„Cyberbullying” is harassment, which uses electronic technology as a means of victimizing others. This is the use of an Internet service or mobile technologies – such as email, newsgroups, instant messaging, websites or SMS (SMS) – for the purpose of harming another person. PARENTS: After reading the Technology Permitted Use Agreement, we expect cybersecurity and invite you to discuss the following agreements with your child to help you and your child stay safe in using digital technologies at school or at home. As a parent or legal guardian of [print student`s name] _________ I understand that this access is designed for educational purposes. [Name of organization] has taken appropriate measures to control access to the Internet, but cannot guarantee that not all controversial information will be accessible to students. I agree that I don`t blame [the name of the organization] for the materials acquired on the network. In addition, I take full responsibility for supervision if and if my child is not used in a school environment. I allow my child to use network resources, including the Internet, available through [organization name]. CYBER SECURITY AT LABURNUM PRIMARY SCHOOL: Agreement on the acceptable use of technologies Access to networks [name of organization] via remote access must be controlled either by a single sign-on by password or by a public/private key system with a strong passphrase. Material sent and received over the school network may be monitored, and filtering and/or monitoring software is used to limit access to certain sites and data, including inappropriate content. We understand that primary school children may accidentally access, share or interact with inappropriate issues, and we will work with you and your child to resolve any difficulties that arise using the relevant wellness guidelines. As always, their support is the key to finding solutions to these difficult situations. In the rare event that a student is suspected of an electronic crime („e-crime”), this can be reported to Victoria Police.
When a personal electronic device, such as a mobile phone, is used to take images or videos of an offence such as assault or invasion of privacy, the device is seized and handed over to the police.