Student Email Accounts OFFICE 365 Student Email Accounts.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Woodland Hills School District Computer Network Acceptable Use Policy.
The Woodlands High School
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
Riverside Community School District
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Duxbury’s Acceptable Use Policy Do they really expect me to read all of that stuff? Nicholas Tam Do they really expect me to read all of that stuff? Nicholas.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
For Students of Humble ISD
Grade 5 Student Assistants
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Using SWHS: The AUP [Acceptable Use Policy]
Electronic Use Policies.   Social Media  Internet.
Arp Acceptable Use Policy for Junior High School Students Approved by the Board Sept 1998 Updated: August, 2011.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Security Issues and Ethics in Education
Barren County Schools Student Technology Acceptable Use Policy (AUP)
Digital Citizenship Created By: Kelli Stinson June 2011.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Security and Ethics Safeguards and Codes of Conduct.
Woodland Hills School District Computer Network Acceptable Use Policy.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
ACCEPTABLE USE POLICY Perry Township Schools. ISTE-T Standard, Description and Rationale Standard #4 Promote and Model Digital Citizenship and Responsibility.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
OFFICE 365 Student Account.
Crosby ISD Acceptable Use Policy Training
Acceptable Use Policy (Draft)
Digital Citizenship Grades 4-6
Computer Safety and Ethics
Technology Guidelines for Students
LAUSD Responsible Use Policy (RUP)
Internet Safety and Acceptable Use Policies.
Technology Guidelines for Students
Forms, Forms and yes, more Forms (but not as many as last year)
The Issues with Technology in education
Student User Agreement and Policy 2022
Students will not engage in any illegal activity including copyright infringement, vandalism, or harassment on the computer.
Woodland Hills School District
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Student Email Accounts OFFICE 365 Student Email Accounts

Educational Purpose and Acceptable Use of Electronic Resources, Technologies and the Internet West Virginia Board of Education (WVBE) Title 126 – Series 41(Amends Policy 2460):

Digital/Network Etiquette: Users are expected to abide by the generally accepted rules of digital/network etiquette. These include, but are not limited to, the following: Be polite. Do not write or send abusive messages to others. Use proper English and appropriate language; avoid “Netspeak.” Do not swear; do not use vulgarities or other inappropriate language. Digital/Network Etiquette:

Digital/Network Etiquette: Use extreme caution when revealing personal information, including a home address and phone number, on web sites, blogs, podcasts, videos, wikis, e-mail or as content on any other electronic medium. Do not reveal, on any electronic medium, personal information about another individual. Never put financial information in an e-mail. Notify the appropriate school authority of any dangerous or inappropriate information or messages encountered. Digital/Network Etiquette:

Accountability and Responsibility The WVDE will not be responsible for any damages, including loss of data or service interruptions. Accountability and Responsibility

Accountability and Responsibility Students need to know about appropriate online behavior, including interacting with other individuals on social networking websites and in chat rooms and cyber bullying awareness and response. Students can be held responsible for their online activity even if off-site. Accountability and Responsibility

Use of Electronic Resources, Technology and the Internet. The WVDE provides the network system, e-mail accounts and Internet access as tools for education - users should have no expectation of privacy. The WVDE reserves the right to monitor, inspect, investigate, copy, review and store, without prior notice, information about the content and usage of network resources (e.g. files, Internet access, and email accounts.) Use of Electronic Resources, Technology and the Internet.

Use of Electronic Resources, Technology and the Internet. The use of the Office 365 platform is an extension of the students' responsibility in the classroom (and the AUP) and must follow all federal and state laws as well as state and local policies. Use of Electronic Resources, Technology and the Internet.

Use of Electronic Resources, Technology and the Internet. Unacceptable Use: Inappropriate use or transmission of any material in violation of any U.S. or state law or regulation is prohibited. This includes, but is not limited to, copyrighted material, threatening, abusive, or obscene material, or material protected by trade secrets. Illegal activities and privacy and safety violations of COPPA, CIPA and FERPA are strictly prohibited. Use of Electronic Resources, Technology and the Internet.

Use of Electronic Resources, Technology and the Internet. Specific examples of unacceptable and/or unauthorized use include, but are not limited to: Viewing, creating, accessing, uploading, downloading, storing, sending, or distributing obscene, pornographic or sexually explicit material. Downloading, uploading and/or executing malware - viruses, worms, Trojan horses, time bombs, bots, spyware, SPAM, etc., and changes to tools used to filter content or monitor hardware and software. Using e-mail accounts other than one's own. Passwords are the first level of security for a user account. E-mail and system logins and accounts are to be used only by the authorized owner of the account, for authorized purposes. Students are responsible for all activity on their account and must not share their account IDs and passwords. Use of Electronic Resources, Technology and the Internet.

