Important terms. ‘Cyber-safety’ refers to the safe use of the Internet and ICT equipment/devices, including mobile phones. ‘Cyber bullying’ is bullying which uses e-technology as a means of victimising others. It is the use of an Internet service or mobile technologies - such as e-mail, chat room discussion groups, instant messaging, webpages or SMS (text messaging) - with the intention of harming another person. ‘School ICT’ refers to the school’s computer network, Internet access facilities, computers, and other ICT equipment/devices as outlined below. ‘ICT equipment/devices’ includes computers (such as desktops, laptops, PDAs), storage devices (such as USB and flash memory devices, CDs, DVDs, floppy disks, iPods, MP3 players), cameras (such as video and digital cameras and webcams), all types of mobile phones, gaming consoles, video and audio players/receivers (such as portable CD and DVD players), and any other, similar, technologies. ‘Inappropriate material’ means material that deals with matters such as sex, cruelty or violence in a manner that is likely to be injurious to children or incompatible with a school environment. ‘E-crime’ occurs when computers or other electronic communication equipment/devices (eg Internet, mobile phones) are used to commit an offence, are targeted in an offence, or act as storage devices in an offence.
Appears in 2 contracts
Samples: Cyber Safety Use Agreement, Cyber Safety Use Agreement
Important terms. ‘Cyber-safety’ refers to the safe use of the Internet and ICT equipment/devices, including mobile phones. ‘Cyber bullying’ is bullying which uses e-technology as a means of victimising others. It is the use of an Internet service or mobile technologies - such as e-mail, chat room discussion groups, instant messaging, webpages or SMS (text messaging) - with the intention of harming another person. ‘School ICTSchool’ refers to the school’s computer network, Internet access facilities, computers, and other ICT equipment/devices as outlined below. ‘ICT equipment/devices’ includes computers (such as desktops, laptops, PDAs), storage devices (such as USB and flash memory devices, CDs, DVDs, floppy disks, iPods, MP3 players), cameras (such as video and digital cameras and webcams), all types of mobile phones, gaming consoles, video and audio players/receivers (such as portable CD and DVD players), and any other, similar, technologies. ‘Inappropriate material’ means material that deals with matters such as sex, cruelty or violence in a manner that is likely to be injurious to children or incompatible with a school environment. ‘E-crime’ occurs when computers or other electronic communication equipment/devices (eg Internet, mobile phones) are used to commit an offence, are targeted in an offence, or act as storage devices in an offence.
Appears in 1 contract
Samples: Cyber Safety Use Agreement
Important terms. ‘Cyber-safety’ refers to the safe use of the Internet and ICT equipment/devices, including mobile phones. ‘Cyber bullying’ is bullying which uses e-technology as a means of victimising others. It is the use of an Internet service or mobile technologies - such as e-mail, chat room discussion groups, instant messaging, webpages or SMS (text messaging) - with the intention of harming another person. ‘School ICT’ refers to the school’s computer network, Internet access facilities, computers, and other ICT equipment/devices as outlined below. ‘ICT equipment/devices’ includes computers (such as desktops, laptops, PDAs), storage devices (such as USB and flash memory devices, CDs, DVDs, floppy disks, iPods, MP3 players), cameras (such as video and digital cameras and webcams), all types of mobile phones, gaming consoles, video and audio players/receivers (such as portable CD and DVD players), and any other, similar, technologies. ‘Inappropriate material’ means material that deals with matters such as sex, cruelty or violence in a manner that is likely to be injurious to children or incompatible with a school or preschool environment. ‘E-crime’ occurs when computers or other electronic communication equipment/devices (eg Internet, mobile phones) are used to commit an offence, are targeted in an offence, or act as storage devices in an offence.
Appears in 1 contract
Samples: Cyber Safety User Agreement