Image 1 Image 2 Image 3 Image 4 Image 5 Image 6 Image 7 Image 8 Image 9 Image 10 Image 11

Policies and Procedures

Policies and Procedures

Our approach to College policies and procedures for the iPad Program is one of integration. As iPads or other technologies are integrated into our classrooms so too are iPads and other technologies integrated into our College policies.

Rather than having iPad-specific rules, policies and procedure many of our current College policies already cover (or have been fine-tuned to cover) iPad use across the College.

Below are College Policies and Procedures that cover the iPad Program:

General Behaviour in the College

Bullying Policy

Personal Electronic Devices Policy

Homework Policy

Privacy Policy

Student and Staff Academic Honesty Policy

Acceptable Use of the College Network and the Internet



General Behaviour in the College

Mount Scopus Memorial College has a commitment to promote and facilitate the all-round growth of each student to their maximum potential and to enable all students to learn and to feel safe and secure in the College. To this end, the College has expectations of its students’ general behaviour. These expectations are designed in such a manner so as to be of benefit to our students in creating a safe, non-threatening and respectful College environment. Expectations placed on students include:

  • Being courteous and well-mannered at all times.
  • Showing respect for teachers, fellow students and the College community.
  • Showing respect for the personal property of others and the environment of the College.
  • Avoiding use of foul language and swearing.
  • Respecting the rights of others to learn in the classroom environment by not engaging in disruptive behaviour.
  • Avoiding aggressive or antagonistic language.
  • Being punctual at all times.
  • Behaving outside of the College in such a manner that the image of the College is not brought into disrepute.
  • Displaying honesty and personal integrity.
  • Wearing the College uniform in the stipulated and appropriate manner.
  • Maintaining a clean and neat appearance (boys should be clean-shaven, except for religious reasons).

In all instances of a contravention of the above expectations, the College will treat each misconduct individually and impose a consequence ranging from a verbal warning to an after-school detention or a Sunday detention. Offences deemed by the Head of Campus or Principal to be of extra significance may result in suspensions or removal from the College.

These may include issues related to theft, swearing at members of staff, violence, vandalism or repeated class disruption. This is also the case in the event of repeated misbehaviour, even of a lower level.

Ongoing and repeated behaviours that cause concern to the College will have a cumulative effect on the level of consequence that will be administered. Where continued misbehaviours occur, suspensions or withdrawal may result.

VCE students need to take particular note of the fact that where a suspension is put in place, their 90% attendance requirement may be adversely affected.


Bullying Policy

What is Bullying?

Bullying occurs when an individual or a group of students repeatedly and intentionally use negative words and/or actions which cause distress or pain to another student or risks that student’s wellbeing.

Bullying may take place in class, in the playground, on the bus, online, through social media or via digital technologies. In any such instance, the College has the right to intervene.

Bullying is not:

  • Mutual arguments or disagreements
  • Single episodes of social rejection or other negative acts
  • Random non-selective acts of aggressive behaviour or intimidation

(The College’s response to behaviour such as this is covered under the General Behaviour policy)

Where bullying, including “cyber-bullying”, is suspected or identified, the College will actively intervene and respond with appropriate consequences.

Where the College deems an issue is serious enough it may, at its own discretion, accelerate the process of consequences; bullying of a very serious and violent nature will result in harsher consequences being implemented.

1. All allegations of bullying will be investigated by senior College staff. On occasions they may conclude that bullying has not taken place.

2. Students who are reported for ongoing bullying incidents will be interviewed by either the Head of Year, mechanech or class teacher and parental involvement will be sought to help modify their behaviour.

  • Should the bullying type behaviour continue, students will be interviewed by the Head of Year and/or the Head of Campus and a conference with parents will be arranged. Further consequences will be determined at the time of the conference.
  • Students who are reported for a third bullying incident will automatically be withdrawn from school for the remainder of the day and for the following day.

3. Further bullying incidents may lead to the suspension from school of the student by the Head of Campus for a period of up to five school days. A conference with parents would then be held before the end of this period to discuss the student’s behaviour. Possible results on this conference can include:

  • Re-admission to the College once specified conditions have been adopted and put in place.
  • A recommendation to the College Principal that the student be removed from the College.

4. The College Principal will review the student’s personal record regarding all issues of discipline at the College before a final decision is reached when considering removal from the College.