Use of Electronic Resources, Technology and the Internet. Specific examples of unacceptable and/or unauthorized use include, but are not limited to: Illegally accessing or attempting to access another person's data or personal system files or unauthorized access to other state/district/school computers, networks and information systems. Supplying your password and user information to any electronic request or sharing them with others via any other communications. Storing passwords in a file without encryption. Using the “remember password” feature of Internet browsers and e-mail clients. Leaving the computer without locking the screen or logging off. Use of Electronic Resources, Technology and the Internet.

Use of Electronic Resources, Technology and the Internet. Specific examples of unacceptable and/or unauthorized use include, but are not limited to: Corrupting, destroying, deleting, or manipulating system data with malicious intent. Requesting that inappropriate material be transferred. Violating safety and/or security measures when using e-mail, chat rooms, blogs, wikis, social networking sites, Web 2.0 tools and other forms of electronic communications. Hacking, cracking, vandalizing or any other unlawful online activities. Disclosing, using, or disseminating personal information regarding students. Use of Electronic Resources, Technology and the Internet.

Use of Electronic Resources, Technology and the Internet. Specific examples of unacceptable and/or unauthorized use include, but are not limited to: Cyber bullying, hate mail, defamation, harassment of any kind, discriminatory jokes and remarks and other unauthorized uses as referenced in WVBE policies or other policies and laws. Personal gain, commercial solicitation and compensation of any kind. Any activity which results in liability or cost incurred by the district. Downloading, installing and/or executing non-educational gaming, audio files, video files or other applications (including shareware or freeware) without permission or approval. Use of Electronic Resources, Technology and the Internet.

Use of Electronic Resources, Technology and the Internet. Specific examples of unacceptable and/or unauthorized use include, but are not limited to: Support or opposition for ballot measures, candidates and any other political activity. Information posted, sent or stored online that could endanger others (e.g., bomb construction, drug manufacture, etc.). Plagiarism or reproducing/repurposing audio/video without permission/consent. Use of Electronic Resources, Technology and the Internet.

Use of Electronic Resources, Technology and the Internet. Specific examples of unacceptable and/or unauthorized use include, but are not limited to: Vandalizing technology equipment or data. Vandalism is defined as any attempt to harm or destroy data of another user or to intentionally damage equipment or any connections that are part of the Internet. Uses related to or in support of illegal activities will be reported to authorities. Use of Electronic Resources, Technology and the Internet.

Use of Electronic Resources, Technology and the Internet. Filtering: Electronic filtering installed by the WVDE provides filtering for all public schools. Providing this service at the state level enables districts/schools to meet Children's Internet Protection Act (CIPA) guideline requirements for filtering. Filtering software is not 100% effective. While filters make it more difficult for objectionable material to be received or accessed, filters are not a solution in themselves. Every user must take responsibility for his or her use of the network and Internet and avoid objectionable sites. Use of Electronic Resources, Technology and the Internet.

Use of Electronic Resources, Technology and the Internet. Filtering: Any attempts to defeat or bypass the state’s Internet filter or conceal Internet activity are prohibited. This includes, but is not limited to, proxies, or modifications to state browser settings and any other techniques designed to evade filtering or enable the publication of inappropriate content. E-mail inconsistent with the educational missions of the state, district or school will be considered SPAM and blocked from entering e-mail boxes. Use of Electronic Resources, Technology and the Internet.

Use of Electronic Resources, Technology and the Internet. Copyright: Copyright laws protect the rights of people who create intellectual property by providing the creator with exclusive rights to license, sell or use the works. A creator owns the rights of reproduction, adaptation, distribution, public performance, public display, digital transmission and moral rights. Downloading, copying, duplicating and distributing software, music, sound files, movies, images or other copyrighted materials without the specific written permission of the copyright owner is generally prohibited. However, the duplication and distribution of materials for educational purposes are permitted if and when such duplication and distribution fall within the Fair Use Doctrine of the United States Copyright Law (Title 17, United States Code http://copyright.gov/title17/) and content is cited appropriately. Students are expected to adhere to the copyright laws. Use of Electronic Resources, Technology and the Internet.

Key points – Office 365 Everyone with an account will have 5 installs at home. A K-12 student could use their account information and upgrade their home computers to match what is being used at school. A family with two K-12 children would get 10 installs at home. IPads, iPhones, Android devices, tablets, and most modern mobile devices are also covered. 50 GIGABYTES of online email storage! Unified Calendar One TERABYTE (TB) of online document storage (OneDrive) Greater security through encryption

Remember: Be safe No Bullying Beware of malware (including ‘phishing’)

Title 126 – Series 41 Amending WVBE Policy 2460