CYBERSAFETY POLICY Future International School has a statutory obligation to maintain a safe physical and emotional environment for the students in its care.In addition we have a responsibility to be a good employer. These responsibilities are increasingly linked to the use of the Internet and Information Communication Technologies (ICT), and a number of related cybersafety issues. The Internet and ICT devices/equipment bring great benefits to the teaching and learning programs, and to the effective operation of the school, and therefore FIS places a high priority on providing the school with Internet facilities and ICT devices/equipment which will benefit student learning outcomes, and the effective operation of the school. However, the School Board recognizes that the presence in the learning environment of these technologies (some provided partly or wholly by the school and some privately owned by staff, students and other members of the school community), can also facilitate anti-social, inappropriate, and even illegal, material and activities. The school has the dual responsibility to maximize the benefits of these technologies, while at the same time to minimize and manage the risks. Therefore: 1. The school recognizes the need for relevant education about cybersafety for the school community, disciplinary responses appropriate to breaches of cybersafety, the availability of appropriate pastoral support, and potential employment issues. owned/leased ICT devices/equipment containing school data/information on or off the school site. 2. Every staff member using ICT equipment in the school is required to sign a Staff Cybersafety agreement. 3. Every student and parent is required to sign a Cyber Safety Agreement (see below). The Cybersafety Agreement guides students in the safe and responsible use of ICT equipment, the internet and e-mail. All students/parents will have a copy of, and understand the ICT Policy prior to signing this document. Dear Student, Read the agreement carefully:  It is to be signed by both the student and the parent  A copy is to be kept by the school  A copy is to be given to the student and parents I promise to do the following: 1. I will not share my login or password details with any other person. I understand that I may lose the right to use a school computer if I break this rule.

2. I will use the ICT equipment at school only for school work. ICT equipment includes: computers, the internet, digital cameras, video cameras, CD and DVD equipment, printers and other electronic equipment used in the school. 3. I will only use the equipment if there is a teacher in the classroom. 4. I will only use e-mail or the internet when a teacher has given permission. 5. I will only go to internet websites as directed by my classroom teacher. 6. I will not give my personal details such as name, address, telephone number or photograph to anyone on e-mail or the internet. 7. I will not give personal details of any other person such as name, address, telephone number or photography to anyone else on e-mail or the internet. 8. I must be sensible when using the Internet and other communication technologies. I know that I must not do anything that would hurt me or anyone else. 9. I will notify the teacher immediately if I accidentally access an inappropriate website or if I feel unsafe 10. I will notify the teacher immediately if there are any problems with the equipment 11. To reduce the likelihood of the spread of viruses I will always check with my teacher before I use a portable file storage device such as flash memory, CD’s or DVD’s I understand that if I break this agreement in any way I may lose the right to use the computer or any electronic equipment at school. I understand that my parents/caregiver will be notified and disciplinary action may be taken against me. The School Cybersafety Agreement is a very important safety tool in this digital age. Both students and parents are asked to sign this policy when entering the school. It is very important not to underestimate the damage misuse of the internet can cause. Please be cautious and monitor your child’s activity of social networking sites. Please be aware that using the internet at home to post pictures of people in school, especially females, without express permission may result in a violation of UAE law. Further, using social networking sites to ridicule or bully someone, even if posted from home, may result in action taken at school if it leads to disruption of the school environment. PARENTS! In this age of communication technology, it is imperative that you monitor your children’s use of digital devices in or to not expose them to harmful influences.

Cyber Safety.pdf

cybersafety issues. The Internet and ICT devices/equipment bring great ... Cyber Safety.pdf. Cyber Safety.pdf. Open. Extract. Open with. Sign In. Main menu.

194KB Sizes 1 Downloads 189 Views

Recommend Documents

Cyber stalking
computer revealed that the laptop had been used to post five of the 18 nude photographs of his ex-wife that ...... Retrieved May 9, 2007, from CrimeLibrary.com.

PA Cyber DPPP.pdf
Examine and apply a decision making process to the development. of short and long-term health goals;. Analyze the interrelationship between environmental factors and. community health;. Assess the personal and legal consequences of unsafe practices i

Cyber-Physical System.pdf
Loading… Page 1. Whoops! There was a problem loading more pages. Cyber-Physical System.pdf. Cyber-Physical System.pdf. Open. Extract. Open with.

pdf cyber crime
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. pdf cyber crime.

Cyber Security Rules.pdf
Page 2 of 2. Page 2 of 2. Cyber Security Rules.pdf. Cyber Security Rules.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Cyber Security Rules.pdf.Missing:

Cyber Security Rules.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

cyber physical system.pdf
Page 1. Whoops! There was a problem loading more pages. cyber physical system.pdf. cyber physical system.pdf. Open. Extract. Open with. Sign In. Main menu.

Knockout by Cyber Strike – Fighting Like It's 1989 - Cyber Magazine
Jul 1, 2017 - successfully destroyed its cyber and networking capabilities, ... Exceptionally strong leadership coupled with a messaging campaign signaling resolve and ... At best, the ... access to servers and routing hardware; preventing “social

Knockout by Cyber Strike – Fighting Like It's 1989 - Cyber Magazine
Jul 1, 2017 - A paralyzing cyber strike will affect all elements of national power. .... Security was a minor concern in the design phase and soon became .... National Research Council (U.S.) et al., Proceedings of a Workshop on Deterring.

Handling Cyber Threats: Ransomware - Snell & Wilmer
Aug 28, 2017 - James P. Melendres is co-chair of the Cybersecurity, Data Protection, and Privacy practice ... intelligence and gain control of systems on the.

PandaLabs Bulletins - RED Team Cyber Security
adding an iframe-type reference pointing to a malicious server. ... don't suspect a thing since the modification is made on the HTML code of the legitimate ... malware captures all types of confidential information (passwords, user names, email.

Cyber Security white paper.pdf
Page 1 of 7. CYBER SECURITY WHITE PAPER. Written for the California Community Colleges Chancellor's Office. August 2015. Page 1 of 7 ...

Proposal Kampung Cyber 4G.pdf
Proposal Kampung Cyber 4G.pdf. Proposal Kampung Cyber 4G.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Proposal Kampung Cyber 4G.pdf.

Cyber Bullying Lesson Plan.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Cyber Bullying ...

Cyber-Sécurité.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Cyber-Sécurité.pdf. Cyber-Sécurité.pdf. Open. Extract. Open with.

Cyber Falls Sinnet Tutorial.pdf
Page 1 of 4. © Todd Mikkelsen, 2015 Paracord 101 Channel, YouTube Page 1. Cyber Falls Sinnet. original design by D.B. Beharry. CLICK HERE to watch Paracord 101's Cyber Falls video. NEEDED MATERIALS: Paracord: Light Green = 5 feet, Purple = 9 feet, L