ICT Use Agreement

The Melba College Network is provided for staff and students to promote educational excellence by facilitating resource sharing, innovation and communication. All students are given full access to the network with an individual account. Students will also have college-administered individual electronic mail and full Internet access. Any such facilities must be regarded as privileges which may be withdrawn for misuse of the resources.

Computing facilities are provided primarily for the educational benefit of students and the professional development of staff. Any behaviour that interferes with these primary objectives will be considered an infringement of Acceptable Use.


1. General Conditions for Appropriate Use of Computer Facilities
Use of computer/internet resources for educational purposes has priority over other (recreational) uses
Appropriate language must be in all communications including email messages, chat and web pages
No user may deliberately or carelessly waste computer resources (eg unnecessary printing) or disadvantage other users (e.g. by monopolising equipment, network traffic etc.).
Consideration must be given to avoiding inconvenience to other computer users; e.g. use headphones to listen to sound or music; leave computers ready for the next user to log in; leave the computer logged off or at the end of Period 4, shutdown, when they leave; not leave rubbish or paper lying around computers; replace furniture to normal positions when they leave.

2. Computer hardware
Students must not:
Connect any unauthorised device (e.g. a laptop from home) to the network at any time. Any such attempt will be regarded as a violation of network security.
Do anything likely to cause damage to any equipment, whether deliberately or carelessly
Steal equipment
Vandalise equipment (e.g. graffiti)
Mark or deface any equipment
Interfere with networking equipment
Eat or drink near any College owned computer resources
Attempt to repair equipment
Unplug cables or equipment
Move equipment to another place
Remove any covers or panels
Disassemble any equipment
Disable the operation of any equipment
Students must also report other people breaking these rules.

3. Software and operating systems
Students will not:
Change any computer settings (including screen savers, wallpapers, desktops, menus standard document settings etc.) without permission
Bring or download unauthorised programs, including games, to the College or run them on college computers. Online internet games are banned.
Delete, add or alter any configuration files
Copy any copyrighted software to or from any computer, or duplicate such software
Deliberately introduce any virus or program that reduces system security or effectiveness

4. Networks
Network accounts are to be used only by the authorised owner of the account. If students find a computer logged in, they should do nothing in that account except logout. It is the responsibility of students to make backup copies of their work. The College will exercise due care with backups but will not be held responsible for lost data.

Students must not:
Use peer to peer file sharing programs of any type
Attempt to log into the network with any username or password that is not their own, or change any other person’s password
Reveal their password to anyone except the system administrator or classroom teachers, if necessary. Students are responsible for everything done using their accounts, and everything in their home directories. Since passwords must be kept secret, no user may claim that another person entered their home directory and did anything to cause College rules to be broken.
Use or possess any program designed to reduce network security
Enter any other person’s home directory or do anything whatsoever to any other person’s files
Attempt to alter any person’s access rights
Store the following types of files in their home directory
Obscene material – pictures or text
Obscene filenames
Insulting material
Password-protected files
Copyrighted material
Intentionally seek information on, obtain copies of, or modify files, other data or passwords belonging to other users.

5. Printing
Students must minimise printing at all times by print previewing, editing on screen rather than on printouts and spell-checking before printing.
Students must not load paper into printers without permission.

6. Internet usage
Internet access is expensive and has been provided to assist students’ education. Students must use it only with permission, and not in any unauthorised way. It is not intended for entertainment.
Because the Internet is an unsupervised environment, the school has a responsibility to ensure that, as far as possible, material obtained from the Internet is not offensive or inappropriate. To this end, filtering software has been placed on Internet links. In the end, however, it is the responsibility of individual students to ensure their behaviour does not contravene college rules or rules imposed by parents/guardians.
The school is aware that definitions of “offensive” and “inappropriate” will vary considerably between cultures and individuals. The school is also aware that no security system is perfect and that there is always the possibility of inappropriate material, intentionally and unintentionally, being obtained and displayed.

