At King Arthur’s we celebrate the opportunities that technology and especially the internet offer. However, it is essential that staff, students and parents stay up to date with details on how keep students safe online. The NSPCC identify the following risks:

  • Inappropriate content (pornography, radicalisation)
  • Ignoring age restrictions
  • Communicating with people they do not know
  • Sharing personal information
  • Gambling and running up debts

We encourage you to use the links below to guide you in working positively with your child on using technology safely.



e – Safety Policy

The e-Safety Policy relates to other policies including those for bullying and for child protection.

The Internet is an essential element in 21st century life for education, business and social interaction. The school has a duty to provide students with high-quality Internet access as part of their learning experience.

Internet use is a part of the statutory curriculum and a necessary learning tool for staff and students.

This policy aims to raise awareness on how we can embrace new technologies whilst educating students and staff on how to stay safe.

Key Principles

  • The school Internet access is designed expressly for student use and includes filtering appropriate to the age of students.
  • Clear boundaries have been set for the appropriate use of the Internet and digital communications and discussed with staff and students.
  • Students will be educated in the effective use of the Internet in research, including the skills of knowledge location, retrieval, evaluation and personal safety online.
  • We endeavour to ensure that the use of Internet derived materials by staff and by students complies with copyright law.
  • Students should be taught to be critically aware of the materials they read and shown how to validate information before accepting its accuracy.
  • The school will take all reasonable precautions to prevent access to inappropriate material. However, due to the international scale and linked nature of Internet content, it is not possible to guarantee that unsuitable material will never appear on a computer connected to the school network. Neither the school nor SCC can accept liability for any material accessed, or any consequences of Internet access.
  • The school will audit IT use to establish if the e-safety policy is adequate and that the implementation of the e-safety policy is appropriate and effective.
    The school provides access to its computer hardware, networks, e-mail and the Internet for educational and work-related purposes only. If you have any doubt about whether a contemplated activity is educational or work-related, you may consult with the schools ICT Technical team to help you decide if a use is appropriate.

Personal Use
The purpose of the provision of ICT facilities is for use in connection with teaching, learning, research, and approved business activities of the school.

The school permits the use of its ICT facilities (including the Internet) by staff for some personal use, subject to the following limitations:

  • A level of use that is reasonable and not detrimental to the main purpose for which the facilities are provided.
  • Priority must be given to use of resources for the main purpose for which they are provided.
  • Personal use must not be of a commercial or profit-making nature, or for any other form of personal financial gain.
  • Personal use must not be connected with any use or application that conflicts with an employee’s obligations to the school as their employer.
  • Personal use must not be connected to any purpose or application that conflicts with the schools rules, regulations, policies and procedures.
  • Please note that abuse of these limitations may result in the withdrawal of access to ICT facilities, including the Internet.


Network, e-mail and Internet access are provided as tools for your work and education. The school reserves the right to monitor, inspect, copy, review and store (Regulation of Investigatory Powers Act 2000) at any time and without prior notice any and all usage of the computer networks, e-mail and Internet access and any and all information transmitted or received in connection with such usage. All such information files shall be and remain the property of the school and no user shall have any expectation of privacy regarding such materials.


Many of the resources you find on the Internet are copyright protected, including music, video and e-books. You may only use all or part of a copyrighted work if you have the copyright owner’s permission or if your use of the work falls under a legal exemption. Check the documents you are viewing for appropriate statements indicating copyright ownership and usage. It is your responsibility to respect these rights including all copyright and intellectual property rights. I-Tunes accounts should not be stored on any school machine as this is in direct violation of copyright laws.

N.B. The school carries out periodic scans for copyrighted material and reserves the right to remove copyrighted material from its systems.


Bring Your Own Technology (BYOT)

For purposes of BYOT, technology means any privately owned portable equipment such as laptops, ultra books, smart phones, cameras, any device capable of accessing the internet etc.

All users must abide by the rules stated elsewhere in this policy when using BYOT devices. In addition users must follow the rules listed below:

  • Only the internet connection provided by the school may be accessed while on the school site. Accessing the internet through a signal that does not go through the filtered access provided by the school is not allowed at any time.
  • Responsibility to keep the device secure rests with the individual owner. The school nor its staff or employees, are liable for any device stolen or damaged on the school site. If a device is stolen or damaged, it will be handled through the school policies similar to other personal belongings. It is recommended that decals, other custom touches and UV markings are used to physically identify the device. Protective cases should be used as well. If the device is capable of being GPS tracked then this should also be activated.
  • The use of technology to provide educational material is not a necessity but a privilege. Members of staff do not have the right to use his or her own laptop, mobile phone or other electronic device while at the school. When abused, privileges will be taken away.
  • BYOT devices must be virus protected and not capable of passing on infections to the schools network.
  • The school has the right to collect and examine any device that is suspected of causing problems, either technical or from abuse of other school policies.
  • Printing from BYOT devices will not be possible.
  • BYOT devices are charged prior to bringing them to school and run off their own battery. Charging will not be possible during the school day.
  • Staff are responsible for any data which is stored on their BYOT device. Should any leak of information breech the Data Protection Act, disciplinary action will be taken. Where possible staff should avoid storing confidential information on a BYOT device and where unavoidable staff should take steps to ensure data is encrypted.
  • This Acceptable User Policy helps educate, inform students about the use of their technology on the school site.


