1. Legal Requirements and Terminology

2. Introduction

3. Significance of ICT

4. The School’s Aim for ICT

5. The School’s Curriculum Organization

6. Curriculum Management

7. Access to ICT

8. Monitoring and Review

9. Health and Safety/Security

10. Cyber Crimes

10.1. Definition

10.2. Unauthorised Access to, Interception of

or Interference With Data

10.3. Computer Related Extortion, Fraud and Forgery

10.4. Attempting, Aiding and Abetting

10.5. Prohibited Software

11. Password Construction and Management

12. Internet Usage

13. Email Usage

13.1. Legal Recognition of Electronic Data Messages

13.2. Intercepting

13.3. Hoaxes, Spam and Phishing

13.3.1. Hoaxes

13.3.2. Spoofing or Phishing

14. Virus Management

15. Printing

16. Physical Computer Security

17. ICT Room (computer room) Rules

18. Backup Systems

19. Software Licensing and Piracy

20. Social Engineering

21. Intellectual Property

22. Incident Reporting

1. Legal Requirements, Definitions and Terminology
This document serves to ensure the protection of Greyville Primary and all users making use of the Greyville Primary School Information and Communication facilities.
It is imperative that all users familiarize themselves with the contents of this document.

Abbreviations and terminology used in this document:
- ECT Act: Electronic Communications and Transactions Act.
- GPS: Greyville Primary School
- GPSICT Policy: Greyville Primary School Information and Communications Technology Policy (this document).
- SGB: School Governing Body
- Users: All Greyville Primary School staff, pupils and SGB.
- GPS Network: Greyville Primary School collection of network computers.

2. Introduction

This policy document sets out the school’s aim, principles and strategies for the delivery of Information and Communication Technology. It will form the basis for the development of ICT in the school. This policy was developed in the first term of 2007 by the ICT portfolio members chaired by the ICT coordinator. It was formally adopted at a SGB meeting on the _15th of March 2007_

3. Significance of ICT

ICT prepares pupils to participate in a rapidly changing world in which work and other activities are increasingly transformed by access to varied and developing technology. Pupils use ICT tools to find, explore, analyse, exchange and present information responsibly, creatively and with discrimination. They learn how to employ ICT to enable rapid access to ideas and experiences from a wide range of people, communities and cultures. Increased capability in the use of ICT promotes initiative and independent learning; with pupils being able to make informed judgements about when and where to use ICT to best effect, and consider its implications for home and work both now and in the future. We interpret the term “information communication technology” to include the use of any equipment which allows users to communicate or manipulate information (in the broadest sense of the word) electronically.

4. The School’s Aim for ICT

The overall aim for ICT is to enrich learning for all pupils and to ensure that teachers develop confidence and competence to use ICT in the effective teaching of their subjects. ICT offers opportunities for pupils to:

- Develop their ICT capability and understand the importance of information and how to select and prepare it.

- Develop their skills in using hardware and software so as to enable them to manipulate information.

- Develop their ability to apply ICT capability and ICT to support their use of language and communication.

- Explore their attitudes towards ICT, its value for themselves, others and society, and their awareness of its advantages and limitations.

- Develop good Health and Safety attitudes and practice.

5. The School’s curriculum organization

Each class is allocated a time in the ICT room (computer room) to accomplish their ICT scheme of work. This scheme is integrated to ensure that delivery of ICT is linked to subjects and takes on board the statutory requirements of other national curriculum subjects. Each class may also be allocated additional time in the ICT room to apply the use of ICT to other subject areas.Educators should encourage research and allow for the creative use of ICT in subjects.

Each class is split into groups. Each group is taught the relevant skills appropriate to their ability. These sessions should be delivered weekly and the contexts/activities will change for the different Groups but the ICT objectives will remain the same, thus accomplishing the ICT scheme of work units. This scheme is integrated to ensure that delivery of ICT is linked to subjects and takes on board the statutory requirements of other national curriculum subjects.