5. In cases where the recommended removal from the College of a student is upheld by the College Principal, the College President will be consulted.

6. The College will not discuss discipline applied to students with the parents of other students.

Bullying Behaviour Involving Teachers or Parents of the College

Allegations of Bullying by members of staff or Parents of the College will be investigated by the College Principal. Bullying behaviour may result in:

- Disciplinary measures for teachers, up to and including dismissal

- Termination of family’s involvement with the College

- Litigation by aggrieved/affected parties


Personal Electronic Devices Policy

For the purposes of this policy, Personal Electronic Devices (PED) include, but it is not limited to; tablets, mobile phones, laptops, portable music players, cameras, video recorders and any similar or like devices.

The College does not accept responsibility for stolen, lost or damaged student PED.

Students’ PED can be used in classes, meetings, assemblies or similar organised activities with the expressed permission and/or specific instruction from a teacher.

Students misusing PEDs at school or causing a nuisance will be brought to the attention of the Head of School and appropriate disciplinary action will be taken.

The College reserves the right to prohibit students from bringing PEDs into certain spaces or during certain activities eg: science rooms, kitchens, exam rooms, physical education classes etc.

Students in breach of this policy will have their PED confiscated. Teachers are directed to bring the PED to the office where they will be locked away.

If the Head of School suspects the PED is being used to breach any of the College’s policies the contents of the PED may be examined. PEDs will be returned at the Head of School’s discretion and may revoke a student’s network privileges or their privilege of using PED whilst at school for a period of time.


Homework Policy

Homework assists students by complementing and consolidating the learning in the classroom. However the College recognizes it is important that students unwind after a school day.

Types of Home Learning Tasks

Home learning should be compromised of both formative and summative tasks.

Tasks might include:

  • Assigned reading
  • Creation
  • Revision
  • Reflection
  • Consolidation
  • Research
  • Problem Solving
  • Analysis Activities

Homework for Prep to Year 4 will enable the extension of classwork by practicing skills or gathering extra information or materials. At this level homework will consist principally of daily reading to, with and by parents/caregivers or older siblings.

Homework for years 5 and 6 should include daily independent reading and may include extension of classwork, inquiry and assignments, essays and research. For a copy of the complete Primary Homework Policy, please contact the PYP Coordinator.

In the secondary school, the number of hours of home learning students are expected to do per week is approximately:

7 hours for Year 7

8 hours for Year 8

9 hours for Year 9

10 hours for Year 10

The Role of the School is:

  • to assign an appropriate amount of homework on a regular basis.
  • to ensure that all assigned homework is checked and acknowledged.
  • to provide homework assignments that challenge and expand a child's thinking as well as reinforce concepts.
  • to apportion long-term assignments with consideration to the possibility of conflict with other work or tests assigned.
  • to address the skills required for successfully organising and completing homework formally during class time, during Mechanech sessions, and by individual student support where necessary.
  • to communicate with parents the non-completion of homework.

The Role of the Student is:

  • to ensure that instructions are clearly understood, and to ask for help from teachers where necessary.
  • to record details of homework in their school Diary and/or PED
  • to complete all assigned homework to the best of his/her ability.
  • to practice the skills of time management and prioritise longer and short-term work requirements with the aid of an assignment and study calendar if necessary.
  • to find out what assignments have been missed because of illness, appointments or special events, and to arrange a reasonable completion time with the teacher if necessary.

The Role of the Parent is:

  • to provide the student with a place suitable for learning that will be conducive to the completion of homework.
  • to provide the student with access to resources eg: stationary, paper and digital resources, internet access etc. that will be conducive to the completion of homework.
  • to monitor the student's work to ensure completion and to communicate with the teacher when work is not completed. Parents should regularly check the Planning Diary.
  • to be in communication with the teacher as soon as concerns arise.


Privacy Policy

The following is a summary of our privacy policy as it applies to parents and students. For a copy of the complete policy, please refer to the College website.

In relation to personal information of students and parents, the College’s primary purpose of collection is to enable the College to provide schooling for the student and to communicate with parents. This includes satisfying both the needs of parents and the needs of the student throughout the whole period the student is enrolled at the College.

College staff are required to respect the confidentiality of students' and parents' personal information, and to protect such information from misuse, loss, unauthorised access, modification or disclosure.

