SlideShare ist ein Scribd-Unternehmen logo
1 von 1
SECTION B
RULES TO HELP KEEP COCKLE BAY SCHOOL STUDENTS
YEAR 3 – 6 CYBERSAFE
Parents, please talk about these rules with your child.
These rules will help us to stay safe when using ICT at school:
1. I cannot use school ICT equipment until my parent(s) and I have signed my use agreement form and
the completed form has been returned to school.
2. I can only use the computers and other school ICT equipment for my schoolwork.
3. If I am unsure whether I am allowed to do something involving ICT, I will ask the teacher first.
4. I will not allow anyone else to use my user name and will not tell anyone else my password.
5. I can only access the Internet at school when a teacher gives permission and an adult is present.
6. I understand that I must not, at any time, use the Internet, email, mobile phones or any ICT
equipment to be mean, rude, offensive, or to bully, harass, or in any way harm anyone else
connected to our school, or the school itself, even if it is meant as a ‘joke’.
7. While at school, I will not:
• Attempt to search for things online I know are not acceptable at our school. This could
include anything that is rude or violent or uses unacceptable language such as swearing
• Make any attempt to get around, or bypass, security, monitoring and filtering that is in place
at our school.
2. If I find anything mean or rude or things I know are not acceptable at our school on any ICT, I will:
• Not show others
• Get a teacher straight away.
3. I understand that I must not download or copy any files such as music, videos, games or programmes
without the permission of a teacher.
4. I must have a letter from home and permission from school before I bring any ICT equipment/device
from home. This includes things like mobile phones, iPods, games, cameras, and USB drives.
5. I will not connect any device (such as a USB drive, camera or phone) to school ICT or run any
software, without a teacher’s permission. This includes all wireless technologies.
6. The school cybersafety rules also apply to mobile phones.
7. I will ask my teacher’s permission before giving out my own personal information online. I will get
permission from my teacher and the person involved before putting anyone else’s information online .
Personal Information includes:
• Name
• Address
• Email address
• Phone numbers
• Photos.
8. I will respect all school lCT and will treat all ICT equipment/devices with care. This includes:
• Not attempting to hack or gain unauthorised access to any system
• Not joining in if other students choose to be irresponsible with ICT
• Reporting any breakages/damage to a staff member.
I understand that if I break these rules, the school may need to inform my parents. In serious cases the
school may take disciplinary action against me. I also understand that my family may be charged for
repair costs
/home/pptfactory/temp/20101102010018/cybersafetyrules2010year3-6-101101200012-phpapp02.doc

Weitere ähnliche Inhalte

Was ist angesagt?

Williamsburg school internet policy
Williamsburg school internet policyWilliamsburg school internet policy
Williamsburg school internet policy
dsansford
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
Koolteechatechnology
 
Aup lesson for vll students
Aup lesson for vll studentsAup lesson for vll students
Aup lesson for vll students
dlwadsworth
 
Tan, Julius Peter Edtech2 Assignment Chapter 8
Tan, Julius Peter Edtech2 Assignment Chapter 8Tan, Julius Peter Edtech2 Assignment Chapter 8
Tan, Julius Peter Edtech2 Assignment Chapter 8
Jaypee Tan
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
Linda Long
 

Was ist angesagt? (20)

Williamsburg school internet policy
Williamsburg school internet policyWilliamsburg school internet policy
Williamsburg school internet policy
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
Aup lesson for vll students
Aup lesson for vll studentsAup lesson for vll students
Aup lesson for vll students
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Introduction to wikispaces
Introduction to wikispacesIntroduction to wikispaces
Introduction to wikispaces
 
Family online-safety-contract
Family online-safety-contractFamily online-safety-contract
Family online-safety-contract
 
Internet publication
Internet publicationInternet publication
Internet publication
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Aup ppt
Aup pptAup ppt
Aup ppt
 
Technology acceptable use policy gr 7 day 1
Technology acceptable use policy   gr 7 day 1Technology acceptable use policy   gr 7 day 1
Technology acceptable use policy gr 7 day 1
 
