Responsible use of technology includes:
1. Respecting and protecting the privacy of others including:
- using only assigned accounts;
- not viewing, using or copying passwords, data, or networks to which they are not authorised, and
- not distributing private information in any form (including through emails, photographs, mobile phones and the internet) about others or themselves.
2. Respecting and protecting the integrity, availability, and security of all electronic resources including:
- Observing all network security practices;
- Not providing their password or access to the College network to another student or anyone outside the College;
- Not destroying or damaging data, networks, or other resources;
- Not installing any software onto the network without authorisation from Techsphere;
- Not creating “peer to peer” networks or sharing their notebook’s resources across the College network without express permission of a teacher or Techsphere;
- Not accessing any proxy sites that attempt to mask or hide their identity or network activity from the College’s network security;
- Not hacking or attempting to gain unauthorised access to files or the network of any organisation or individual.
3. Respecting and protecting the intellectual property of others including:
- Not altering, moving or deleting files belonging to others;
- Not plagiarising, copying or presenting as their own, the work of others;
- Not infringing or violating copyright laws (including copying and transmitting documents, software, music, games and/or video files) without license or permission. Such games or music should be legally acquired. Students may be required to provide software licences or proof of music purchase for any installed items found on their notebook during inspections or servicing.
4. Respecting and practising the principles of the Guidelines for Mutual Respect including:
- Communicating only in ways that are appropriate and respectful. Harassing, insulting, defaming or attacking others through any digital communication amounts to cyber-bullying and is not acceptable;
- Not accessing, downloading, sending or displaying offensive, abusive, racist, pornographic, sexist, obscene language or excessively violent material in any electronic communication;
- Not sending emails that contain information which is abusive, impolite, offensive, defamatory, inaccurate or illegal;
- Not sending spam, chain letters, or other mass unsolicited mailings;
- Not accessing sites, applications or files during class time that are not relevant to the lesson;
- Accessing only appropriate sites. Inappropriate sites include, but are not limited to sites that are illegal, pornographic or contain inappropriate or obscene sexual material, advocate hate/violence, contain discriminatory material or other inappropriate games or software.
5. Storing only up to 1GB of either music and/or games.
If more than this is detected by the College, then the excess may be wiped immediately. Music is to be stored under the “My Music” folder and students are requested to create an accompanying “My Games” folder for the installation of games.
6. Ensuring material on computers is age-appropriate as per the Government classification for movies and games and not engaging in network gaming on the College network unless under the direction of a teacher.
7. Respecting and protecting College equipment including:
- Ensuring the student follows the care and protection instructions for notebooks and other College technology equipment;
- Not deliberately damaging or defacing computer and other technology equipment.
All of these policies and protocols (excluding the 1 GB music/games limit) apply to USB drives, external hard drives and other technology equipment brought into the College or connected to College provided equipment or network.