Social Media

With the growing popularity of online social media sites, the College is acutely aware of the need to respect individuals’ privacy. We ask that parents, students and staff consider the privacy of all Mount Scopus students before posting photos and videos of school events to Facebook, Twitter, YouTube and other social media sites. Please be aware that some parents within the College have expressly asked that images of their children NOT be used publicly.

We welcome any individual photos or video you think may be appropriate for the official College Facebook page, Twitter or Scopus YouTube channel and ask that you kindly email them to Vicki Davis our Communications Manager at or Social Media Coordinator, Daniel Sherr at for approval and uploading.


Student and Staff Academic Honesty Policy

Academic honesty is about the authentic presentation of academic work. When one's knowledge and ideas are developed based upon those of others, care is taken to appropriately acknowledge the knowledge of others.

Honesty and a respect for knowledge, truth, integrity and ethical practices are fundamental to the College and its learning objectives. Dishonest practices compromise academic standards and devalue the quality of learning.

Dishonest Academic Practices Include:

  • Failing to identify sources of information
  • Copying the work of others
  • Presenting the work of others as your own
  • Cheating in a test or examination
  • Colluding in the copying or cheating of others

To Maintain Academic Honesty:

Acknowledge all sources used

  • include a bibliography of sources with your work. For guidelines refer to the Secondary Library webpage bib.html
  • record all bibliographic information when photocopying or making notes from texts

Submit Your Own Work

  • never submit or represent another person;s work as your own
  • acknowledge the ideas of others where they have helped to develop your own

Make Copies of Materials Only When Legally Allowed

The following is a brief guide only for some types of resources. To understand the legal and moral rights and obligations of intellectual property ownership refer to:


Creative Commons:

Books (print and ebook), PDF's, digital presentations - copy up to 10% of the pages, or one chapter

Magazines and journals (print and online) - copy one article in an issue

TV, radio, films - broadcast programs may be copied for educational use. Commercial material may not be copied; excerpts may be extracted for educational use

Websites - elements on a website may have copyright or Creative Commons restrictions

The College will utilise on-line programs to authenticate student work.

Consequences for Breaching the College's Academic Honesty Policy

There are a variety of disciplinary measures for students that breach the Academic Honesty Policy, ranging from a warning, to not receiving a mark for the assigned tasks. Further disciplinary action may be in posed. This appropriate disciplinary measure will be at the discretion of the Principal.


Acceptable Use of the College Network and the Internet


The College’s ICT network and infrastructure play a pivotal role in realising the College’s Mission and Strategic Plan objectives. The College encourages staff and students to access the College’s ICT network and infrastructure appropriate to their respective needs and in a manner consistent with College policies and community expectations.

The College is committed to the use of electronic communications in the conduct of College business and affairs, whilst at the same time ensuring that use of electronic communications:

  • Protects personal privacy
  • Does not breach applicable laws
  • Does not adversely affect the College’s commercial interests.

All electronic and telephonic communications using Microsoft Outlook, Exchange, PABX, LAN (Local Area Network), WAN (Wide Area Network), Voice Mail, or any other systems owned, licensed or operated by the College are considered College property.

The purpose of this policy is to ensure that users of the College’s ICT network are aware of their rights and responsibilities.

This policy applies to all Mount Scopus Memorial College (MSMC) staff, students and members of the MSMC community (eg, support groups, parents, guests) using the College’s ICT Network.

Although incidental and occasional personal use of the College’s ICT Network is permitted, users automatically waive any claims to privacy.


In this policy any reference to ‘the College’s ICT Network’ or ‘ICT Infrastructure’ includes any computer, Interactive Whiteboard, digital displays, mobile device, computer network, telephone, email, internet service, intranet or other electronic communications device, software or service owned by the College and made available to users.

‘Users’ refers to all Mount Scopus Memorial College staff, students and members of the Mount Scopus Memorial College community (eg, support groups, parents, guests) using the College’s ICT Network.

‘College’ refers to Mount Scopus Memorial College.

General Restrictions

The College’s ICT Network must not be used:

  • For the purposes of creating, accessing or transmitting or otherwise dealing with content which may reasonably be regarded as objectionable or offensive (bearing in mind the cultural diversity of the environment in which the College operates), or content which is illegal
  • In a manner for the purposes contrary to College policies
  • In a manner which may otherwise expose the College to legal liability.

