International School Dhaka

Information Technology Acceptable Use Policy (draft)

To ensure that all members of the school community access and utilise the school's network and ICT facilities in a way that is educationally sound and consistent with the school's ethical and social values and code of conduct.

Our Vision for Educational Technology
Technology at International School Dhaka is and will continue to be accessible, relevant and integrated across all curriculum areas to enhance the breadth and depth of the students' learning experience.
Through the use of communication and information technologies members of the school community will develop skills to become technologically literate lifelong learners, make informed decisions and achieve their personal, education and workplace goals to succeed as citizens in a global society.
(See E-Learning Strategy)

International School Dhaka recognises that teaching and learning will continue to change as information and telecommunications technologies alter the ways in which information is accessed, communicated, shared and transferred. Access to the Internet and telecommunications resources, including online databases, libraries and collaborative spaces such as weblogs and wikis, are now an important part of teaching and learning. ICT is used as a means to enhance students' learning as well as to facilitate the effective and efficient administration of the school's activities, business and practices.
The School believes that the benefits to students from using networks, computers and computer-related technologies and being able to access and retrieve information from these resources and the opportunities this provides for collaboration, exceed the disadvantages. However, access to the school network is a privilege and not a right. All computer users have the responsibility to use these resources in a professional, ethical, and lawful manner. Consequently network access and ICT use entails responsibilities and these are outlined below.

  1. General Policies and Summary of Conditions
# Computer Hardware
  1. Software and Operating Systems
  2. Network Usage
  3. Printing
  4. Internet Usage: Email, World Wide Web, VOIP
# Laptop and Handheld Computer users
  1. Mobile Phone Users
  2. Copyright and Data Protection
# Consequences of misconduct
  1. Digital Imaging
# Health and Safety

General Policies

  • The use of computer/Internet resources for educational purposes has priority over other (recreational) uses.
* No user is to deliberately or carelessly waste computer resources (eg unnecessary printing) or disadvantage other users (eg by monopolising equipment or network space)
  • Consideration must be given to avoiding inconvenience to other computer users such as:
    • Use headphones to listen to sound
    • Logoff and leave computers ready for the next person to use
    • Report any malfunction of computer/network facility promptly
** Clean up area and replace furniture when you leave a computer facility

Summary of Conditions

Students must not:
  • Use abusive or obscene language in any communications
  • Steal or deliberatley or carelessly cause damage to any equipment
  • Interfere with or change any software settings or other people's files
  • Attempt to get around or reduce network security
  • Attempt to gain access to other person's network areas on the file server
  • Store unauthorised files on the file server
  • Waste resources (eg printing)
* Send "spam" (bulk and/or unsolicited email)
  • Reveal personal information in any communications (eg telephone, address)
* Deliberately enter or remain in, websites containing objectionable material
  • Knowingly infringe copyright

Computer Hardware

Computer facilities are expensive, sensitive and must be treated carefully.
Students must not:
  • Do anything likely to cause damage to any equipment, whether deliberately or carelessly
  • Steal equipment
  • Vandalise equipment
* Mark or deface any equipment (eg graffiti)
  • Interfere with networking equipment such as hubs or cables
* Eat or drink near any school owned computer resources
Students must not, without permission:
  • Attempt to repair equipment
* Unplug cables or equipment
  • Move equipment to another place
  • Remove any covers or panels
  • Disassemble any equipment
  • Disable the operation of any equipment
Students are encouraged to report other people breaking these rules.
Regardless of the real or supposed levels of understanding, students are NOT authorised to attempt the repair or adjustment of any school hardware or software. Any such attempt will be regarded as a violation of network security. Any problem with equipment or software must be referred to an authorised person in IT Support.

Software and Operating Systems

Computer operating systems and other software must be set up properly for computers to be useful.
Students will not:
  • Change any computer settings (including screen savers, wallpapers, desktops, menus standard document settings etc) without permission
  • Bring or download unauthorised programs, including games, to the school or run them on school computers without permission.
* Delete, add or alter any configuration files
  • Copy any copyrighted software to or from any computer, or duplicate such software
  • Deliberately introduce any virus or program that reduces system security or effectiveness

Network Usage

Network accounts are to be used only by the authorised owner of the account.
If you find a computer logged in, you should do nothing in that account except log out.
It is the responsibility of students to make backup copies of their work. The school will exercise due care with backups but will not be held responsible for lost data.
Students must not:
  • Attempt to log into the network with any user name or password that is not their own, or change any other person’s password
  • Reveal their password to anyone except the system administrator or classroom teachers, if necessary. Students are responsible for everything done using their accounts, and everything in their home directory or 'N' drive. Since passwords must be kept secret, no user may claim that another person entered their 'N' drive and did anything to cause school rules to be broken.
  • Use or possess any program designed to reduce network security.
  • Enter any other person’s 'N' drive or do anything whatsoever to any other person’s files.
  • Attempt to alter any person's access rights.
  • Store the following types of files in their 'N' drive, without permission from the IT Manager:
    • Program files (EXE, COM)
    • Picture files, unless they are required by a subject
    • Obscene material – pictures or text
    • Obscene filenames
    • Insulting material
    • Password-protected files
    • Copyrighted material
  • Intentionally seek information on, obtain copies of, or modify files, other data or passwords belonging to other users.


