5.8 NAG 5.8 CyberSafety

P&P No: 5.8

CyberSafety Policy

Rationale

Arahunga has a statutory obligation to maintain a safe physical and emotional environment, and a responsibility to consult within the community. In addition, the Arahunga Board of Trustees has a responsibility to be a good employer.

These three responsibilities are increasingly being linked to the use of the Internet and Information Communication Technologies (ICT), and a number of related issues. The Internet and ICT devices/equipment bring great benefits to the reaching and learning programmes, and to the effective operation of the school.

The Board of Arahunga places a high priority on providing the school with Internet facilities and ICT devices/equipment which will benefit student learning outcomes, and the effective operation of the school. However, the Board recognises that the presence in the learning environment of these technologies, can also facilitate anti-social, inappropriate, and even illegal, material and activities. The school has the dual responsibility to maximise the benefits of these technologies, while at the same time attempting to minimise and manage the risks.

The Board thus acknowledges the need to have in place rigorous and effective school cybersafety practices which are directed and guided by this cybersafety policy.

Policy

Arahunga will develop and maintain rigorous and effective cybersafety practices which aim to maximise the benefits of the Internet and ICT devices/equipment to student learning and to the effective operation of the school, while minimising and managing any risks.

These cybersafety practices will aim to not only maintain a cybersafe environment, but also aim to address the needs of students and other members of the Arahunga community to receive education about the safe and responsible use of present and developing information and communication technologies.

Guidelines

Associated issues Arahunga will address include: the need for on-going funding for cybersafety practices through inclusion in the annual budget, the review of Arahunga’s annual and strategic plan, the deployment of staff, professional development and training, implications for the design and delivery of the curriculum, the need for relevant education about cybersafety, disciplinary responses appropriate to breaches of cybersafety, the availability of appropriate pastoral support, and potential employment issues.

To develop a cybersafe environment, the board will delegate to the Executive Team the responsibility to achieve this goal by developing and implementing the appropriate management procedures, practices, electronic systems and educational programmes.

In recognition of its guardianship and governance role regarding cybersafety, the board will also develop a practice section below relating to board of trustee, staff, and student use of ICT devices/equipment. This will cover all use of Arahunga’s owned/leased and privately owned/ leased ICT devices/equipment containing data/information on or off our sites.

Guidelines regarding cybersafety practices

No individual may use Arahunga Internet facilities and Arahunga owned/leased ICT devices/equipment in any circumstances unless the appropriate use agreement has been signed and returned. Use agreements also apply to the use of privately owned/leased ICT devices/equipment on Arahunga sites, or at/for any Arahunga related activity, regardless of its location. This includes off site access to Arahunga networks from Arahunga sites or privately owned/leased equipment.

Use agreements will cover all board employees, all students (including adult and community), and any other individuals authorised to make use of Arahunga Internet facilities and ICT devices/equipment, such as teacher trainees, external tutors and providers, contractors, and other special visitors to Arahunga.

Use of the Internet and the ICT device/equipment by staff, students and other approved users at Arahunga is to be limited to educational, professional development, and personal usage appropriate in the environment, as defined in individual use agreements.

Signed use agreements will be filed in a secure place, and an appropriate system devised which facilitates confirmation that particular individuals are authorised to make use of the Internet and ICT devices/equipment.

Arahunga has the right to monitor, access and review all use including the WeLearn drive and email address system. This also includes personal emails sent and received on the school’s computer/s and/or network facilities at all times. Arahunga has the right to audit at any time any material on equipment that is owned or leased by Arahunga. The school may also request the NZ police to audit privately owned ICT devices/equipment used on the Arahunga site or at any Arahunga related activity.

Two members of the Executive Team must be present when viewing of a WeLearn account/email contents or an Arahunga owned device/content that has been assigned to a staff member and there always must be reasonable cause for this access.

Issues relating to confidentiality, such as sighting student or staff information, reasons for collecting data and the secure storage of personal details and information (including images) will be subject to the provision of the Privacy Act 1993.

The safety of children is of paramount concern. Any apparent breach of cybersafety will be taken seriously. The response to individual incidents will follow the procedures developed as part of the school’s cybersafety practices. In serious incidents, advice will be sought from an appropriate source, such as the New Zealand School Trustee Association. There will be specific attention paid to the need for specific procedures regarding the gathering of evidence in potentially serious cases. If illegal material or activities are suspected, the matter may need to be reported to the relevant law enforcement agency.

Personal Use of Computers

Personal use which does not incur additional costs for Arahunga is allowed, but staff need to be aware that all Arahunga devices are not considered private and are subject to the above cyber safety policy and guidelines.

Leave a Reply

Your email address will not be published. Required fields are marked *