8 June 2021

IT Acceptable Use


The college aims to give each student an outstanding quality experience in ICT that will enable them to fully develop their ICT capability. Planning at all levels will ensure that students are challenged to make choices about the use of ICT in their work using it in a creative and innovative way. The college will provide staff who are highly skilled to deliver ICT using a wide range of technologies and resources that support learning across all subjects whenever and wherever needed. We will make use of new and emerging technologies to support consistently high quality teaching and learning. Our ICT will support and equip students for a future that is constantly changing and developing


1. To keep the colleges equipment in the best working order, staff and students must ensure that they do not tamper with any of the hardware equipment.
2. Users should not attempt to gain access to any user area not belonging to them or any Sir John Hunt CSC system where they do not have access.
3. Users should not access or copy directories, programs, files, data or documents which do not belong to them unless they have permission from the user area holder or owner to do so, except with prior explicit written permission from the Principal and Senior IT Technician.
4. Resources must not be used for commercial purposes or monetary gain.
5. Sir John Hunt CSC reserves the right to hold the user financially liable if, through negligence or deliberate action, resources are compromised in any way by them or someone using their user area.
6. Users are prohibited from disclosing their password to any individuals, except to the authorised Senior IT Technician/ICT Technician. Users must safeguard their user area and its contents, and will be responsible for any misuse. Users may not search for, access, copy, or use passwords belonging to other people. Passwords must be changed regularly to maintain security.
7. User areas cannot be transferred or used by other individuals. Sharing user areas is not permitted.
8. Users must have written permission from the Principal and the Senior IT Technician to remove or copy any resource owned or licensed by Sir John Hunt CSC. Users may not copy any software or document unless they are licensed by the software licensor to do so, or unless the software or document is from the public domain library. Users may not remove resources from their designated places without permission of the Principal and Senior IT Technician.
9. Users may not use resources to send, forward, or otherwise disseminate nuisance messages. Nuisance messages include, without limitation, messages sent to a recipient who has previously notified them that messages of a particular type from the user will constitute a nuisance.
10. Resources may not be used in such a way as to create or constitute, in the sole determination of the Senior IT Technician, an unacceptable burden on resources. Non-exclusive examples of such unacceptable burdens include mail bombing, creating telnet or file transfer sessions of excessive number or duration, using excessive network bandwidth, and creating unnecessarily large files.
11. Users must comply with all applicable ICT technical policies. If you have questions regarding such policies, please contact the Senior IT Technician.
12. Resources may not be used in connection with activities prohibited by any applicable Sir John Hunt CSC policy or by any applicable laws, ordinances, rules, regulations, or orders of any public authority having jurisdiction including, without limitation, those concerning: trademark, copyright (including, but not limited to, copyrights covering text, images, audio and video) and other intellectual property, unauthorised use of a person image. civil rights, commerce, computer usage, conspiracy, tele-communications, defamation, forgery, obscenity and privacy (collectively “Laws”).
13. E-mail and other computer files (collectively “Files”) can never be considered fully private, particularly in light of (i) the open nature of the Internet and related technology and (ii) the ease with which Files may be accessed, copied and distributed. Users are advised to avoid sending messages by e-mail and storing information in computer files that are of a confidential, personal or sensitive nature. Please remember that emails are always accessible from a system even after they have been deleted. When forwarding an email, care should be taken to check that the previous content of the email is still applicable/appropriate to the new recipient.
14. College computers (including those used at home) may not be used to access the internet other than through the college network.

COMPUTER USAGE – students 

Sir John Hunt CSC is pleased to offer students access to a computer network. This facility is used for producing and storing work and accessing the internet.

What is expected?

Students are responsible for appropriate behaviour on the college’s computer network. General college rules for behaviour and communication apply. The use of the network is a privilege not a right and may be withdrawn if abused. The user is personally responsible for his/her actions in accessing and utilising the colleges computer resources.

What are the rules?

• Network storage areas may be reviewed by the IT teams to ensure that the system is being used responsibly.
• Students should never download or install any commercial software, shareware or freeware onto network devices. Nor should any students copy other people’s work or intrude into other people’s files.

These are the guidelines to follow to prevent the loss of network privileges at college

• Do not use a computer to harm other people’s work.
• Do not damage the computer or the network in any way.
• Do not interfere with the operation of the network by installing illegal software, running batch files or executable files, shareware or freeware.
• Do not violate copyright laws.
• Do not view, send or display offensive messages or pictures.
• Do not share your password with another person.
• Do not waste limited resources such as disk space or printing capacity.
• Do not trespass in another’s folders, work or files.
• Do notify an adult immediately, if by accident you encounter materials which are inappropriate.
• Be prepared to be held accountable for your actions and for the loss of privileges if the guidelines are broken.

Using the Internet students will:

• Ask permission from a teacher before using the internet.
• Understand that all internet access is monitored.
• Report any unpleasant materials to the teacher immediately because this will help to protect other students and themselves.
• Understand that the college may check computer files and may monitor the internet sites visited.
• Will not deliberately download inappropriate material.
• Will not complete and send forms without permission from the teacher.
• Will not give their full name, home address or telephone number when completing forms.

Names of students whose parents withhold permission for their names, work or photographs to appear on the college’s web site are kept by Students Services and recorded on SIMS.