Summary: Students must minimise printing at all times by print previewing, editing on screen rather than on printouts and spell-checking before printing. Double-sided (duplex) printing is to be used for preference.
Students must not load paper into printers without permission. Recycled paper should not be used in laser printers.
Secondary students have a printing allocation with coupon top-up system.
All communal printers at ISD run software that monitors printing details.

See Student and Staff Printing Policy for more details

Internet Usage

Access to the Internet has been provided to assist students' learning. It is also a valuable resource for teachers and students to find information, communicate with others and interact and collaborate on projects.

Because the Internet is an unsupervised environment, the school has a responsibility to ensure that, as far as possible, material obtained from the Internet is not offensive or inappropriate. To this end, some filtering of Internet links may take place. In the end, however, it is the responsibility of individual students to ensure their behaviour does not contravene school rules or rules imposed by parents/guardians.

The school is aware that definitions of "offensive" and "inappropriate" will vary considerably between cultures and individuals. The school is also aware that no security system is perfect and that there is always the possibility of inappropriate material, intentionally and unintentionally, being obtained and displayed.
It is the responsibility of the school to:-
  • provide training on the use of the Internet and make that training available to everyone
  • make users aware of relevant acceptable use policies
* take action to monitor offensive and/or inappropriate material that has become available on the Internet

  • The Internet must not be used for commercial purposes or for profit.
  • The Internet must not be used for illegal purposes such as spreading computer viruses or distributing/receiving software that is not in the public domain.
  • It is inappropriate to act as though you intend to break the law e.g. by attempting to guess a password or trying to gain unauthorised access to remote computers. Even if such attempts are not seriously intended to succeed, they will be considered serious offences.
  • Interactive use of the Internet should ensure that there is no possibility of the transmission of viruses or programs which are harmful to another user's data or equipment.
  • Copyright is a complex issue that is not fully resolved as far as the Internet is concerned. It is customary to acknowledge sources of any material quoted directly and it is a breach of copyright to transmit another user's document without their prior knowledge and permission. This includes the use of images and text. It is safest to assume all content on web sites is the legal property of the creator of the page unless otherwise noted by the creator.


Electronic mail is a valuable tool for personal and official communication both within the school network and on the Internet. Students and staff are encouraged to use it and take advantage of its special features. As with all privileges its use involves responsibilities.

Throughout the Internet there are accepted practices known as Netiquette which should be followed. The following points should be noted:
  • Use appropriate language and be polite in your messages. Do not be insulting, abusive, swear or use vulgarities.
  • Never write hate mail, chain letters, harassment, discriminatory remarks and other antisocial behaviours. Therefore no messages should contain obscene comments, threats, sexually explicit material or expressions of racial prejudice, bigotry or hate.
  • Do not reveal your personal address or the phone numbers of students or colleagues.
  • Note that email is not guaranteed to be private. System administrators do have access to all files including mail. Messages relating to illegal activities may be reported to the authorities.
  • Teachers will set their own guidelines for use of electronic mail in class time. A possible practice is for students to be given a small amount of time at the beginning and/or end of a lesson in which they may check their mail but the use of electronic mail during class time is at the discretion of the teacher.

Students will not:
  • send offensive mail
  • send unsolicited mail to multiple recipients ("spam")
  • send very large attachments
  • leave mail on the server for lengthy periods of time after it has been read
  • use email for any illegal, immoral or unethical purpose
  • attempt to disguise their identity or the true origin of their mail
  • forge header messages or attempt to use any mail server for deceptive purposes
  • use any mail program designed to send anonymous mail

See Email Protocol at ISD

World Wide Web

The World Wide Web is a vast source of material of all sorts of quality and content. The school will exercise all care in protecting students from offensive material, but the final responsibility must lie with students in not actively seeking out such material. It is conceivable that, especially for senior students, information is required for curriculum purposes that may appear to contravene the following conditions. In such cases, it is the responsibility of students and teachers to negotiate the need to access such sites.

It is recommended that during school hours students do not deliberately enter or remain in any website that has any of the following content:
  • Nudity, obscene language or sexual discussion intended to provoke a sexual response
  • Violence
  • Information on, or encouragement to commit any crime
  • Racism
  • Information on making or using weapons, boobytraps, dangerous practical jokes or "revenge" methods
  • Any other material that may be considered educationally unsuitable

If students encounter any such website, they must immediately turn off the computer monitor (not the computer itself) and notify a teacher. They are not to show their friends first.


Laptop Computer Users

See Laptop User Agreement

Handheld Computer Users

See Handheld User Agreement

Mobile Phone Computer Users

See Mobile Phone Policy

Copyright and Data Protection

Consequences of Misconduct

More than one may apply for a given offence.Serious or repeated offences will result in stronger penalties.
  • Ban on lunchtime computer use
  • Temporary ban on using computers
  • Removal of email privileges
  • Removal of internet access privileges
  • Removal of home directory and network access (with consequent inability to satisfactorily complete unit requirements of the subject)
  • Detention
  • Paying to replace damaged equipment
  • Removal from classes where computer use is involved
  • Suspension from school

Digital Imaging

Procedure Policy for downloading, organizing, archiving and uploading digital images

  • Download
  • Organize and select
  • Archive
  • Resize
  • Upload to File Server
  • Remove from File Server

See Digital Imaging @ISD

Health and Safety