6. Curriculum management
The subject leader will facilitate the use of ICT in the following ways:
- By updating the policy and scheme of work;
- By ordering/updating resources;
- By providing INSET so that all staff are confident in how to teach the subject and have sufficient subject knowledge;
- To keep staff abreast of new developments;
- By taking an overview of whole school planning to ensure that opportunities occur for pupils to develop an ICT capability and that progression is taking place;
- By supporting staff in developing pupils’ capabilities;
- By attending appropriate courses to update knowledge of current developments, and by keeping links with the ICT portfolio members;
- By management of the technician if available and communication of problems to the ICT portfolio members.
- Making sure all staff understand system for logging faults and use of the internet/email;
- Monitoring the curriculum;
- Maintaining records of software licences and their deployment;

7. Access to ICT

The school has an ICT room (computer room) which is timetabled for classes throughout the week. All computers will be equipped with hard disks on which a suite of core software is installed to enable functionality. All pupils, regardless of race or gender, shall have the opportunity to develop ICT capability. The school will promote equal opportunities for computer usage and fairness of distribution of ICT resources. Children with a computer at home are encouraged to use it for educational benefit and parents are offered advice about what is appropriate. Efforts are made to ensure that text created at home can be transferred to a classroom computer once a teacher has been notified. The school will monitor the level of access to computers in the home environment to ensure no pupils are unduly disadvantaged.(Groupings for computer usage should generally follow the same pattern as for all lessons. It is appropriate to match pairs of equal ability, rather than have a more able ICT users always guide a less able pupil. (This generally leads to passivity and dominance.) Positive images of computer use by people of both sexes will be promoted.

8. Monitoring and review
Monitoring is carried out by the head teacher (member of senior management) and the ICT co-ordinator, in the following ways:
- Informal discussion with staff and pupils
- Observation of ICT displays
- Collection of class ICT files
- Looking at the work in their individual paper files or notebooks
- Classroom observation
There is an annual review of this policy by the ICT co-ordinator.
A major review involving all staff will take place every three years.

9. Health and Safety/Security
Before being allowed to work in the ICT room (computer room) all children are made aware of the arrangements if they hear the file alarm. A copy of the evacuation route and location of fire extinguishers can be found on the wall of the ICT room. All fire safety equipment must be serviced regularly.

Children will also be made aware of the correct way to sit when using the computer and the need to take regular breaks if they are to spend any length of time on the computers. Computer Room Rules are also on display within the ICT room for reference along with the specific rules for the use of Internet and E-mail.
Computers and televisions/videos are covered at night and are either stored in cupboards or locked away in the designated areas. The school has an alarm system installed throughout.

GPS has the following structures in place:
* Username and password
Your username and password is the unique combination entered to allow you access to the network, your personal folder, and general data folders.
Please note that your user credentials allow access to information that is confidential, so please take care that you keep your password secret and not easy to guess.
* Anti-virus system
Anti-virus systems are set up on all desktop and server computers to safeguard data against unauthorised access or damage.

10. Cyber Crimes
The following was taken from the Electronic Communications and Transactions Bill of South Africa:

10.1. Definition
Cyber crimes are committed when the actions of a person who, after taking note of any data, becomes aware of the fact that he or she is not authorised to access that data, and still continues to access that data.

10.2. Unauthorized access to, interception of or interference with data
According to the Interception and Monitoring Prohibition Act, 1992 (Act No. 127 of 1992), a person is guilty of an offence when:
· He or she intentionally accesses or intercepts any data without authority or permission to do so,
· A person who intentionally and without authority to do so, interferes with data in a way which causes such data to be modified, destroyed or otherwise rendered ineffective,
· A person unlawfully produces, sells, offers to sell, procures for use, designs, adapts for use, distributes or possesses any device, including a computer program, which is designed primarily to overcome security measures for the protection of data, or performs any of these acts with regard to a password, access code or any other similar kind of data with the intent to unlawfully utilize such item to contravene this section,
· A person who utilizes any device or computer programme in order to unlawfully overcome security measures designed to protect such data or access thereto,
· A person who commits any action described in this section with the intent to unlawfully interfere with access to an information system so as to constitute a denial, including a partial denial, of service to legitimate users is guilty of an offence.

10.3. Computer related extortion, fraud and forgery
A person who performs any of the acts described in section 10.2 for the purpose of obtaining any unlawful advantage by causing fake data to be produced with the intent that it be considered or acted upon as if it were authentic, is guilty of an offence.

10.4. Attempting, aiding and abetting
Any person who aids and abets someone to commit any of the offences referred to in the sections above is guilty of an offence and is liable on conviction.

10.5. Prohibited software
The storage or usage of hacking or cracking software on the GPS network is strictly prohibited.

11. Password Construction and Management
According to policy applied from the Domain Controller, passwords must have at least 4 characters, and users will have to swap between 3 passwords.
Due to the nature of illegal processes used to gain to resources, it is also recommended that Passwords be handled in the following way;
- Passwords should contain one or more capital letters;
- Passwords should contain one or more numerical letters;
- Passwords should be non-dictionary words.
- Passwords must be kept confidential.

