Start Finish #1. Which of the following school employees are the only ones who are authorized for changing computer settings and configurations? Myself.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Laptop Responsibilities Memorial Middle School Laredo ISD.
Northside I.S.D. Acceptable Use Policy
Cyber Safety Assessment Review
Hart District Acceptable Use Policy Acceptable Use Policy.
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Woodland Hills School District Computer Network Acceptable Use Policy.
The Woodlands High School
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
 I will not post personal information (includes picture)  I will not agree to meet someone I met online  I will notify teacher of inappropriate messages.
Riverside Community School District
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
For Students of Humble ISD
Aaron Cauchi Nurse Informatics
Who do I belong to? Webpages EduphoriaFirstClassBlackboardEdusoft District program that allows staff development registration, lesson plans, helpdesk.
Fort Bend ISD Acceptable Use Policy Student Training.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Using SWHS: The AUP [Acceptable Use Policy]
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Junior High Computer Lab.
Employee Guidelines for Acceptable Use of Technology Resources.
COMPUTER ETHICS Do you know the difference between right and wrong?
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
1 Use of Telecommunications & Network 2 SCHOOL DISTRICT OF CLAY COUNTY TELECOMMUNICATIONS NETWORK OVERVIEW 1.SDCC provides opportunity for students to.
Clark County School District (CCSD)
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Barren County Schools Student Technology Acceptable Use Policy (AUP)
Fort Bend ISD Acceptable Use Policy Training Student Training.
Fort Bend ISD Acceptable Use Policy Student Training.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
Mrs.. Taylor Cedar High School Business Web Page Design.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
PROGRAMMING JAVA Mrs. Taylor Top Ten Best Careers for College Students Mind2it.com 1. Software Engineer 1. Software Engineer 5. Computer Systems.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Leslie Lambert Q310-2, Winter 2001, Technology Policies The Technology Policies We Need Now and Why Is our current AUP acceptable?
TECHNOLOGY USE AGREEMENT FOR STUDENTS GRADES 3-8 This presentation was created to help students understand the district’s Technology Use Agreement before.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Squalicum High School Computer Network Student Use Guidelines.
Digital Citizenship Eagle Ridge’s School Policy. Expectations for Students  Students are invited to use their personal devices as directed by their teacher.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
The goal of BYOD programs is to expand opportunities for 21st Century learning. However, using personally owned devices at school is a privilege, not.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Library Orientation  Before School 1. Library is open by 6:30 AM 2. Do NOT need a pass 3. Will need to sign in 4. Must leave the library to.
EPals ePals is your school account Communicate with group members/teachers stu.gbaps.org.
Woodland Hills School District Computer Network Acceptable Use Policy.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
1 Crosby ISD Acceptable Use Policy Training Student Training.
Crosby ISD Acceptable Use Policy Training
Clark County School District
Technology Guidelines for Students
Technology Guidelines for Students
Forms, Forms and yes, more Forms (but not as many as last year)
The Issues with Technology in education
Student User Agreement and Policy 2022
Students will not engage in any illegal activity including copyright infringement, vandalism, or harassment on the computer.
Woodland Hills School District
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Start Finish #1

Which of the following school employees are the only ones who are authorized for changing computer settings and configurations? Myself and/or my student helper Grade/department chair or team leaders District Computer Technicians Librarian or Library Aide Myself and/or my student helper Grade/department chair or team leaders District Computer Technicians Librarian or Library Aide

Start Finish #1 #2

In Vidor ISD I am given access to VISDs network and Internet via a computer and am responsible for: Proper conduct while using the computer to send and receive and searching the InternetProper conduct while using the computer to send and receive and searching the Internet Adhering to district guidelines Being aware of ethical and legal responsibilitiesBeing aware of ethical and legal responsibilities All of the above Proper conduct while using the computer to send and receive and searching the InternetProper conduct while using the computer to send and receive and searching the Internet Adhering to district guidelines Being aware of ethical and legal responsibilitiesBeing aware of ethical and legal responsibilities All of the above

Start Finish #1 #2 #3

Which disciplinary actions can be taken for violation of districts AUP for electronic communications? Loss of network privileges Written reprimand Suspension or termination of employmentSuspension or termination of employment All of the above Loss of network privileges Written reprimand Suspension or termination of employmentSuspension or termination of employment All of the above

Start Finish #1 #2 #3 #4

Which of the following types of software may be installed on my computer? Programs licensed and purchased by the school or districtPrograms licensed and purchased by the school or district Programs copied from family or colleaguesPrograms copied from family or colleagues Programs that are non-educational games or contain inappropriate graphicsPrograms that are non-educational games or contain inappropriate graphics Free programs received through the mail Programs licensed and purchased by the school or districtPrograms licensed and purchased by the school or district Programs copied from family or colleaguesPrograms copied from family or colleagues Programs that are non-educational games or contain inappropriate graphicsPrograms that are non-educational games or contain inappropriate graphics Free programs received through the mail