Internet access for students should be limited
Internet access for students should be limitedInternet access for students should be limited
Internet access for students should be limited
 
Legalissues
LegalissuesLegalissues
Legalissues
 
116
116116
116
 
Module 12 PLN Reflection
Module 12 PLN ReflectionModule 12 PLN Reflection
Module 12 PLN Reflection
 
Tan, Julius Peter Edtech2 Assignment Chapter 8
Tan, Julius Peter Edtech2 Assignment Chapter 8Tan, Julius Peter Edtech2 Assignment Chapter 8
Tan, Julius Peter Edtech2 Assignment Chapter 8
 
SID Croatia
SID CroatiaSID Croatia
SID Croatia
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008
 
Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)
 

Andere mochten auch

The Unprecedented Rosetta mission to Comet 67P/Churyumov–Gerasimenko
The Unprecedented Rosetta mission to Comet 67P/Churyumov–GerasimenkoThe Unprecedented Rosetta mission to Comet 67P/Churyumov–Gerasimenko
The Unprecedented Rosetta mission to Comet 67P/Churyumov–Gerasimenko
Thomas Madigan
 
L28 essay structure and exam question
L28 essay structure and exam questionL28 essay structure and exam question
L28 essay structure and exam question
Zoe Lorenz
 
The Blue Print and Beyond- Creating and Executing a Successful Marketing Plan
The Blue Print and Beyond- Creating and Executing a Successful Marketing Plan The Blue Print and Beyond- Creating and Executing a Successful Marketing Plan
The Blue Print and Beyond- Creating and Executing a Successful Marketing Plan
wangell
 
Balvor Convevo - Is Facebook and text marketing right for your convenience s...
Balvor Convevo - Is Facebook and text marketing right for your convenience  s...Balvor Convevo - Is Facebook and text marketing right for your convenience  s...
Balvor Convevo - Is Facebook and text marketing right for your convenience s...
Balvor LLC
 
Sose presentation wk1 anzac day
Sose presentation wk1   anzac daySose presentation wk1   anzac day
Sose presentation wk1 anzac day
mrswato
 
Implementing an e-portfolio
Implementing an e-portfolioImplementing an e-portfolio
Implementing an e-portfolio
gedoyle
 
Ws 420 women and religion
Ws 420 women and religionWs 420 women and religion
Ws 420 women and religion
hellingar
 
Kelas kemampuan lahan
Kelas kemampuan lahanKelas kemampuan lahan
Kelas kemampuan lahan
Rosmalia Eva
 

Andere mochten auch (20)

Manual basico pellecier
Manual basico pellecierManual basico pellecier
Manual basico pellecier
 
The Unprecedented Rosetta mission to Comet 67P/Churyumov–Gerasimenko
The Unprecedented Rosetta mission to Comet 67P/Churyumov–GerasimenkoThe Unprecedented Rosetta mission to Comet 67P/Churyumov–Gerasimenko
The Unprecedented Rosetta mission to Comet 67P/Churyumov–Gerasimenko
 
Mummification
MummificationMummification
Mummification
 
Keys To Growing Foodservice Profitably
Keys To Growing Foodservice ProfitablyKeys To Growing Foodservice Profitably
Keys To Growing Foodservice Profitably
 
Tage wie diese für juli
Tage wie diese für juliTage wie diese für juli
Tage wie diese für juli
 
L28 essay structure and exam question
L28 essay structure and exam questionL28 essay structure and exam question
L28 essay structure and exam question
 
The Blue Print and Beyond- Creating and Executing a Successful Marketing Plan
The Blue Print and Beyond- Creating and Executing a Successful Marketing Plan The Blue Print and Beyond- Creating and Executing a Successful Marketing Plan
The Blue Print and Beyond- Creating and Executing a Successful Marketing Plan
 
Programma dei corsi per operatori Expo 2015, 2a edizione
Programma dei corsi per operatori Expo 2015, 2a edizioneProgramma dei corsi per operatori Expo 2015, 2a edizione
Programma dei corsi per operatori Expo 2015, 2a edizione
 
Federalist Papers No 37, Proper Form of Government
Federalist Papers No 37, Proper Form of GovernmentFederalist Papers No 37, Proper Form of Government
Federalist Papers No 37, Proper Form of Government
 
Regional Patient Transport Network
Regional Patient Transport NetworkRegional Patient Transport Network
Regional Patient Transport Network
 
Balvor Convevo - Is Facebook and text marketing right for your convenience s...
Balvor Convevo - Is Facebook and text marketing right for your convenience  s...Balvor Convevo - Is Facebook and text marketing right for your convenience  s...
Balvor Convevo - Is Facebook and text marketing right for your convenience s...
 
