IT CHARTER 2019-2020
Computer, Internet, and Office 365 Charter
Secondary school students’ Computer and Internet Charter
The European School Brussels 1 strives to offer pupils the best working conditions in computer and multimedia services. This charter outlines the rules for the proper use of computer resources available for educational purposes. It is an annex to the internal rules of the school, and part of the framework of existing laws.
ACCESS TO THE NETWORK
The use of computer resources at EEBI is strictly for educational activities.
IT resources consists of the network, servers, work stations, hardware, software, peripherals (printers, external hard drives, etc.), laptop and tablet computers, micro-computers linked to video-projectors, as well as access to the Internet and related services provided by the school.
With a system so large and complex to manage and maintain, each pupil is required to respect the operational guidelines and conduct laid out in this charter to the letter.
Access to the network in school is provided and supervised by a member of the educational team.
The school offers access to various network resources :
- School computer terminals via a personal account
- The school’s network, which includes:
- Access to both shared and personal data storage on the school’s servers Network software
- Network printers
- Online access to Office365, (which includes an e- mail service) managed by the European School
- Proprietary or open-source software
- Internet and WiFi
Access to network accounts are personal and individual, and only the student to whom it is issued may use it.
Access codes must absolutely remain confidential, and not be divulged to third parties (with the exception of the student’s legal representatives).
Students must notify their education counselor if there is a problem with their account.
Before leaving their workstations, students must always make sure that they’ve logged off, disconnected, and shut down properly.
For personal use outside the school, each student will receive five Office365 installation licenses for desktop computers and five Office365 installation licenses for mobile phones or tablets. These licenses may only be installed and used on devices regularly accessed by the student.
Students can associate a portrait photo of themselves to their O365 account for identification purposes, but may not use any other photo or image (those of others, humorous images, etc. …).
Respect for others
The following is strictly prohibited:
- trying to find out another person’s password;
- logging in with another person’s username and password;
- opening, editing, or deleting the files belonging to another person and/or generally trying to access another person’s information without their authorization;
- creating a separate password for Internet software/services such as Google Chrome, Internet explorer, Firefox etc.;
- using improper or abusive language in messages; the author of the message accepts and carries sole responsibility for its content;
- targeting and/or undermining a user’s integrity, especially through use of provocative, objectionable, or criminally reprehensible messages.
Respect for the network, work stations, and intellectual property.
Premises and equipment must be diligently respected and maintained. Keyboards and mice should be handled and used with care.
The following is forbidden:
- changing the configuration of the workstation;
- altering or destroying network data or a workstation;
- installing software or making a copy of software present on the network,
- connecting a removable drive of any kind without the permission of an adult authority;
- connecting a device or personal computer (USB, GSM, etc.) to the network without the permission of an adult authority;
- deliberately disrupting network operation, including the use of programs to circumvent security or introduce malware (viruses, spyware or others).
- diverting or attempt to bypass protection systems in place (firewalls, antivirus, …); using VPN tunnels is prohibited
Respect for human and social values
The following is prohibited:
- displaying or publishing on-screen documents of a racist, extremist, pornographic, negationist, or abusive nature;
- using e-mail lists or personal information for purposes other than those that are pedagogical or educational in nature.
- SPECIFIC RULES FOR INTERNET USE
Access to the Internet and WIFI within EEB1 is a privilege, not a right.
The use of the educational (Internet) network is reserved for teaching activities in keeping with the mission of the European Schools.
The following is forbidden:
- connecting to chat services, discussion forums, or social networks without the express permission of a member of the educational staff;
- accessing pornographic, xenophobic, anti-Semitic, or racist sites;
- downloading any program whatsoever.
Under no circumstances should the pupil give out his/her name, photo, address, telephone number, or any other indicator facilitating his/her identification on the Internet.
Student Session Supervision
The School reserves the right to use a supervisory system to keep students in a learning dynamic and allow the course teacher and library staff to assist pupils directly from their workstations.