The College’s ICT Network must only be used:

  • By staff for the purposes of their employment and their professional development
  • By students for purposes directly related to their studies.

Use of the College’s ICT Network for private, social or recreational purposes should be avoided. However, users are allowed reasonable use for such purposes outside of class times or school hours, but such use must at all times comply with this policy.

Care and Responsibility

All ICT equipment (personal or College owned) is to be handled with due care and respect. Storage in lockers, keeping the equipment with you as much as possible and storing out of sight are highly recommended.

Damage to College ICT equipment caused by neglect or improper use could, in extreme cases, be charged to the user directly. It is College’s policy it does not accept responsibility for stolen, lost or damaged student PED.

Users should be aware that if they do not observe this policy, and as a result of this, their or others PED is stolen, lost or damaged the College reserves the right to take reasonable steps to recover the costs associated with replacing the equipment.

Access and Disclosure

The School reserves the right to access and disclose the contents of a user’s electronic and telephonic communications at any time, but intends to do so only when it has a reasonable suspicion of breach of policy or duty of care. Determining when such a reasonable suspicion exists shall be within the College’s sole and absolute discretion.

The College’s reasons to access and disclose these communications may include, but are not limited to:

  • The need to solve technical problems
  • The investigation of unprofessional conduct or matters dealing with student welfare and duty of care
  • The investigation of a theft or other crime
  • The prevention of unauthorised disclosure of confidential or proprietary information
  • Suspicion of personal abuse of the College’s ICT Network and/or breach of College policies
  • The review of communications upon the departure or death of a user.


Password Security

The security and protection of individual passwords is a prime responsibility of the individual owner of the password. Therefore, if something is authored from a password- protected system, the presumption will be that the owner of the password authored it.

All users must take reasonable steps to protect the secrecy of their password. For example:

  • A person’s username and password must not be shared with any other person
  • A password must not be written down and left in a place where it could be easily found
  • Precautions must be taken to prevent a password being copied, observed or overheard
  • A person must change his/her password if he/she suspects someone else knows it, or if directed to do so by IT Services staff.

Administrator passwords must be stored in a secure location with ICT Services to ensure that they are readily accessible when needed. The manager of the application or system is responsible for ensuring that appropriate arrangements are in place for the secure safekeeping of the administrator password with ICT Services.

Property and Copyright Information

Users of the College’s ICT Network should respect the intellectual property rights of others. In particular, users should be conscious of the provisions of the Australian Copyright Act which in general terms (and subject to some exceptions) prevents a person from copying, reproducing, making public, adapting, broadcasting or transmitting copyright material owned by another person without that person’s permission. The Copyright Act 1968 makes it quite clear that these restrictions continue to apply in an online environment. Please refer to the College’s Student and Staff Academic Honesty Policy.

Use of the College’s ICT Network to copy or transmit documents, software, music, movies, information or other materials protected by copyright laws (‘Copyright Materials’), without the copyright owner’s authorisation, is prohibited. The downloading and/or installation of Copyright Materials on to the College’s ICT Network are forbidden. This includes Copyright Materials in all its available forms (shareware, freeware, audio CDs, DVD movies, images, screensavers and games).

In order to ensure the School’s compliance with the Australian Copyright Act, ICT Services carries out regular system checks of network drives and, without warning, will remove all Copyright Materials that fall into the above categories. Continuous and repeated incidents of illegal Copyright Materials downloading and/or use will result in disciplinary action.

Email and Internet usage

The College provides access to email and Internet facilities primarily for business communication and to support the educational objectives of the College. Inappropriate use of these facilities can have significant consequences and may pose a threat to system security, the privacy of our users, students and employees and the legal liability of the College.

The College recognises that the Internet is useful resource for general research purposes and to organise social activities. Incidental and occasional personal use of our communication systems is, therefore, permitted.

Users must exercise great care when formulating email messages. Appropriate etiquette should be observed in email messages and the use of impolite or inflammatory language should be avoided. See ‘General Behaviour in the College’ and ‘Bullying’ Policies.

Electronic communications may constitute bullying, discrimination or sexual harassment and be in breach of the College’s policies. Your intention in writing or sending a message is irrelevant. If the message offends, humiliates or intimidates another person, it may breach our policy and relevant legislation. Individuals may be held liable for the content of messages which are offensive, and users should be aware that if a court subpoenas email records, the College must comply.

