Çağ College

E-Security Policy 2022 – 2023

Our school is accredited to the eSafety Label network and is associated with other schools on eSafety.

stays in touch in exchange of information.

Purpose and Scope

(This policy includes all kinds of technological devices with network access in Çağ College and for administrators, teachers, support staff, children and parents within the college has been prepared and its responsibilities and sanctions cover everyone.)

The digitalized world, technology and socialization down to early ages and education

Due to the position of technology, Çağ College e-Security policy;

- Raising education standards,

- Protecting students, parents, teachers and other employees within the scope of eSafety,

● It aims to develop 21st century knowledge and skills in confidence.

Our school is accredited to the eSafety Label European network and stays in contact with other schools to exchange information on e-Safety.

Responsibilities

Employee Responsibilities

Read and adhere to school eSafety policies.

Student, parent, teacher and other staff data, password, cloud, etc. methods to protect.

To have knowledge about current technology and data sciences.

Not to share digitally stored personal data in public.

Photographs taken with students or parents without official permission in the institution

not share in your accounts.

Not trying to access information and data on the student's personal phones.

Not attempting to access the student's personal message, photo and browser histories.

The features of audio recording and video recordings from personal devices in the school.

Do not use external.

 

If recording video use is required from personal devices in the school for lesson purposes,

After the informative speech, to switch to the registration status. Confidential audio recording and video lecture not to use it for any purpose.

Lost DVD, CD, USB, disc etc. in school without looking at the content of data loggers

deliver to IT room.

Personally embezzled or publicly available non-computer devices not to use.

Social media, mail, eSchool, eGovernment etc. on devices at school personal username and

not to leave their accounts open on any platform that requires a password. Not ticking the "Remember ME" button in the browser repository.

With the students, parents, the devices found in the school or embezzled by the school,

not to share with strangers.

 

In case of malfunction of the devices in the school or embezzled by the school, the school

Delivery to the IT room. For the purpose of having the malfunctioning device repaired by a different company/institution not to leave.

Pirated/unlicensed software to devices found in or embezzled by the school not to install. To use licensed software in the current version.

Keeping the data archived responsibly in their physical lockers.

He responsibly archives data on cloud drives by creating a strong password and sharing it with anyone without sharing.

Student Responsibilities

Read and adhere to school eSafety policies.

You can keep your personal devices used at school in the student phone box at the school entrance with an encrypted password leave it closed.

Media, cloud, mail, etc. personal password not to leave the accounts it protects with open.

Computer, tablet etc. embezzled by the school in the laboratory and classroom not to use the devices embezzled by other people other than the devices without permission.

To learn the purpose of security cameras in school.

Only the school's image with the k12.tr extension can submit the documents to be sent to the school in digital form to send it to the address or via the k12net application.

Not taking video and audio recordings at school, except for taking permission from their personal devices in activities.

Not trying to access the data of personal devices belonging to students, teachers and other personnel.

Lost DVD, CD, USB, disc etc. in school. IT without looking at the content of data loggers

deliver to his room blackmail, bullying, threatening messages to students, teachers, parents and other personnel not send.

If there are blackmail, bullying or threatening messages received from students, teachers, parents and other personnel the roadmap under the heading “Roadmap after Cyberbullying” below to watch.

In case of malfunction of the devices in the school or embezzled by the school, the school

delivery to the IT room. For the purpose of having the malfunctioning device repaired by a different company/institution not to leave.

Pirated/unlicensed software to devices found in or embezzled by the school not to install. To use licensed software in the current version.

Lost DVD, CD, USB, disc etc. in school without looking at the content of data loggers

deliver to IT room.

Parent Responsibilities

Read and adhere to school eSafety policies.

To cooperate with the school in the fight against Security Problems and Cyber Bullying

while connected to the school network, personal mail, personal message, banking transactions and illegal not taking action.

Student control software created by the school and student shuttle transportation control software to use the application in a way that ensures data privacy. Account information with others not to share.

Blackmail, bullying, threatening messages to students, teachers, parents and other personnel

not send.

Security problem to be experienced by school affiliates inside and outside the school and informing the school administration in case of cyberbullying. Students, teachers, parents and other if there are blackmail, bullying, threatening messages received from the personnel, the "Cyber Bullying to follow the road map under the heading “Afterwards Roadmap”.

Not to take video and sound recordings from personal devices outside of the event on campus.

The digital data requested by the school can only be sent to the addresses with the k12.tr extension of the school or to k12net send from app.

Security

Online communication, communication within the school is only through corporate mail and the k12net school application base is taking place.

Physical Structure and Plans

Our Next Generation Firewall device, within the possibilities offered by technology, keep and renew.

Keeping the detection system (IDS) up to date with the Content Filtering system, the monitoring of sites with negative content and their detection by the school network blocking.

SQL injections, parameter manipulations, DDOS attacks, Cookie poisoning and sites keeping up-to-date software to prevent command execution vulnerabilities (XXS).

 

Use of Personal Devices in School

Persons to be contacted by students in case of emergency maintained in a manner that maintains confidentiality. Personal device use of students at school although it is prohibited, the freedom of communication is never restricted. 

At student request right of communication is provided.

Personal device use by teachers, parents, and staff is covered by policies suitable for a limited time.

Cyber Bullying

Cyberbullying is a technique against an individual or group using information and communication Technologies or relational harm behavior. Due to school policies, such situations the persons who cause it are subject to the sanctions regulated in Section 10 of the Turkish Penal Code No. 5237 with the additional sanctions to be given by the disciplinary committee by the school will be met. In addition, students are trained and aware of this field by the school is provided.

Education

Student

Information about Malware and ways to protect it, with content updated every year IT it is planned with the cooperation of the Counseling Unit and the Guidance Unit and added to the school agenda system required.

Trainings on social media usage and data privacy with content updated every year the IT unit and the Guidance Unit will work together to provide Students and parents planning and adding the necessary studies to the school agenda system required.

To inform students about digital citizenship with content updated every year.

Interviews with IT department and department heads during the August teacher seminar period adding the activities to be done after providing the students to the school agenda system required.

To combat cyberbullying with content updated every year, the school starts in September every year conducting joint studies with the guidance units and planning the plan to be made during the year It should be added to the school agenda system.

Every year T.C. Ministry of Defense and T.C. By the Presidential Digital Transformation Office Cyber Security Week, which started in the last week of November, participated in the online events of Science and Technology ensuring participation with Technology High School, Anatolian High School and secondary school students are planned.

 

Instructor Trainings

Up-to-date digital security trainings are provided in the training seminars organized by the IT department every year.

In professional development, participation in eSafety-themed programs is required at least once every two years.

Parent Education

Booklets containing research and recommendations for parents on eSafety and Cyberbullying

updated annually.

Classroom teachers to parents in cases of "Security Problem" and "Cyberbullying" a roadmap to be followed is sent.

Parents are given seminars by special experts.

Staff education

Up-to-date digital training seminars are organized every year by the IT department receives safety training.

Participation in the "cyberbullying" seminars organized by the PDR department every year

condition is sought.