St Joseph’s College
Hunters Hill
ON-LINE ACCESS: RULES AND TECHNOLOGY NETWORK RESPONSIBILITIES
The College offers students the opportunity to access the Internet and other on-line services as part of the College Curriculum.
The following guidelines will also apply to all students accessing resources through the College’s on-line network:
- Students must have written permission from a Parent/Guardian to access the College network.
- By selecting “OK” during your log in you are accepting this agreement.
- Network storage and e-mail are areas that will be treated like school lockers. Network administrators may review files and communications to maintain system integrity and ensure that students are using the system responsibly. Students should not expect that files stored on the College’s computer services will always be private. The College reserves the right under “Duty of Care” to access files and mail as the Head of ICT deems necessary.
- Quite specifically, the following actions are not permitted:
- Sending or displaying offensive messages or pictures;
- Using obscene language;
- Sending full school or large group e-mails;
- Harassing or insulting others;
- Damaging computers, computer systems or computer networks (eg by creating, introduction or spreading of computer viruses, Trojans, physically abusing hardware, altering source codes or software settings, etc);
- Violating copyright laws. The legal rights of software producers and network providers, and copyright and license agreements must be honoured (eg downloading copyrighted games, videos or music files could result in legal proceedings, resulting in a fine);
- Using other users’ ID and passwords;
- Supplying your Username and password to others;
- Trespassing in others’ folders, work or files;
- Intentionally wasting resources, e.g. playing games rather than using the system for educational purposes;
- Using the network for discussion about or supply of prohibited substances such as Drugs and Alcohol.
- Employing the network for commercial purposes or activities by for-profit institutions or organisations, product advertisement or political lobbying is prohibited;
- Using the network to disrupt use by other individuals or by connecting networks.
- Students must respect others’ privacy and academic property.
- Each student wishing to use the network will be issued with an account which can be used to access on-line information services. Each account owner is responsible for all activity under that account.
- It is the student’s responsibility that his password is kept secure at all times. If the individual’s account is used by others, the student must accept responsibility for its use. Students must “LOG OFF” at the conclusion of a lesson. Failure to do this may leave the student liable if an account is misused.
- Cyber-bullying: Harassment or cyber-stalking via SMS messages, mass emailing, chartrooms, blogs and message boards will not be tolerated and must be reported to the Head of ICT immediately. Acts of cyber bullying by students upon students outside school hours should also be reported immediately.
- Transition of any material / e-mails in violation of any State, Federal or international regulation is prohibited. This includes, but is not limited to: copyrighted material, threatening, harassing or obscene material, pornographic material, or material protected by trade secret.
10. All communication and information accessible via the network should be assumed to be private property. Any sources used in research must be cited and credit given to the author.
- Laptop Use
- Privately owned laptops and Portable Access devices e.g. I-Touches etc maybe connected to the College network.
- All Boarders have full access to the network on College computers in the boarding areas as well as the College wireless network
- In the boarding school privately owned laptops or PCs remain the sole responsibility of the student and will only have limited access to the College network. Specified data ports within the boarding school will be allocated.
- Supervision and random audit of student owned laptop/PC is expected to fulfil our Duty of Care. The College reserves the right to remove any laptop/PC for the purpose of inspection with the full knowledge of student(s) concerned and Head of Boarding.
12. Security problems must be brought to the immediate attention of the Head of ICT. The problem must not be demonstrated to other users.
13. The running (executing) of programs including illegal use of “command prompt” on the system that have not been sanctioned by the Head of ICT will be deemed illegal and appropriate action taken.
14. Assessments – students should be aware that the failure by electronic means (either by e-mail, disc or any type of transferring device) to hand in assessment items by the due date will be treated in the same manner as failure to submit an assessment on time. Failure of hardware or software will not be deemed as an acceptable reason for late submissions of an Assessment Task. It is the students’ responsibility to back up their work electronically or in hard copy form.
15. E-mail is provided by the College for College use. The College understands that personal e-mails are sometimes received. Students should be aware that at times e-mail is checked to make sure that system integrity and College Policies are maintained. Therefore e-mails should never be looked upon as being secure.
16. Vandalism will result in cancellation of privileges. Vandalism is defined as any malicious attempt to access, change or destroy data of another user, the Internet or any of the above listed agencies. This includes, but is not limited to, the uploading or creating of computer viruses or Trojans. Hardware & software vandalism will result in students having to pay all costs to repair damage including any labour charges.
Mr Gary Evans
HEAD OF INFORMATION & COMMUNICATION TECHNOLOGY
ST JOSEPHS COLLEGE
HUNTERS HILL NSW 2110