This supervisory system (monitoring software) specifically allows class monitors and library managers to:
- monitor students (using a thumbnail view) to access their screens remotely, help them, and keep them focused on their tasks;
- teach more effectively by broadcasting the teacher’s screen to the class,
- select student screens for presentation.
- disable all student screens in order get their attention
No recording of their sessions or activities will be made.
Only persons authorized by school management will be able to use this monitoring software. More specifically, only the course teacher and the person responsible for the library (who will in any case be present) are permitted to monitor – no external access will be allowed. These authorized persons are also required to respect the ICT Charter as it applies to their role within the School.
Any pupil who violates these rules will be subject to disciplinary sanctions as per the General Rules of the European School and the internal rules of EEBI, as well as penalties and criminal proceedings prescribed by law.
All members of the teaching staff agree to ensure compliance with these provisions by the pupils they are responsible for, and should exercise strict control.
The network administrator must ensure the proper working order and use of computer resources.
To this end, the monitoring of computer resources makes it possible to detect anomalies (excessive use of the network, excessive storage space, attempted cyber-attack, etc.). In the event anomalies are detected, the IT administrator will ask school management to agree on the measures to be taken. But in case of absolute urgency, and to protect the computer system of the European school, the IT administrator may make the decision to immediately block computer access for one or more students, then immediately inform management.
This type of intervention can only be carried out for clearly defined purposes, namely:
- the prevention of unlawful or defamatory acts, acts contrary to morality, or likely to undermine the dignity of others;
- the protection of the confidential, economic, or financial interests of schools, as well as the fight against those responsible for attempting any such unwarranted access;
- the security and/or proper working order of the IT systems, including the control of related costs, as well as the physical protection of the school’s facilities;
- ensuring respect for the principles and rules regarding the good faith use of available technologies.
The signature of this charter is mandatory for any user of the computer resources made available by the European School.
If you are concerned by the BYOD project, the specific rules are as follows:
- For the purpose of this document the term device will refer to all types of electronic devices which can be connected to the school Wifi.
- The Students maintain complete responsibly for the device. In accordance with article 10 of the general organisational rules: ‘Personal Items’, The school cannot be held responsible for the loss or theft of personal belongings.
- Students are expected to act responsibly and adhere to legal and ethical standards.
- Each student is personally responsible for his/her actions in accessing and utilizing the device on the school network.
- Only students, faculty and staff and approved guests are permitted Internet access. Passwords are individual and may not be shared.
The following list, though not covering every situation, specifies some of the conduct that violates the acceptable use of the device:
- Intentional damage to hardware or software, or the creation or distribution of viruses, worms or other forms of electronic mayhem.
- Creating, displaying or transmitting threatening, racist, sexist, obscene, abusive or harassing language or materials.
- Unauthorized use of a computer account or distribution of a password.
- Plagiarism or intruding into other people’s files.
- Using electronic mail to harass or threaten others, including sending repeated, unwanted E-mails to another user. This is in line with the school’s anti-bullying policy.
- Giving your name, address, or phone number to anyone over the Internet.
- Downloading and/or installing any software including, but not limited to, executable files, games, MP3 files or players, video files, zip files, where these are not authorized by a teacher.
- Viewing a website which was not approved by your teacher or viewing a website not in line with instructions for your work during class.
The resources provided while using the device in school are intended for school-related, educational purposes only. Failure to comply with the guidelines for acceptable use will result in disciplinary action, which may also include suspension of computer privileges, resulting in a failing grade for work requiring the device in class.
7. PROTECTION OF PERSONAL DATA
The school undertakes to process personal data collected in connection with the use of computer resources in strict compliance with the General Data Protection Regulation.
 In computing, a virtual private network, abbreviated VPN – Virtual Private Network, is a system for creating a direct link between remote computers, isolating this traffic in a kind of tunnel.
Acceptance of the code of conduct is considered as acceptance of the IT Charter.
After this acceptance, access codes to Office 365
will be withdrawn from the education advisor at his level.