Monitoring by the school. 16.1 The school may monitor traffic and material sent and received using the school’s technology infrastructures.
16.2 The school reserves the right to deploy filtering and/or monitoring software where appropriate to restrict access to certain sites and data, including email.
16.3 Users must not attempt to circumvent filtering or monitoring.
Monitoring by the school. The school reserves the right to deploy filtering and/or monitoring software where appropriate to restrict access to certain sites and data, including email.
Monitoring by the school. The School:
3.1 Reserves the right at any time to check work or data on the School‟s computer network, Internet access facilities, computers and other School ICT equipment/devices without obtaining prior consent from the relevant Authorised User. For example, teachers may at any time check student email or work.
3.2 Reserves the right at any time to check work or data on privately-owned or leased ICT equipment on the School site or at any School-related activity. The Authorised User agrees to promptly make the ICT equipment/device available to the School for the purposes of any such check and to otherwise co-operate with the School in the process. Before commencing the check, the School will inform the Authorised User of the purpose of the check.
3.3 Has several electronic access monitoring systems which have the capability to record email and Internet use, including the user details, time, date, sites visited, length of time viewed, and from which computer or device.
3.4 Monitors traffic and material sent and received using the School‟s ICT infrastructures. From time to time this may be examined and analysed to help maintain a Cybersafe School environment.
3.5 May deploy filtering and/or monitoring software where appropriate to restrict access to certain sites and data, including email.
3.6 Will clearly indicate that it is monitoring computer use during the logon process.
3.7 May from time to time conduct an internal audit of its computer network, Internet access facilities, computers and other School ICT equipment/devices, or may commission an independent audit of content and usage.
Monitoring by the school. 3.1 Onslow College has an electronic access monitoring system which has the capability to record Internet use, including the user details, time, date, sites visited, length of time viewed, and from which computer or device.
3.2 The school monitors traffic and material sent and received using the school’s ICT infrastructures. From time to time this may be examined and analysed to help maintain a cybersafe school environment.
3.3 The school will deploy filtering and/or monitoring software where appropriate to restrict access to certain sites and data, including email.
Monitoring by the school. 3.1. | The school monitors traffic and material sent and received using the school’s ICT infrastructures. From time to time, this may be examined and analysed to help maintain a cyber safe school environment.
3.2. | The school will deploy filtering and/or monitoring software where appropriate to restrict access to certain sites and data, including email. However, as in 2.4., the expectation is that each individual will be responsible in his or her use of ICT.
Monitoring by the school. 3.1. Mapua School has an electronic access monitoring system which has the capability to record Internet use, including the user details, time, date, sites visited, length of time viewed, and from which computer or device.
3.2. The school monitors traffic and material sent and received using the school’s ICT infrastructures. From time to time this may be examined and analysed to help maintain a cybersafe school environment.
3.3. The school has filtering and/or monitoring software where appropriate to restrict access to certain sites and data, including email.
Monitoring by the school. 3.1. Taradale Intermediate School has an electronic access monitoring system which has the capability to record Internet use, including the user details and sites visited.
3.2. The school monitors traffic and material sent and received using the school’s ICT infrastructures. From time to time this may be examined and analysed to help maintain a cybersafe school environment.
3.3. The school will deploy filtering and/or monitoring software where appropriate to restrict access to certain sites and data, including email.
Monitoring by the school. 3.1. Devon Intermediate School has [an electronic access monitoring system which has the capability to record Internet use, including the user details, time, date, sites visited, length of time viewed, and from which computer or device].
3.2. The school monitors traffic and material sent and received using the school’s ICT infrastructures. From time to time this may be examined and analysed to help maintain a cybersafe school environment.
3.3. The school will deploy filtering and/or monitoring software where appropriate to restrict access to certain sites and data, including email.
Monitoring by the school. 3.1 Whakatane High School uses an internet management and network security system which has the capability to record Internet use, including: user details, time, date, sites visited, length of time viewed, and the computer or device MAC address.
3.2 The school monitors traffic and material sent and received using the school’s ICT infrastructures. From time to time this may be examined and analysed to help maintain a cyber safe school environment.
3.3 The school will deploy filtering and/or monitoring software where appropriate to restrict access to certain sites and data, including email. However, as noted in 2.4, the expectation is that each individual will be responsible in their use of ICT.
Monitoring by the school. Whakatane High School has an internet management and network security system, which has the capability to record internet use, including the user details, time, date, sites visited, length of time viewed, and from which computer or device. • The school monitors traffic and material sent and received using the school’s ICT infrastructures. From time to time this may be examined and analysed to help maintain a cyber safe school environment. • The school will deploy filtering and/or monitoring software where appropriate to restrict access to certain sites and data, including email.