/or this use agreement and I am welcome to do this at any time. Additional information can be found on the NetSafe website www.netsafe.org.nz/ua IMPORTANT – To be completed and returned to the School Office to enable your child to participate and use ICT at school. I have read this cybersafety use agreement and I am aware of the school’s initiatives to maintain                                a cybersafe learning environment, including my child’s responsibilities. Name of student: ……………………………………………………………………………………………………….. Name of parent/caregiver/legal guardian: ……………………………………………………………………….. Parent’s signature: …………………………………………………………….  Date: ……………………………… Please note: This agreement for your child will remain in force as long as he/she is enrolled at this                                    school. If it becomes necessary to add/amend any information or rule, parents will be advised in                              writing.