Sose presentation wk1 anzac day
Sose presentation wk1   anzac daySose presentation wk1   anzac day
Sose presentation wk1 anzac day
 
Lettera presentazione indagine autonomia
Lettera presentazione indagine autonomiaLettera presentazione indagine autonomia
Lettera presentazione indagine autonomia
 
Jeffrey Baczynski-Jessica_Peters
Jeffrey Baczynski-Jessica_PetersJeffrey Baczynski-Jessica_Peters
Jeffrey Baczynski-Jessica_Peters
 
Programas misioneros
Programas misionerosProgramas misioneros
Programas misioneros
 
Implementing an e-portfolio
Implementing an e-portfolioImplementing an e-portfolio
Implementing an e-portfolio
 
Ws 420 women and religion
Ws 420 women and religionWs 420 women and religion
Ws 420 women and religion
 
2010 cobourg police annual report
2010 cobourg police annual report2010 cobourg police annual report
2010 cobourg police annual report
 
Good Learner Experiences in the library
Good Learner Experiences in the libraryGood Learner Experiences in the library
Good Learner Experiences in the library
 
Kelas kemampuan lahan
Kelas kemampuan lahanKelas kemampuan lahan
Kelas kemampuan lahan
 

Ähnlich wie Cybersafety rules 2010 years 3 to 6

Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conduct
supunls
 
Hota byod bring your own device letter
Hota byod bring your own device letterHota byod bring your own device letter
Hota byod bring your own device letter
kgrosvenor
 
Digital citizenship contract
Digital citizenship contractDigital citizenship contract
Digital citizenship contract
Claire Amos
 
Senior student e learning agreements for home
Senior student e learning agreements for homeSenior student e learning agreements for home
Senior student e learning agreements for home
Emma Watts
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
Debbie Oliver
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
juliewltn
 
Internet Contract
Internet ContractInternet Contract
Internet Contract
yasha15
 
Computer guide lines by ict group
Computer guide lines by ict groupComputer guide lines by ict group
Computer guide lines by ict group
hilladmin
 
Bs rua
Bs ruaBs rua
Bs rua
Ross
 
Social media policy
Social media policySocial media policy
Social media policy
Har1982
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
jsmarr11
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3
bweinert
 

Ähnlich wie Cybersafety rules 2010 years 3 to 6 (20)

Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conduct
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
Hota byod bring your own device letter
Hota byod bring your own device letterHota byod bring your own device letter
Hota byod bring your own device letter
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
Digital citizenship contract
Digital citizenship contractDigital citizenship contract
Digital citizenship contract
 
Acceptable Use Agreement Students 2011
Acceptable Use Agreement Students 2011Acceptable Use Agreement Students 2011
Acceptable Use Agreement Students 2011
 
Senior student e learning agreements for home
Senior student e learning agreements for homeSenior student e learning agreements for home
Senior student e learning agreements for home
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Internet Contract
Internet ContractInternet Contract
Internet Contract
 
Computer guide lines by ict group
Computer guide lines by ict groupComputer guide lines by ict group
Computer guide lines by ict group
 
Bs rua
Bs ruaBs rua
Bs rua
 
Social media policy
Social media policySocial media policy
Social media policy
 
CES BYOT Agreement
CES BYOT AgreementCES BYOT Agreement
CES BYOT Agreement
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3
 

Mehr von RochelleStansfield

Mehr von RochelleStansfield (7)

