Internet Policy
All students regardless of what year level have access to the computer resources that are available at Â鶹ÃÛÌÒAV.
However before they can access the computer resources available at SPX they must agree to the Acceptable Use Policy for Students and Technology. Each student is entitled to use the resources
for educational purposes only. Users are responsible for their own actions with computer resources. They should be aware that access may be reduced or other consequences applied for any misuse of the computer resources.
Cyber bullying is not acceptable in any form. (See end of document for detailed description of Cyber Bullying.)
It is each user’s responsibility to ensure:
- His password is kept unique and confidential
- That any computer he is using is completely logged off when finished
- A current backup of his own files are maintained (Personal Drive)
- No use is made of programs, simulations or games of a non-educational content (i.e. those not provided by your teacher)
- That he is responsible for the data on his own media (i.e. USB Thumb Drives, CD/DVDÂ ROMs and any other media)
- That the discovery of a virus or any malicious software is reported to the teacher or IT staff immediately
- That they inform teachers or IT staff immediately of any inappropriate files on the network
- He is not in a computer room without supervision
- That he does not take food or drink into any of the computer rooms
- Computer failures are reported to teachers or IT staff
- Printing is not misused and the use of printer paper is kept to a reasonable and responsible level for the completion of stipulated educational activities and, where possible, the paper is recycled
The following activities are not acceptable:
- Cyber Bullying in any form
- Attempts to access, harm, modify or delete the data not belonging to you
- Using another student’s or teacher’s user account, with or without that user’s permission
- Sharing your password with other students
- The changing of another’s password
- Disrupting computer resources through vandalism or electronic means
- Movement of any computer resources without a teacher’s permission
- Contaminating the computer resources with a virus or malicious software
- Transmitting or deliberately accessing data that is threatening, obscene, bigoted, abusive, defamatory, racist, sexist or discriminatory
- Commercial use of the college resources
- Breaching copyright laws (http://www.copyright.org.au)
- Using materials without due acknowledgment
- Gaining access to computer systems that you are not entitled to. (i.e. Hacking)
- Undertaking any other illegal activities as defined under the Australian Commonwealth GovernmentTelecommunications Act 1989
Email Guidelines:
- Email communication can only be initiated by a teacher
- Emails to other teachers or students must relate to school work
Notebook Usage Guidelines:
- School Notebooks should be treated with care, any damages will be the liability of the student (student’s family) and repair charges may be incurred. The Notebook is the property of St. Pius X College
- Students are responsible for getting Notebooks from trolleys and placing them back in the trolleys, ensuring the power cable is plugged in
- The use of Notebooks within particular lessons is at the discretion of the subject teacher
- A student who is allocated a Notebook is responsible for it; they are not to allow any other students to use it
St. Pius X College makes no guarantee of any kind, whether expressed or implied, for the computing services it provides. The College will not be responsible for damages a user suffers, including but not limited to the loss of data.
The provision of computer resources at St. Pius X College is made for the benefit of all. Users identified as being a security risk, who create problems for other users or with the system, as indicated above, will be penalised. The College reserves the right to review any material to determine whether specific uses of resources are appropriate.By signing this policy in you diary you are agreeing to the above rules for the use of technology at Â鶹ÃÛÌÒAV.
Cyber Bullying
The National Crime Prevention Council’s definition of cyber-bullying is “when the Internet, mobile phones or other devices are used to send or post text or images intended to hurt or embarrass another person.
Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e. hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation.
Cyber-bullies may disclose victims’ personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyber bullies may also send threatening and harassing emails and instant messages to the victims, while others post rumours or gossip and instigate others to dislike and gang up on the target.
Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators.
(Information taken from http://www.ncpc.org/topics/cyberbullying/what-is-cyberbullying)