12. Internet Usage
The use of GPSICT facilities for Internet browsing is not prohibited, but the privilege may be revoked if misused. Misuse may include:
- Browsing of inappropriate sites (sites that contain hacking, pornographic, racially discriminating, sexually discriminating or generally offensive materials);
- Using the internet to promote personal business or financial gain;
- Downloading unnecessary materials can cause restrictions on bandwidth availability, so please use sparingly.
When downloading information, please be aware not to infringe on the copyright of the downloaded materials.

13. Email Usage
GPS does not provide email facilities for pupils. All persons who access third party email websites should keep the following in mind.

13.1. Legal recognition of electronic data messages
The law states that information has legal force and effect if it is wholly or partly in the form of a data message. This means that email must be handled in the same manner as any other legal document. According to the law, an email containing an expression of intent or other statement and does NOT have an electronic signature, Does have legal force and effect.GPS can therefore not accept any responsibility for third part emails sent from users; Users will be held accountable for their actions.

13.2. Intercepting
The intercepting of emails is in breach of the ECT act and is punishable by law. This includes using the username other than your own to access information that was not intended for, or authorised for access by you.

13.3. Hoaxes and Phishing
Hoaxes, Spam and Phishing are some of the systems used to damage network systems or access confidential information unlawfully.

13.3.1. Hoaxes
A good example of a hoax is the jdbgmgr hoax. The user would receive an an email which tries to encourage you to delete a legitimate Windows file called Jdbgmgr.exe from your computer. Jdbgmgr.exe is the file to which the hoax refers, and it is the Microsoft Debugger Registrar for Java, and is installed when you install Windows. You are not allowed to delete files from your system. Viruses are written in such a way that the damage will be done automatically; you will not have to help it along.

13.3.2. Spoofing or Phishing
Spoofing or Phishing are the terms used when hackers imitate email and websites of legitimate companies to entice people to share confidential info like passwords or credit card numbers. Please be very careful when responding to websites or emails requesting personal information; a phone call to confirm the process with the organization could prevent a loss of information or money.

14. Virus Management
As a user of the GPSICT facilities, please ensure that any personal data or media opened are clean from viruses by using the Anti-Virus scanning software available on all computers.

15. Printing
Please ensure that only necessary printing is done, as printing costs are very high. If the document can be distributed electronically instead of a hard copy, please make use of the electronic option.Permission to print must be obtained from the teacher or staff member overseeing the ICT Portfolio.

16. Physical Computer Security
To ensure the safety of GPS computer assets, no computer equipment may be moved or removed. Only members of the IT department are allowed to move computer equipment.

17. ICT Room (computer room) Rules
All pupils must be accompanied by a teacher if they are to make use of any computer systems. The use of stiffy disks or flash disks are to be used for personal data transfer only and this privilege can be revoked at any time.Eating, drinking and smoking is strictly prohibited in the ICT Room (computer room) and while working with any other ICT equipment. This access privilege will be revoked should pupils behave inappropriately in the ICT Room.
The ICT room is off limits to pupils during exam time. Playing of any physical games in the ICT Room is prohibited.

18. Backup Systems
All data on the fileserver and application server are backed up as regularly as possible. Data on local hard drives will not be backed up because of the tremendous administrative overhead associated with the process. Your folder size on the fileserver has a set limit, as it needs to be backed up regularly. If you copy data that is located on the server to your personal folder, for example photos, that is then backed up twice, which takes up unnecessary backup disk space.

19. Software Licensing and Piracy
All software loaded on the GPSICT equipment must be licensed and the original installation media must be used for the installation of the software. Software must be installed by IT experienced personal only, as tracking must be kept on all licensing and effects of the software on the GPS network.

20. Social Engineering
The victims of social engineering are tricked into releasing information that they do not realize will be used to attack a computer network. They could get a phone call from a supposed technician asking to test the system and asking for usernames and passwords, or it could be people doing “dumpster-digging” to find information in the thrash, or people phoning to ask for a meeting trying to establish when someone is out of the office. Most of the information kept by GPS should be treated as confidential, which means that users must be very careful what information is being distributed via printed or electronic media.

21. Intellectual Property
Intellectual property refers to the “intellectual” or “artistic” creations of the human mind. This may include inventions, books and other literary works, artistic works, and various iterations of content developed for business. These works remain the intellectual property of GPS should you leave.

22. Incident Reporting
Incidents in breach of the ICT policy should be reported to the ICT portfolio manager or to any ICT portfolio member, where necessary information will be obtained and, if deemed necessary, will then be taken to the heads of the School where disciplinary action could be instituted.