Start Finish #1 #2 #3 #4 #5

As a system user, I am responsible for: Learning my password(s) and sharing them only with those I feel are responsibleLearning my password(s) and sharing them only with those I feel are responsible Learning my password(s) and keeping them strictly confidentialLearning my password(s) and keeping them strictly confidential Learning my password(s) and allowing only the good and trusted students to have themLearning my password(s) and allowing only the good and trusted students to have them Learning my password(s) and only letting my grade/team leader have themLearning my password(s) and only letting my grade/team leader have them Learning my password(s) and sharing them only with those I feel are responsibleLearning my password(s) and sharing them only with those I feel are responsible Learning my password(s) and keeping them strictly confidentialLearning my password(s) and keeping them strictly confidential Learning my password(s) and allowing only the good and trusted students to have themLearning my password(s) and allowing only the good and trusted students to have them Learning my password(s) and only letting my grade/team leader have themLearning my password(s) and only letting my grade/team leader have them

Start Finish #1 #2 #3 #4 #5 #6

While using my account I understand that: My electronic communications are private and cannot be accessed by anyone elseMy electronic communications are private and cannot be accessed by anyone else My electronic communications may be reviewed and read by district network administratorsMy electronic communications may be reviewed and read by district network administrators My electronic communications cannot be reviewed or read without my permissionMy electronic communications cannot be reviewed or read without my permission My electronic communications are private and cannot be accessed by anyone elseMy electronic communications are private and cannot be accessed by anyone else My electronic communications may be reviewed and read by district network administratorsMy electronic communications may be reviewed and read by district network administrators My electronic communications cannot be reviewed or read without my permissionMy electronic communications cannot be reviewed or read without my permission

Start Finish #1 #2 #3 #4 #5 #6 #7

Which of the following types of software may an employee install on a district computer? Freeware or shareware downloaded from the InternetFreeware or shareware downloaded from the Internet Commercial or educational software purchased from a vendor or storeCommercial or educational software purchased from a vendor or store Utilities program such as virus programs or disk doctorsUtilities program such as virus programs or disk doctors None of the above Freeware or shareware downloaded from the InternetFreeware or shareware downloaded from the Internet Commercial or educational software purchased from a vendor or storeCommercial or educational software purchased from a vendor or store Utilities program such as virus programs or disk doctorsUtilities program such as virus programs or disk doctors None of the above

Start Finish #1 #2 #3 #4 #5 #6 #7 #8

Which of the following is a true statement? I can allow a student to take the classroom attendance for me when I am busy with a student or have a sub in my class.I can allow a student to take the classroom attendance for me when I am busy with a student or have a sub in my class. I should let a fellow team member or trusted students enter my grades in the gradebook program when I am unable to do so myself.I should let a fellow team member or trusted students enter my grades in the gradebook program when I am unable to do so myself. I should never allow a student to work in the attendance, gradebook, or other password restricted programs on my computer.I should never allow a student to work in the attendance, gradebook, or other password restricted programs on my computer. I should leave my password written on a note near my computer in case I forget it and am unable to take attendance or enter grades.I should leave my password written on a note near my computer in case I forget it and am unable to take attendance or enter grades.

Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9

Which of the following is a true statement? When using the Internet I am protected from accessing all inappropriate material.When using the Internet I am protected from accessing all inappropriate material. When using the Internet my log of Internet sites visited can be reviewed and traced to verify appropriate use.When using the Internet my log of Internet sites visited can be reviewed and traced to verify appropriate use. When using the Internet I have permission to try to visit questionable sites before and after school, as long as students are not in my room.When using the Internet I have permission to try to visit questionable sites before and after school, as long as students are not in my room. When using the Internet the program N2H2 ensures that my use of the Internet is completely safe and secure.When using the Internet the program N2H2 ensures that my use of the Internet is completely safe and secure. When using the Internet I am protected from accessing all inappropriate material.When using the Internet I am protected from accessing all inappropriate material. When using the Internet my log of Internet sites visited can be reviewed and traced to verify appropriate use.When using the Internet my log of Internet sites visited can be reviewed and traced to verify appropriate use. When using the Internet I have permission to try to visit questionable sites before and after school, as long as students are not in my room.When using the Internet I have permission to try to visit questionable sites before and after school, as long as students are not in my room. When using the Internet the program N2H2 ensures that my use of the Internet is completely safe and secure.When using the Internet the program N2H2 ensures that my use of the Internet is completely safe and secure.

Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10

Since the district has allowed me limited personal use of the Internet and which of the following activities are acceptable? Chain letters and/or s to everyone with cute jokes or advertisementChain letters and/or s to everyone with cute jokes or advertisement Commercial activities Political lobbying None of the above Chain letters and/or s to everyone with cute jokes or advertisementChain letters and/or s to everyone with cute jokes or advertisement Commercial activities Political lobbying None of the above

Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11

When I get an that contains obscene or pornographic material I should : Print a copy and place it in a file for future reference.Print a copy and place it in a file for future reference. Share it with my fellow colleagues by forwarding it to them.Share it with my fellow colleagues by forwarding it to them. Delete the from my inbox and trash folder and politely notify the sender that it was inappropriate for me to receive such material at work.Delete the from my inbox and trash folder and politely notify the sender that it was inappropriate for me to receive such material at work. Leave it on my machine but file it in a special folder so that it cannot be immediately seen.Leave it on my machine but file it in a special folder so that it cannot be immediately seen. Print a copy and place it in a file for future reference.Print a copy and place it in a file for future reference. Share it with my fellow colleagues by forwarding it to them.Share it with my fellow colleagues by forwarding it to them. Delete the from my inbox and trash folder and politely notify the sender that it was inappropriate for me to receive such material at work.Delete the from my inbox and trash folder and politely notify the sender that it was inappropriate for me to receive such material at work. Leave it on my machine but file it in a special folder so that it cannot be immediately seen.Leave it on my machine but file it in a special folder so that it cannot be immediately seen.

Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11 #12

While creating written projects, multimedia projects, or web pages which of the following copyright laws are appropriate? I may copy professional logos to use on a school website.I may copy professional logos to use on a school website. I may not use any copyrighted materials without written/electronic permission from the company or webmaster.I may not use any copyrighted materials without written/electronic permission from the company or webmaster. I may use all pictures from a web page as long as it is not a company logo.I may use all pictures from a web page as long as it is not a company logo. Even though I must get permission to use the pictures and graphics I have permission to use music files.Even though I must get permission to use the pictures and graphics I have permission to use music files. I may copy professional logos to use on a school website.I may copy professional logos to use on a school website. I may not use any copyrighted materials without written/electronic permission from the company or webmaster.I may not use any copyrighted materials without written/electronic permission from the company or webmaster. I may use all pictures from a web page as long as it is not a company logo.I may use all pictures from a web page as long as it is not a company logo. Even though I must get permission to use the pictures and graphics I have permission to use music files.Even though I must get permission to use the pictures and graphics I have permission to use music files.

Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11#12 #13

Which of the following is unacceptable when using district equipment or materials? Malicious attempt to harm, modify or destroy district equipment or materialsMalicious attempt to harm, modify or destroy district equipment or materials Moving of hardware(computer, monitor, printer,etc.) from set place without permission of building TIS or technicianMoving of hardware(computer, monitor, printer,etc.) from set place without permission of building TIS or technician Placing stickers on units or stacking papers and materials around equipment that can prevent proper ventilationPlacing stickers on units or stacking papers and materials around equipment that can prevent proper ventilation All of the above Malicious attempt to harm, modify or destroy district equipment or materialsMalicious attempt to harm, modify or destroy district equipment or materials Moving of hardware(computer, monitor, printer,etc.) from set place without permission of building TIS or technicianMoving of hardware(computer, monitor, printer,etc.) from set place without permission of building TIS or technician Placing stickers on units or stacking papers and materials around equipment that can prevent proper ventilationPlacing stickers on units or stacking papers and materials around equipment that can prevent proper ventilation All of the above

Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11#12#13 #14

If an employee is arrested by law enforcement or the FBI for inappropriate use of , Internet, or copyright violations VISD will: Provide legal defense in support for employee during time of litigation.Provide legal defense in support for employee during time of litigation. Pay for any expenses while defending ones self on charges.Pay for any expenses while defending ones self on charges. In no way be liable for any inappropriate use of district computers or VISD network usage.In no way be liable for any inappropriate use of district computers or VISD network usage. Send a representative from the district to meet with law enforcement to ensure that your rights are not violated.Send a representative from the district to meet with law enforcement to ensure that your rights are not violated.

Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11#12#13 #14 #15

Employee names and addresses are: Available only to VISD employees Not available to anyone Available to VISD employees and the publicAvailable to VISD employees and the public None of the above Available only to VISD employees Not available to anyone Available to VISD employees and the publicAvailable to VISD employees and the public None of the above

Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11#12#13 #14 #15 #16

Student photographs may be published on a district web page: With permission of the Director of TechnologyWith permission of the Director of Technology With permission of the Building PrincipalWith permission of the Building Principal With permission of the Superintendent With permission of the students parentsWith permission of the students parents With permission of the Director of TechnologyWith permission of the Director of Technology With permission of the Building PrincipalWith permission of the Building Principal With permission of the Superintendent With permission of the students parentsWith permission of the students parents

Start Finish #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11#12#13 #14 #15 #16 #17

VISDs goal in providing access to the network and the Internet is: To promote educational excellence. To compete with other school districts.To compete with other school districts. To allow teachers access who do not have it at home.To allow teachers access who do not have it at home. To attract new teachers to the district.To attract new teachers to the district. To promote educational excellence. To compete with other school districts.To compete with other school districts. To allow teachers access who do not have it at home.To allow teachers access who do not have it at home. To attract new teachers to the district.To attract new teachers to the district.

Start Good Job #1 #2 #3 #4 #5 #6 #7 #8 #9 #10#11#12#13 #14 #15 #16#17 Start Over VISD Tech