ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including email and Internet access,

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Expectations, Procedures, Policies Developed by Technology Services 1:1 Laptop Initiative.
Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
The Woodlands High School
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Bring Your On Device. What is BYOD? Students bring an electronic device such as smart phone, laptop, I-Pad, etc to school for: Researching information-
Riverside Community School District
Understanding the Acceptable Use Policy
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
Acceptable Use Policy.  To promote educational excellence in our district by facilitating resource sharing, innovation, and communication for parents,
Using SWHS: The AUP [Acceptable Use Policy]
Electronic Use Policies.   Social Media  Internet.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
00870B2F.0/Internet%20Safety.jpg.
Barren County Schools Student Technology Acceptable Use Policy (AUP)
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Fort Bend ISD Acceptable Use Policy Student Training.
ACPS Acceptable Use Policy Grades 3-5. A Good Technology User: Uses the computer and other technology with good intentions and for educational purposes.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Hoover High School Computer Labs San Diego City Schools Network Use Guidelines.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
INTERNET SAFETY.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Woodland Hills School District Computer Network Acceptable Use Policy.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
School Accounts Presented by: Mrs. Mazzola.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Presentation of Acceptable Use Policy Kathryn Thomas UMUC EDTC 620 Summer 2012.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Crosby ISD Acceptable Use Policy Training
Technology Guidelines for Students
Internet Safety and Acceptable Use Policies.
Internet Safety and Acceptable Use Policies.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Technology Guidelines for Students
Student User Agreement and Policy 2022
Woodland Hills School District
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access, are provided for educational purposes. Adherence to the following policy is necessary for continued access to the school's technological resources.

All Users-Conduct that violates the AUP:  Unauthorized use of a computer account  Using the local area network to gain or attempt to gain unauthorized access to any computer system  Misrepresenting the user’s identity or forging the identity of a user in an electronic correspondence  Displaying or downloading obscene, lewd or sexually harassing images, text or audio  Using electronic mail to harass or threatened others. (includes sending repeated, unwanted to another user)  Transmitting or reproducing materials that are slanderous or defamatory or that otherwise violate existing laws and regulations

All Users-Conduct that violates the AUP  Connecting unauthorized equipment to any part of the network  Unauthorized attempts to circumvent data protection schemes or uncover security loopholes and/or decrypt intentionally secure data  Deliberately or carelessly performing an act that will interfere with the normal operation of computers, terminals, peripherals or networks  Deliberately or carelessly installing or running a program intended to damage or to place excessive burden on the computer system or network. This includes, but is not limited to, programs known as computer viruses, Trojan Horses, and worms  Deliberately wasting or overloading computer resources, such as printing large quantities of a document from a workstation  Violating terms of applicable software licensing agreements or copyright laws

All Users-Conduct that violates the AUP  Attempting to monitor or tamper with another user’s electronic communications or reading, copying, altering, or deleting another user’s files or software without the user’s permission  Using the computer or network facilities to conduct personal or business activities for entertainment or personal gain  Using the computer or network facilities to engage in activities that do not support employee or student learning, instruction, or support processes.

Consequences for Violation  Supervision and Monitoring. School and network administrators and their authorized employees monitor the use of information technology resources to help ensure that uses are secure and in conformity with this policy. Administrators reserve the right to examine, use, and disclose any data found on the school's information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect property. They may also use this information in disciplinary actions, and will furnish evidence of crime to law enforcement.  Consequences for Violation. Violations of these rules will result in disciplinary action, including the loss of a student's privileges to use the school's information technology resources or in extreme situations suspension. Disciplinary action of an employee who violates these rules will result in loss of use, suspension, and/or termination.

Consequences for Violation-Students  LEVEL I General infractions that result in no loss of data and or damage to a technology resource are not classified as a misdemeanor or felony. This level includes account sharing and misuse of computer resources. Penalty may be suspension of one month or more and/or technology resource access for one month or more and a letter of reprimand deposited in the student’s permanent deportment file.  LEVEL II Infractions that result in minor loss of data or damage to a technology resource and are not classified as a misdemeanor or felony. This level includes unauthorized deletion of data files and unauthorized shut-down of file servers. Penalty may be suspension from school for two months and suspension from direct technology resource access for six months and a fine to cover replacement of data or resources.  LEVEL III Infractions that result in irreplaceable loss of data or severe damage to a technology resource and are classified as a misdemeanor or felony. This includes copyright violations and virus introduction into a computer or network. Penalty may be permanent suspension from direct technology resource access and possible criminal charges and expulsion from school, and possible criminal charges and litigation.

Consequences for Violation-Employees  LEVEL I General infractions that result in no loss of data or damage to a technology resource and are not classified as a misdemeanor or felony. This level includes account sharing and misuse of computer resources. Penalty may be suspension of an employee from direct technology resource access for one month and a letter of reprimand deposited in the permanent personnel file.  LEVEL II Infractions that result in minor loss of data or damage to a technology resource and are not classified as a misdemeanor or felony. This level includes unauthorized deletion of data files and unauthorized shut-down of file servers. Penalty may be suspension from the workplace for three days and suspension from direct technology resource access for six months and a fine to cover replacement of data or resources.  LEVEL III Infractions that result in irreplaceable loss of data or severe damage to a technology resource and are classified as a misdemeanor or felony. This includes copyright violations and virus introduction into a computer or network. Penalty may be permanent suspension from direct technology resource access and possible criminal charges and termination of employment.

Questions?  If there is anything in this document you are unsure of please ask. I am more than happy to help!  Students must sign the Acceptable Use Policy contract and turn in to the teacher before using any technology inside the classroom or school.  *Resources-This Acceptable Use Policy was modeled after: olicy.pdf