School ICT system security will be reviewed regularly.
Virus protection will be installed and updated regularly.
Security strategies will be discussed with the Local Authority.
Securus is used to monitor system activity.

Passwords for the computer network must be a minimum of 8 characters in length.
They must include at least 1 capital letter and 1 number.
They must be changed every 60 days.
New passwords cannot be any of the previous 12 passwords.
Staff are responsible for maintaining the same level of security on all other passwords use.


  • Staff and students are provided with an e-mail account on the school system.
  • Students must immediately tell a teacher if they receive offensive e-mail.
  • Staff must report any offensive email received to the ICT department.
  • In e-mail communication, students must not reveal their personal details or those of others, or arrange to meet anyone without specific permission.
  • Incoming e-mail should be treated as suspicious and attachments not opened unless the author is known. The student e-mail system does not accept external emails.
  • The school should consider how e-mail from students to external bodies is presented and controlled.
  • The forwarding of chain letters is not permitted and limits are in place to prevent these.

Published content/School Website

  • Staff or student personal contact information will not generally be published. The contact details given online should be the school office.
  • Photographs that include students will be selected carefully so that individual students cannot be identified or their image misused.
  • Work or photographs can only be published with the permission of the student and parents/carers. They have the option to refuse permission when completing induction paperwork. Students are expected to inform relevant staff if their work or image is not to be published, at the time.

Social Networks

  • The school will control access to social networking sites, and consider how to educate students in their safe use. They are currently blocked through the County filtering system.
  • Newsgroups will be blocked unless a specific use is approved.
  • Students will be advised never to give out personal details of any kind which may identify them, their friends or their location.
  • Students should not place personal photos on any social network space without considering how the photo could be used now or in the future.
  • Students should be advised on security and encouraged to set passwords, to deny access to unknown individuals and to block unwanted communications. Students should only invite known friends and deny access to others.
  • Staff must not have any social interaction with current students via social networking sites.


  • The school will work in partnership with SCC, SWGfL and the Internet Service Provider to ensure that systems to protect students are reviewed and improved.
  • If staff or students discover an unsuitable site, it must be reported to their IT teacher, the e-Safety Coordinator or the ICT Manager.
  • Senior staff will ensure that regular checks are made to ensure that the filtering methods selected are appropriate, effective and reasonable.

Emerging Technologies

  • Emerging technologies will be examined for educational benefit and a risk assessment will be carried out before use in school is allowed.
  • Senior staff should note that technologies such as mobile phones with alternative access to the internet can bypass school filtering systems and present a new route to undesirable material and communications.
  • Mobile phones will not normally be used during lessons or formal school time (unless the particular lesson or aspect of the curriculum requires it). The sending of abusive or inappropriate text messages is forbidden.
  • The use by students of cameras in mobile phones to capture their own work, will be kept under review.
  • Games machines including the Sony Playstation, Microsoft Xbox and others have Internet access. Care is required in any use in school.

Protecting Personal Data

  • Personal data will be recorded, processed, transferred and made available according to the Data Protection Act 1998.
  • Staff will ensure they comply with the school’s data protection policy at all times.

Authorising Access

  • All staff must read and sign the ‘Staff Acceptable Use Policy for ICT’ before using any school ICT resource.
  • The school will maintain a current record of all staff and students who are granted access to school ICT systems.
  • Secondary students must apply for Internet access individually by agreeing to comply with the “Student Acceptable Use Policy for ICT”.
  • Parents/carers will be asked to sign and return a consent form.
  • Failure to sign the appropriate acceptable use policy will result in computer access being revoked.

E-Safety Complaints

  • Complaints of Internet misuse will be dealt with by the Headteacher, e-safety coordinator or Subject Leader for IT.
  • Any complaint about staff misuse must be referred to the Headteacher.
  • Complaints of a child protection nature must be dealt with in accordance with school

Safeguarding procedures

Complaints about cyber-bullying must be dealt with in accordance with school anti-bullying policy.

Communicating E-Safety

  • e-Safety rules will be posted in all rooms where computers are used and on the school website.
  • Students will be informed that network and Internet use will be monitored.
  • A programme of training in e-Safety is delivered, based on the materials from CEOP.
  • All staff will be given the School e-Safety Policy and its importance explained.
  • Staff must be informed that network and Internet traffic can be monitored and traced to the individual user.
  • Staff that manage filtering systems or monitor ICT use will be supervised by senior staff and work to clear procedures for reporting issues.
  • Staff should understand that phone or online communications with students can occasionally lead to misunderstandings or even malicious accusations. Staff must take care always to maintain a professional relationship.
  • Parents’ and carers’ attention will be drawn to the School e-Safety Policy in newsletters, the school brochure and on the school Web site.

The e-Safety Policy is reviewed by SLT, Subject Leader for IT and the ICT Manager on an annual basis and submitted to the Governing Body for approval.

Reviewed and updated February 2018


Contact Us

For more information or to get in touch:

01963 32368
or by Email