Table of Contents

1.0       Introduction                                                                                                   

1.1       The Purpose of the Policy

1.2       Scope

1.3       Technologies Covered

1.4       ICT Network – Usage

Confidentiality

Security

Safeguarding Children

Staff – Protect Your Reputation and your Career

1.5       School email and Online Collaboration

Risks attached to the sending of emails

To reduce the risks inherent in the use of email

            To reduce the risks inherent in the use of a ‘Virtual Learning Environment’

1.6       The Use of Other Technologies, including School Phone App & Web2 Applications

1.7       Practical Elements

1.8       Mobile Devices: School owned & Personally owned

1.9       Security

1.10     Netiquette

1.11     Plagiarism

1.12     Personal Safety

1.13     Cyber-bullying

1.14     Violations of the ICT & Social Media Expected Use Policy

 Agreement Form / Summary Points

Latest News

The ezine brings to you a fairly comprehensive loo...
Readers’ & Writers’ Week 2017 Our 11th annual ...
The Christmas Exam Timetables and Block Class Time...
EYP (European Youth Parliament) On 13 - 15 Octobe...
Hope all enjoy the photos of our TY girls and the ...
Thanks to Ms McGettrick for sending us these photo...
On Monday November 20th we have a wonderful speake...
The Parents' Association invite all TY parents to ...
Well, here we are on the eve of Readers' & Wri...
Social media has had a particularly dramatic impa...

We use cookies to improve our website and your experience when using it. Cookies used for the essential operation of this site have already been set. To find out more about the cookies we use and how to delete them, see our privacy policy.

  I accept cookies from this site.