ICT Code of Conduct - Thomas Deacon Academy

Staff ICT Code of Conduct and Acceptable Use Policy

ICT and the related technologies such as e-mail, the internet and mobile devices are an expected part of our daily working life at the Thomas Deacon Academy. This policy is designed to ensure that all staff, casual workers, Board members, volunteers and external partners are aware of their professional responsibilities when using any form of ICT provided by or linked to the Academy. All staff, casual workers, Board members, volunteers and external partners issued with an Academy ICT user account are required to sign the following agreement and adhere to its contents at all times.

Any concerns or clarification of the points below, or suspected breaches of this agreement, should be discussed with the CEO/Principal or Director of Human Resources.

Use of ICT Equipment

  • I will only use the Academy's ICT equipment, e-mail/Internet/VLE/MIS and any related technologies for professional purposes, or for uses deemed reasonable.
  • I will not install any hardware or software on to Academy ICT equipment, or connect any non-Academy-owned equipment without permission of the Academy Network Manager.
  • I will not move or remove any ICT equipment or peripherals within or to/from the Academy without permission of the Academy Network Manager.
  • I understand that any personally-owned ICT equipment (laptops, tablets, mobile phones, and other devices) is brought on to the Academy site at my own risk, and the supervision and security of any equipment is solely my responsibility. The Academy will take no responsibility for the loss or theft of any such item.

Data Security

  • I will comply with ICT system security and password protocols set by the Academy Network Manager.
  • I will not disclose any passwords provided to me by the Academy or other related authorities to any other party.
  • I will not allow any student or other staff member to use a computer logged in to my account.
  • I will only use the approved, secure email system(s) for any Academy business.
  • I will ensure that personal data (e.g. student/staff data held on the VLE, e-Portal or HR systems) is kept secure, is used appropriately, and is not made available to other parties, whether in the Academy or accessed remotely off site.
  • I will only access Academy data via the remote access secure site. I will not remove data or files from Academy premises (via a memory stick/other media) without the permission of the CEO/Principal or Leader of Data Strategy; where permission is given I will ensure any data removed is encrypted.
  • I will not save data or files relating to Academy business on personal ICT equipment. I will ensure that all data or files accessed off-site are saved to my Academy user area via the remote access secure site.
  • I will respect copyright and intellectual property rights.

Communication Etiquette

  • I will ensure that all electronic communications with students, staff, parents and external contacts are compatible with my professional role.
  • I will respect professional and personal etiquette in all electronic communications.
  • I will ensure that any comments about students (such as positive and negative events on TDA ePortal) are factual and non-judgemental, do not mention other students, and contain nothing that I would not be prepared to discuss in person to that student or their parent/carer.
  • I will ensure that my online activity, both in and outside the Academy, will not bring my professional role into disrepute.
  • I will not browse, download, upload or distribute any material that could be considered offensive, illegal or discriminatory. Publication of any material relating to the Academy, its operations, its staff or its students that could be regarded as derogatory, is a disciplinary offence which could lead to dismissal.
  • I will not post comments relating to the Academy, its staff, students or business practices or performance, use its logo, or make comments that appear to be on behalf of the Academy, on my own or other's social media accounts without the approval of the CEO/Principal.

Safeguarding

  • I will support and promote the Academy's Safeguarding Policy and help pupils to be safe and responsible in their use of ICT and related technologies.
  • I will not give out my own personal details, such as mobile phone number and personal email address, to students, or friend them on social networking sites.
  • I will ensure that images of students and/or staff will only be taken, stored and used for professional purposes in line with Academy policy and with written consent of the parent, carer or staff member. I will not distribute images outside the Academy network without the permission of the student's parent/carer or member of staff, and the CEO/Principal.
  • I will support the Academy's approach to online safety and not e-mail, upload or add any images, video , sounds or text to any internal or external site that could upset or offend any member of the Academy community.

Monitoring

I understand that all my use of the Internet and other related technologies can be monitored and logged and can be made available, on request, to the CEO/Principal and/or the Director of Human Resources.

User Declaration

I agree to follow this Code of Conduct and to commit to safe and reputable use of ICT equipment in the course of my professional duties in and outside of the Academy. I understand that violation of this agreement will be investigated and may result in disciplinary action, which could involve sanctions up to and including dismissal.

Student Code of Conduct for ICT

Rationale

It is important to communicate to students simple and clear expectations about appropriate use of the Academy’s computer facilities. The increasing use of ICT in education, training & employment means that students should train themselves in the responsible use of ICT systems.

Guidelines

  1. Network Access Account

    Each student is provided with a unique login name which is password protected. Whilst logged in the student must take precautions that no other person uses their terminal. Each student is responsible for any access to the network using their login name and so must keep their password secret. Any misuse that occurs under a login will result in disciplinary action being taken against that student.

  2. Document Storage

    Each student is provided with enough storage for their coursework. Personal documents including, but not limited to, images, videos, games, audio files etc should not be stored here. Students should practise good housekeeping in order to keep space usage to a minimum. Images within Microsoft Office documents should always be compressed to WEB quality to preserve space. If a student requires additional storage for their coursework they should forward a request to the IT Service Desk with details of which subject and teacher.

  3. Internet

    This is provided as an educational tool for student research. Undesirable sites have mostly been blocked but this is an ongoing process. If one is discovered by accident it must be reported to IT Service Desk who will block it. Any student who knowingly gains access to an undesirable site or bypasses a block to access a site will face disciplinary action.

  4. Computer Games

    There may be times when a teacher will authorise the use of educational games for academic purposes, but besides these occasions no computer game playing is permitted in the Academy. Students found playing computer games will face disciplinary action.

  5. E-mail

    Student e-mail is provided as an aid to learning. Any student who abuses this facility will face disciplinary action.

    • Keep your mailbox tidy. Delete any e-mails and attachments that are no longer required.
    • Make sure that only the intended recipients are present in the To and Cc boxes.
  6. E-mail Abuse

    If received, such e-mails should be reported to a member of staff. Abuse includes:

    • Sending or forwarding e-mails containing libelous, defamatory, offensive, racist or obscene content such as bad language, threats, insults etc. or anything that can be construed as bullying.
    • Sending mass e-mails or forwarding chain letters.
    • Sending games, game links or other inappropriate subject matter.
  7. Password

    Passwords are supplied to enable you to keep your data safe and to protect your reputation. Giving your password to someone else exposes both your data and your reputation to risk. So: protect your password and use passwords that are not easy for others to guess.

  8. Disciplinary Action

    Any abuse of computer facilities will result in a negative event for the student being recorded on ePortal. It may also result in the student having their network account disabled. Serious breaches of this code of conduct could result in more extensive consequences in line with the academy’s Behaviour Management Policy, including the possibility of exclusion from the Academy.