Teri feedback
Teri feedbackTeri feedback
Teri feedback
 
Feedback from kathy currey
Feedback from kathy curreyFeedback from kathy currey
Feedback from kathy currey
 
A blast from the past planning example
A blast from the past planning exampleA blast from the past planning example
A blast from the past planning example
 
CBS school curriculum 1
CBS school curriculum 1CBS school curriculum 1
CBS school curriculum 1
 
Cbs curriculum
Cbs curriculumCbs curriculum
Cbs curriculum
 
CBS ICT Goals 2010
CBS ICT Goals 2010CBS ICT Goals 2010
CBS ICT Goals 2010
 
PMI for CBS Inquiry Model
PMI for CBS Inquiry ModelPMI for CBS Inquiry Model
PMI for CBS Inquiry Model
 

Kürzlich hochgeladen

Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
seri bangash
 

Kürzlich hochgeladen (20)

Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptxBlinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
 
The Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfThe Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdf
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
 
HAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future ProspectsHAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future Prospects
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024
 
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement CriteriaSedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
 
wagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORIwagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORI
 
hyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statementshyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statements
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfبروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
 
Aptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdfAptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdf
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)
 
WAM Corporate Presentation May 2024_w.pdf
WAM Corporate Presentation May 2024_w.pdfWAM Corporate Presentation May 2024_w.pdf
WAM Corporate Presentation May 2024_w.pdf
 
stock price prediction using machine learning
stock price prediction using machine learningstock price prediction using machine learning
stock price prediction using machine learning
 
Powers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdfPowers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdf
 
Creative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsCreative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team Presentations
 
Potato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdfPotato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdf
 
Your Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptxYour Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptx
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & Transformations
 

Cybersafety rules 2010 years 3 to 6

  • 1. SECTION B RULES TO HELP KEEP COCKLE BAY SCHOOL STUDENTS YEAR 3 – 6 CYBERSAFE Parents, please talk about these rules with your child. These rules will help us to stay safe when using ICT at school: 1. I cannot use school ICT equipment until my parent(s) and I have signed my use agreement form and the completed form has been returned to school. 2. I can only use the computers and other school ICT equipment for my schoolwork. 3. If I am unsure whether I am allowed to do something involving ICT, I will ask the teacher first. 4. I will not allow anyone else to use my user name and will not tell anyone else my password. 5. I can only access the Internet at school when a teacher gives permission and an adult is present. 6. I understand that I must not, at any time, use the Internet, email, mobile phones or any ICT equipment to be mean, rude, offensive, or to bully, harass, or in any way harm anyone else connected to our school, or the school itself, even if it is meant as a ‘joke’. 7. While at school, I will not: • Attempt to search for things online I know are not acceptable at our school. This could include anything that is rude or violent or uses unacceptable language such as swearing • Make any attempt to get around, or bypass, security, monitoring and filtering that is in place at our school. 2. If I find anything mean or rude or things I know are not acceptable at our school on any ICT, I will: • Not show others • Get a teacher straight away. 3. I understand that I must not download or copy any files such as music, videos, games or programmes without the permission of a teacher. 4. I must have a letter from home and permission from school before I bring any ICT equipment/device from home. This includes things like mobile phones, iPods, games, cameras, and USB drives. 5. I will not connect any device (such as a USB drive, camera or phone) to school ICT or run any software, without a teacher’s permission. This includes all wireless technologies. 6. The school cybersafety rules also apply to mobile phones. 7. I will ask my teacher’s permission before giving out my own personal information online. I will get permission from my teacher and the person involved before putting anyone else’s information online . Personal Information includes: • Name • Address • Email address • Phone numbers • Photos. 8. I will respect all school lCT and will treat all ICT equipment/devices with care. This includes: • Not attempting to hack or gain unauthorised access to any system • Not joining in if other students choose to be irresponsible with ICT • Reporting any breakages/damage to a staff member. I understand that if I break these rules, the school may need to inform my parents. In serious cases the school may take disciplinary action against me. I also understand that my family may be charged for repair costs /home/pptfactory/temp/20101102010018/cybersafetyrules2010year3-6-101101200012-phpapp02.doc