It is the responsibility of the school to:-
provide safe training on the use of the Internet and make that training available to all users
make users aware of the College Acceptable Use Policy
take action to block the display of offensive or inappropriate material where possible.

6.1 Email
Email is a valuable tool for personal and official communication both within the College network and on the Internet. Students and staff are encouraged to use it.
Since students are given free email accounts by the college, no other email accounts may be used at the College. There are accepted practices known as Netiquette which should be followed. The following points should be noted:
Use appropriate language and be polite in your messages. Do not be insulting, abusive, swear or use vulgarities.
Never write hate mail, chain letters, harassment, discriminatory remarks and other antisocial behaviours. Therefore no messages should contain obscene comments, threats, sexually explicit material or expressions of bigotry or hate.
Do not reveal personal addresses or the phone numbers of students or colleagues.
Note that email is not guaranteed to be private. System administrators do have access to all files including mail. Messages relating to illegal activities may be reported to the authorities.

Students will not:
Use real-time chat programs (such as but not limited to MIRC, ICQ, Yahoo Messenger, MSN Messenger, Kik, SnapChat etc.) unless instructed by a teacher
Send offensive mail
send unsolicited mail to multiple recipients (“spam”)
use email for any illegal, immoral or unethical purpose
attempt to disguise their identity or the true origin of their mail
forge header messages or attempt to use any mail server for deceptive purposes
use any mail program designed to send anonymous mail

6.2 The Internet
The College will exercise all care in protecting students from offensive material, but the final responsibility must lie with students in not actively seeking out such material. It is conceivable that, especially for senior students, information is required for curriculum purposes that may appear to contravene the following conditions.

In such cases, it is the responsibility of students and teachers to negotiate the need to access such sites.
Students will not deliberately enter or remain in any site that has any of the following content, unless specifically instructed by a teacher to do so in the context of the curriculum being taught:
Nudity, obscene language or sexual discussion intended to provoke a sexual response, violence, Information on, or encouragement to commit any crime, racism, information on making or using weapons, booby traps, dangerous practical jokes or “revenge” methods and any other material that the student’s parents or guardians have forbidden them to see

If students encounter any such site, they must immediately turn off the computer monitor (not the computer itself) and notify a teacher. They should not show your friends the site first.

Students will not attempt to circumvent the school's content filtering system by any means. This may include, but is not limited to virtual private networks and anonymous proxies. Students viewing blocked sites will be deemed to have deliberately interfered with network security and corresponding sanctions will apply.
The Internet must not be used for commercial purposes or for profit
The Internet must not be used for illegal purposes such as spreading computer viruses or distributing/receiving software that is not in the public domain.
It is inappropriate for students to act as though they intend to break the law e.g. by attempting to guess a password or trying to gain unauthorised access to remote computers. Even if such attempts are not seriously intended to succeed, they will be considered serious offences.

7. Possible sanctions
More than one consequence may apply for a given offence. Serious or repeated offences will result in stronger penalties.
Temporary ban on using computers at school
Restriction or revocation of internet access at school
Restriction of network access
Paying to replace damaged equipment
Removal from classes where computer use is involved
Suspension from College
Authorities may be informed

8. Mobile Devices (iPads and Tablets)

Both at school and at home students must agree to:
Be a safe user whenever and wherever they use mobile device technology
Be responsible whenever and wherever they use a mobile device and support others by being respectful in how they talk to and work or socialise with them, This includes never writing or participating in online bullying (this includes forwarding messages and supporting others in harmful, inappropriate or hurtful online behaviour)
Report to an adult if feeling uncomfortable or unsafe online or witness others participating in unsafe, inappropriate or hurtful online behaviour.
Talk to their teacher or another trusted adult if:
They need help online
Feel that the welfare of other students at the school is being threatened
Come across sites which are not suitable for our school
Someone writes something about a student they don’t like, or makes them or their friends feel uncomfortable.
Someone asks me to provide information that I know is private.

