Main Menu

Events Calendar

September 2017 October 2017
Sunday, September 24, 2017
Random Picture (3.jpg)
Su Mo Tu We Th Fr Sa
Week 35 1 2
Week 36 3 4 5 6 7 8 9
Week 37 10 11 12 13 14 15 16
Week 38 17 18 19 20 21 22 23
Week 39 24 25 26 27 28 29 30
Internet Policy Print

ImageBy using School computer equipment (by which we mean PCs, printers, scanners, and anything else generally considered as ‘computer equipment') you are agreeing to this policy. This Usage Policy may be updated at any time. You can find the most recent copy on the School Intranet site (or on the Internet at: http://www.rbai.org.uk/uspol.html). If you break these rules you can expect to receive a ban from using the computer network for a period of time.

1. General Pupil Behaviour

1.1 Main Computer Suites Rules

These rules apply to the four main computer suites within School, located in rooms C5 and S2 in the main school and computer rooms one and two at the Christchurch ICT centre, and also the computers in the library itself.

If you break of any of these rules you will be asked to leave the computer suite and you may also be banned from using any computer suites for a period of time decided by the IT Administrator.

1.1.1 Pupils are expected to behave in a mature manner at all times. In particular, there must be:

1.1.1.1 No shouting;
1.1.1.2 No running;
1.1.1.3 No food or drink consumed;
1.1.1.4 No inappropriate/offensive language or actions.

1.1.2 When entering a computer suite, it is usually acceptable to use any available computer. If there are no available computers, you should check back at a later time. You are not allowed to loiter behind any computer waiting for it to fall vacant.

1.1.3 In general there is no pre-booking system, and computers are issued on a ‘first-come-first-served' basis. If you feel that your work is urgent and you must have access to a computer at a certain time, you may ask the IT Administrator to reserve a computer for your use. However you should note that the IT Administrator may not agree to reserve a computer for you.

1.1.4 Computers may from time-to-time have problems that mean they cannot be used. When this happens, the IT Administrator will put the keyboard behind the computer and switch the computer off. If you see a computer in this state, you should not attempt to use it.

1.1.5 Only one user is permitted to sit at a computer at any one time.

2. General Usage (for all computers)

These rules apply to all computer workstations within the School.

2.1 No personal software should be loaded on School computers (unless instructed otherwise);

2.2 Printers are only to be used for School related material-- not for personal use . Printer usage is recorded and any misuse will be noted and dealt with accordingly.

2.3 Computer equipment must not be physically moved (unless instructed otherwise). In particular,

2.3.1 Monitors should not be adjusted or moved in any way;

2.3.2 Computer base units should not be moved;

2.3.3 Cables around computer equipment should not be handled in any way;

2.3.4 Do not remove any part of the mouse.

2.4 Passwords should not be given to any other user of the system. If you think that another user may known your password, you must change it immediately. If you have forgotten your password, please ask a teacher or the IT Administrator to change it for you.

2.5 Users are not permitted to use the School computer facilities for any of the following:

2.5.1 Any illegal activities;

2.5.2 Viewing or transmitting abusive, offensive or indecent material;

2.5.3 Attempting to gain unauthorised access to School network services or external services, including other network user accounts;

2.5.4 Any deliberate action to annoy other people, including corruption of data and sending of unsolicited email;

2.5.5 Any other activities deemed inappropriate by the IT Administrator.

2.6 The computer workstations in C5 have speakers attached, however these should not be used unless permission is given to use them. Headphones are available (in both C5 and S2) and these should be used instead.

3. Internet and Email Usage

The School provides access to the Internet (in particular, to the World Wide Web and to Email) for all users, however Internet access is strictly bound by the rules laid out in this document. All access to web sites and all emails sent are monitored for breaches of these rules.

3.1 Use of the Internet within School is for educational use only.

3.2 Although we make every effort to ban inappropriate web sites, it is impossible to block all of these sites. Therefore we explicitly ban users to look at any web sites whose primary purpose is to provide non-educational resources. This includes, but is not limited to,

3.2.1 Web sites that are involved in illegal activities;

3.2.2 Music and file-sharing sites;

3.2.3 Chat rooms and discussion groups that are not related to School activities or courses;

3.2.4 Gaming sites.

3.3 Users should not attempt to download high-bandwidth multimedia streams such as video or audio, without the express permission of the IT Administrator, even if the streams are for educational use.

3.4 The School provides every user with an email account that can be used to send and receive email from external sources. However we ask that you follow these rules:

3.4.1 You must not send any inappropriate or illegal email, and you must immediately delete any inappropriate or illegal email that you receive;

3.4.2 You must not send any email to a ‘mailing list', in other words, a list of numerous recipients, unless all of the recipients on that list have given you permission to do so;

3.4.3 You must not send any email in which you attempt to impersonate another user;

3.4.4 You must not attach any harmful files to your emails.

4. Regarding Control of User Data

Much of the data that you send and receive across the School network is logged on the School system. This includes, but is not limited to, web sites you access, emails you send and receive, and programs that you run.

We understand that many users are concerned about privacy, and we do not wish or have any intent to impose on your privacy. However, you should be aware that we will inspect our logs in different ways.

The IT Administrator will, from time to time, process logs and produce reports on general usage data. However all personal information is removed from these reports as they are only used for statistical analysis.

In addition to this, the IT Administrator reserves the right to search through your user data, including your saved documents, Internet History, and any other data contained about you. This will be done only if you are suspected of breaking any of the rules set out above. If it is necessary to inspect your user data for any other reason, the IT Administrator will ask your permission beforehand. You should understand this before using the School computer facilities.