Security Policy­čŤá­čô▓

  •  Cad-Math Project ---Security Policy

    Prepared By

    Eda Ek┼čio─člu /Mirela Avdibegovic 

    GOAL

    While using the project, e-security studies, internet, smart board, computer, laptop and mobile phones; It aims to protect students, parents and teachers.
    • Since the internet and technology are an important part of life, everyone should be made conscious of learning methods of managing risks and developing strategies.
    • Our policy has been prepared for administrators, teachers, parents and students and is valid for internet access and use of information communication devices.

    RESPONSIBILITIES

    • To contribute to the development of e-security policies.
    • Taking responsibility for academic development during the positive learning phase.
    • Taking responsibility for e-security to protect the school and project partners.
    • Using technology safely and responsibly.
    • In case of damage, observe the danger and forward it to the relevant units.

    SHARING IMAGES AND VIDEOS

    • All photos and videos shared are shared with the permission and approval of the school administration in accordance with the e-security policy.
    • Parents' permission is obtained for all student content sharing.
    • Besides the parent's permission, the photograph of the student is not taken and used without permission.
    • It is ensured that the photos taken and videos created are not showing the student face clearly.

    • Before a video to be prepared by the students is prepared, the students involved in it should obtain permission from their teachers.
    • In all shared student-based activities, parents' permissions must be obtained prior to the event.
    • Video conferencing, activities etc. works will be done through official and approved sites.
    • Users cannot share images with school students and employees on their personal social media accounts without their approval by the school authorities.
    • Users cannot take photos and videos and share them on social media without their permission from the school directorate.

    CONTENT:

    • While video conferencing, all users will be able to participate on the sites.
    • Communication with other schools must be established before videoconferencing.
    • All content that concerns / involves school students and employees will be available for sharing only after going through the control and approval processes.
    • All shares will be made available on twinspace and other websites after they are examined about the fact that they do not attack the rights of individuals, and that they are within the framework of moral rules.

    E-SECURITY TRAINING

    The e-security curriculum for students is added to the annual plans of the relevant courses, and students are informed about these issues.
    • Internet usage of all users is monitored by the data processing unit. This information was transmitted to all users.
    • Guidance teachers apply peer education to improve online safety in line with our students' needs.
    • Students who use technology positively will be rewarded.
    • Online security policy will be officially announced to all our employees.
    • All members of our school and our project will be informed about online risks. Trainings will be held and contents will be explained.
    • In our school and project, information activities are carried out on illegal content, security breach, cyber bullying, sexual messaging, child abuse, and personal information security.
    • Secure internet day is celebrated on February 11.
    • All complaints about the misuse of internet, information technologies and equipment in our school will be reported to the principal.
    • February 11 safe internet day is celebrated in our school. We have board work and social media posts in school corridors and classrooms for today.

    SAFE USE OF THE INTERNET AND INFORMATICS DEVICES:

    • Internet; While it has become one of the most important means of accessing information, we can associate it with the curriculum in the school and deliver our students and teachers to the right information in the safest way.
    • We have integrated our internet access according to our students' ages and abilities.
    • We have secured all our school computing devices in accordance with our usage policy by making necessary filters.
    • All our employees, parents and students are informed about the use of effective and efficient online materials.
    • E-security and cyberbullying are included in the annual plans of our specific courses, and information transfer to students continues on these issues throughout the year.
    • Online materials are an important part of teaching and learning and are actively used in the curriculum.
    • February 11 safe internet day is celebrated in our school.
    • Our school fully implements security procedures in accordance with 5651 law, SOPHOS applications, HARDWARE FIREWALL, and ANTIVIRUS application with a corporate structure are used. In addition, HOTSPOT security measure for wi-fi is included in the system. It is a system that requires an additional username and password after the password entry, but also requires the registration of the user's mac address to the system.

    • USING MOBILE PHONES AND PERSONAL DEVICES:

    • Our students must obtain permission from the school administration to use their personal devices for educational purposes (use of web 2 tools, etc.).

    • Our students are made aware that they should not only share their mobile phone numbers with trusted people, but should not share personal information such as mobile phones with people they do not find reliable.
    • Employees of the institution (teachers, administrators, staff etc.) and students carry the legal responsibility of any content and messaging that will come from or sent by the students or employees via social media or chat programs, any content and messaging that may be inappropriate, school management shared with. Necessary measures are taken in order not to allow such a situation.

    ONLINE EVENTS AND PROTECTION:

    All members of our school and project are informed to act in accordance with official school rules to eliminate privacy and security concerns.
    • School and project coordinators are responsible for taking the necessary actions in case of adversities.
    • Employees (teachers, administrators, staff, etc.), parents and students should act with the school in solving problems.