Use the mobile device for learning purposes as directed by my teacher
Act responsibly and not use the device to find, create or send information that might be harmful, inappropriate or hurtful to anyone, including the student themselves.

When using any mobile device as a camera students will:
Only take photos and record sound or video when it is part of a class or lesson
Seek permission from individuals involved before taking photos, recording sound or video of them (including teachers)
Seek written permission from individuals involved before publishing or sending photos, recorded sound or video to anyone else or to any online space
Seek teacher permission before uploading any content to the web – this includes but is not limited to websites, social media, blogs and image or video sharing sites and apps.

8.1 Mobile device management

The College employs a mobile device management (MDM) system to manage the connection and configuration of student iPads.

The MDM can remotely:
Erase all data and settings
Lock device and remove passcode
List configuration profiles
Add or remove configuration profiles
List device information
List network connection information
List installed applications
List and modify device restrictions
List security information
Apply settings
Remove and install applications and data (with instance by instance user approval)

Students will not:
Remove the MDM profile or The Meraki Systems Manager app  or attempt to in any way, alter or change the device connection profile

And as a consequence of removing the Meraki app or configuration profile connectivity to the Melba network will be terminated automatically and immediately. A connection cost may be levied to reinstall this connection profile.

Students are reminded that the MDM is not designed to intrude on privacy and cannot monitor iPad usage beyond that listed above. It does not have the technical capacity to view, record or list any personal or private information. All the functions of the MDM are specifically related to security, connectivity and technical configuration of the device only.

9. Social Media
Refers to all social networking sites
At all times students are expected to show respect to others, including members of the Melba College community. Students are also expected to give due respect to the reputation and good name of Melba College.
When using Social Media, irrespective of their location, students are expected to ensure that they:
Respect the rights and confidentiality of others
Do not impersonate or falsely represent another person
Do not bully, intimidate, abuse, harass or threaten others
Do not make defamatory comments
Do not use offensive or threatening language or resort to personal abuse towards each other or members of the Melba College Community
Do not post content that is hateful, threatening, pornographic or incites violence against others
Do not harm the reputation and good standing of Melba College or those within its community
Do not film, photograph or record members of the School community without express permission of the School or use imagery or recordings (see Section 8 Mobile Devices) without express permission of the above.

10. Copyright
Copyright is the legal means by which authors and other creators control the use of their work. Copyright means that creators have the right to grant or deny permission to others to reproduce their material. Copyright law only applies to something that is in a material form.

Materials that relates to ICT that will be protected by copyright include;

Audio cassette tapes
Cinematographic films
Computer software
Interactive games and interactive films
Magazine articles
MP3 files
Music videos
Newspaper articles
Radio podcasts
Song lyrics
Sound recordings
Television programs
Television vodcasts of free to air TV Broadcasts
Video recordings
Vinyl music or voice recorded on vinyl

Students may not;
Copy any material which is subject to copyright for which they do not own the rights
Store any material which is subject to copyright for which they do not own the rights

Exceptions may apply in some circumstances where either the college or DEECD have licensing agreements with the creators or the work or a portion of it is covered by the Fair Dealing provision of Copyright Act.

Students must seek authorisation from their teacher or the principal or assistant principal prior to copying any matter that is subject to a copyright exception.
Some works may also display a general public or creative commons license with conditions that allow for the copying in part or full of the material, however sometimes attribution will be required.

Once again students must seek authorisation from their teacher or the principal or assistant principal prior to copying any matter that is subject to a general public licence.

11. Use of inbuilt Cameras and imagery

Students will, when using a mobile device or any device capable of capturing images, video or sound, only take photos and record sound or video when it is part of a class or lesson

They must seek permission from individuals involved before taking photos, recording sound or videoing them (including teachers)

They must seek written permission from individuals involved before publishing or sending photos, recorded sound or video to anyone else or to any online space

They must seek teacher permission before uploading any content to websites (e.g. blogs)