e-Safety Policy 2020-2021

 

Purpose and Scope

(This policy has been prepared for all kinds of technological devices with network access in Private Cag Primary School and the administrators, teachers, support staff, children and parents in the college, and their responsibilities and sanctions cover all.)

Due to the digitalization of the world, the use of technology and socialization by younger ages and the position of technology in education, Özel Çağ College e-Security policy aims to:

- Raising education standards,

- Protecting students, parents, teachers and other employees within the scope of eSafety,

- Develop 21 century knowledge and skills safely.

Responsibilities

Employees Responsibilities:

Reading and adhering to school eSafety policies.

Protect all students, parents, teachers and other personnel data, passwords, etc. by means of clouds.

To have knowledge about current technology and data science.

Not to share digitally stored personal data in public environments.

Not to share photos taken within the institution with students or parents in media accounts without official permission.

Not trying to access information or data on the students’ personal phones.

Not trying to access students’ personal messages, photos or and browser histories.

Not using the audio recording and video recording features from personal devices within the school for set-ups and lessons.

If it is necessary to use recording and video from personal devices for lessons in the school, to switch to registration status after the informative speech Not to use it for secret audio recordings or video lessons.

DVDs, CDs, USBs, data loggers, discs etc. lost in school should be delivered to the IT room regardless and without checking its content.

Not using devices that are either personal, embezzled by the school or public computers.

Not leaving accounts open on any platform that requires a personal username and password such as social media, mail, eOkul, eDevlet and so on. Not checking the "Remember Me" button in the browser store.

Not to share the devices in the school or embezzled by the school with students, parents or strangers.

Delivering devices in the school or embezzled by the school to the school IT room in case of malfunction. Not leaving the faulty device to be repaired by a different company / institution.

Not to install pirated / unlicensed software on devices in the school or embezzled by the school. Using licensed softwares in their current version.

Being responsible for keeping the data archived to external drives or flash disks in their physical lockers.

Being responsible for storing the data that is archived on cloud drives creating a strong password and not sharing it with anyone.

 

Student Responsibilities

Reading and adhering to school eSafety policies.

Leaving the personal devices used in the school encrypted in the student phone box at the school entrance.

Do not leave accounts protected with personal passwords open on public devices.

Using computers, tablets etc. in the laboratory and in the classroom that have been embezzled by the school. Do not use devices that are embezzled by other people without permission.

To learn the purpose of security cameras in school.

To send the documents that should be sent to the school digitally, only to the official address of the school with extension k12.tr

Not taking any video and audio recordings at school, except for special activities and after getting permission.

Not trying to access the data of personal devices belonging to students, teachers and other staff.

DVDs, CDs, USBs, data loggers, discs etc. lost in school should be delivered to the IT room regardless and without checking its content.

Not sending messages containing blackmail, bullying or threats to students, teachers, parents and other staff.

If there are blackmail, bullying and threats from students, teachers, parents and other personnel, follow the road map under the title "Roadmap After Cyber ​​Bullying".

Delivering devices in the school or embezzled by the school to the school IT room in case of malfunction. Not leaving the faulty device to be repaired by a different company / institution.

Not to install pirated / unlicensed software on devices in the school or embezzled by the school. Using licensed softwares in their current versions.

DVDs, CDs, USBs, data loggers, discs etc. lost in school should be delivered to the IT room regardless and without checking its content

 

Parental Responsibilities

Reading and adhering to school eSafety policies.

Cooperating with the school in combating Security Problems and Cyber ​​Violence.

Not engaging in personal mail, personal messages, banking transactions and illegal actions while connected to the school network.

To use student control software and student bus transportation control application created by the school in a way to ensure data confidentiality. Not sharing account information with others.

Not sending messages containing blackmail, bullying or threats to students, teachers, parents and other staff.

To inform the school administration in case of security problems and cyberbullying that may be faced by people connected to the school, inside and outside the school. If there are blackmail, bullying and threats from students, teachers, parents and other personnel, follow the road map under the title "Roadmap After Cyber ​​Bullying".

Not making video or audio recordings from personal devices on the campus except during special events.

To send digital data requested by the school only to the addresses of the school with k12.tr extension.

 

Security

Online Communication

Communication within the school takes place only through corporate e-mails.

 

Physical and Planned Structure

To keep and renew our Next Generation Firewall device in the most powerful state within the possibilities offered by technology.

Keeping the detection system (IDS) updated.

Tracking websites with negative content with the Content Filtering system and blocking them by the school network.

Keeping SQL injections, parameter tampering, DDOS attacks, Cookie poisoning and cross-site command execution vulnerabilities (XXS) prevention software up to date.

 

Use of Personal Devices at School

In case of an emergency, people to be contacted by the students are kept in the secretariat in a way to protect data confidentiality. Although the use of personal devices by students at the school is prohibited, freedom of communication is never restricted. Communication right is provided upon student request.

Personal device use by teachers, parents, and staff is eligible, limited by policies.

 

Cyber Bullying

Cyberbullying is technical or relational harm behaviors made to an individual or group using information and communication technologies. Those who cause such situations as a result of school policies are subject to sanctions regulated in Chapter 10 of the Turkish Penal Code No.5237 and additional sanctions to be imposed by the school disciplinary board.

 

Education

Students Training

Every student receives up-to-date training in the fields of "Online Security" and "Cyber Bullying" especially in the Information Technologies and Software course, Social Studies course, and by the PDR unit every year.

Students receive training on web extensions, cloud system, physical data storage devices, network system.

Students are made aware of these issues by having studies on "Online Security" and "Cyber Bullying" in art and design classes at least once a year.

Teachers Training

Our Instructors receive up-to-date digital security training at the training seminars organized annually by the IT department.

In professional development, participation in eSecurity-related programs is required at least every two years.

 

Parental Training

Booklets containing research and suggestions on eSecurity and Cyber Bullying are updated and sent to parents every year.

The road map to be followed in cases of "Security Problem" and "Cyber Bullying" is sent to parents by classroom teachers.

Seminars are given to parents by specialists.

 

Staff training

Receives up-to-date digital security trainings in training seminars organized by the IT department every year.

Participation is required to "cyber bullying" seminars, which are updated and organized by the PDR department every year.