All email traffic through the College’s ICT Network is subject to monitoring by ICT Services and should not be deemed as private.

Internet access at the College is not considered a private activity and is logged by ICT Services. ICT Services monitors the volumes of internet activity by IP address and username. ICT Services can identify the sites visited by IP address and username.

The College has the capability to monitor the use of the College’s ICT Network. Users must recognise that whilst the College is committed to maintaining the privacy of personal information, it may be necessary for the College to monitor electronic communications (including email records) in order to comply with applicable laws to protect student welfare, or if it suspects there has been a breach of this policy, or to determine ownership or the recipient of lost or misdirected files.

All internet access must comply with the Telecommunications Act 1997 and any other relevant legislation regarding non-commercial activities confined to the School community as defined in the Act and the College’s ISP’s Policies and Procedures.

Social Networking and Blogging

Interacting on blogging and social networking sites such as Edublogs, Twitter, Facebook, YouTube, Skype, Instant Messaging Services and other related sites (‘Social Networking’) by users, whether using the College’s ICT Network or Personal Electronic Devices both on and off Campus, are also subject to the terms set forth in all College policies.

Limited and occasional use of the College’s ICT Network to engage in Social Networking is acceptable, provided that it is done in a professional and responsible manner, does not otherwise violate College policies, is not detrimental to the College’s best interests, and does not interfere with the smooth running of the classroom.

Users shall not engage in any Social Networking that may harm or tarnish the image, reputation and/or goodwill of the College and/or any of its users. Making any discriminatory, disparaging, defamatory or harassing comments when Social Networking is prohibited by the College’s Bullying Policy.

The College’s Confidentiality and Privacy policy also applies to Social Networking. As such, users are prohibited from revealing any confidential or proprietary information or any other material covered by our Confidentiality and Privacy policy when engaged in Social Networking.

Users may not attribute personal statements, opinions or beliefs to the College when engaged in Social Networking. If a user is expressing his or her beliefs and/or opinions while Social Networking, the user may not, expressly or implicitly, represent themselves as a representative of the College. Users assume any and all risk associated with Social Networking.

Apart from following all laws pertaining to the handling and disclosure of Copyright Materials, College’s trademarks, logos and any other intellectual property may not be used in connection with any Social Networking activity.

ICT Services closely monitors the use of Social Networking sites on a regular basis to ensure compliance with this and other College policies.

Storage Limitations and Restrictions

Users are allocated storage space on the College’s ICT Network in accordance with the requirements of the particular user. In general terms, storage limits are imposed on individual directories, email accounts and network shared drives.

Users must take reasonable steps to ensure that their data are managed within the limits and restrictions that are in place on the College’s ICT Network. Users must not use the College’s ICT Network to store data that are of a personal nature or not directly related to the operations of the College.

The actual storage limit varies on a per-user basis and is reviewed by ICT Services regularly to ensure that the College’s needs are met.

Welfare and Privacy

The College’s ICT Network must not be used to compromise the welfare or interfere with the privacy of others. Users are required to comply with Federal and State legislation which may apply from time-to-time with respect to privacy of personal information.

The College’s Confidentiality and Privacy Policy apply at all times.

Other Prohibited Uses

Other prohibited uses of the College’s ICT Network include, but are not limited to:

  • The unauthorised use of passwords to gain access to another user’s information or communications
  • Using the College’s ICT Network for electronic ‘snooping’; ie, to satisfy idle curiosity about the affairs of others, with no business reason for obtaining access to the files or communications of others (this prohibition applies to all users, including ICT Services administrators and supervisors)
  • Using the College’s ICT Network to solicit or conduct business other than the business of the College
  • Soliciting or advocating for issues, causes or organisations of any kind when such solicitation or advocacy is deemed personal in nature and not recognised as furthering the reputation and interests of the College
  • Unauthorised fundraising of any kind
  • Excessive personal use of the College’s ICT Network.

Consequences if this Policy is Breached

Any use of the College’s ICT Network contrary to this policy may result in a withdrawal of access or other disciplinary action. In the case of students, it may also be dealt with under the Student Welfare Policy.

In the event of what the School considers to be a serious breach by a user, disciplinary action may be taken against those users which may result in counselling, warnings or dismissal/expulsion. Any breach of Federal or State laws could also result in criminal charges being brought to bear.

College News
Sorry, there are no events scheduled for the coming week.