Ongoing / Living Document.  In others work without permission, their files, deleting information from the computer of others or computer lab.  Using.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Northside I.S.D. Acceptable Use Policy
Developed by Technology Services 1:1 Laptop Initiative
Hart District Acceptable Use Policy Acceptable Use Policy.
Meridian Middle School Parent Orientation and Internet Safety Evening.
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Woodland Hills School District Computer Network Acceptable Use Policy.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Forms of Cyberbullying
The Woodlands High School
Using Technology the CCSD Way by Dr. Kathi Vanderbilt.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
Washburn High School Student “Responsible Use” Guidelines for Electronic Technologies.
What and what not to do..  These devices must remain turned off during the instructional day, including during all testing, unless they are being used.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
 I will not post personal information (includes picture)  I will not agree to meet someone I met online  I will notify teacher of inappropriate messages.
Riverside Community School District
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Grade 5 Student Assistants
Computer Lab Rules No food or drink in the lab. That includes gum and candy. Obey all regular classroom rules. Treat the computer with respect: Please.
Using SWHS: The AUP [Acceptable Use Policy]
Elementary GCCISD Agreement for Computing and Electronic Communications.
Electronic Use Policies.   Social Media  Internet.
2 EVE&feature=player_detailpage.
Onslow County Schools Division of Media and Instructional Technology This presentation was prepared under fair use exemption of the U.S. Copyright Law.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
AP ENGLISH/AP HISTORY DIGITAL CONVERSION PARENT INFORMATION MEETING.
Clark County School District (CCSD)
THS Print Media Mrs. Brocious Room 63, ext. 215
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Welcome to Computer Applications East High School
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
Hoover High School Computer Labs San Diego City Schools Network Use Guidelines.
BYOD: Bring Your Own Device
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Secondary GCCISD Agreement for Computing and Electronic Communications.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
The goal of BYOD programs is to expand opportunities for 21st Century learning. However, using personally owned devices at school is a privilege, not.
1 Why Use Technology?  Research  Independent Learning  Immediate Feedback  Organization.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
EPals ePals is your school account Communicate with group members/teachers stu.gbaps.org.
Woodland Hills School District Computer Network Acceptable Use Policy.
School Accounts Presented by: Mrs. Mazzola.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
Internet Safety. Online Concerns: Contact Content Conduct.
Clark County School District
Technology Guidelines for Students
Internet Safety and Acceptable Use Policies.
Welcome to Scarlet Block
Internet Safety and Acceptable Use Policies.
Acceptable Use Policy Grace Lowe.
Technology Guidelines for Students
Student User Agreement and Policy 2022
Welcome to Computer Applications!
Woodland Hills School District
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Ongoing / Living Document

 In others work without permission, their files, deleting information from the computer of others or computer lab.  Using others log on passwords or confidential information.  Violating copyright laws.  Transferring software belonging to the school.  Installing / distributing unlicensed software.  Pirating music, documents, and / or games to any school owned computer / tablet.

 Using technology to embarrass, harass, humiliate, threaten or intimidate others.  Submitting, publishing, displaying and / or receiving defamatory, inaccurate, abusive comments, pictures or information about others that could harm them, their reputation or future opportunities.  Unauthorized audio / video recordings.

 Creating, using, viewing, sending, receiving or accessing inappropriate language and images on the school network or internet using a school owned computer.  Any language, material or pictures that may be considered sexually explicit, profane, obscene, abusive, racial, violent, unlawful or offensive to others. (screen savers)

 Failing to notify the helpdesk w/ in 24 hrs.  Intentionally damaging, disabling or destroying a school owned computer.  Habitual offender of computer neglect.

 Using technology to relay (give/receive) questions / answers from test, quiz or assignments.

 Connecting to a secondary Wi-Fi device (hot spot) or external device in an attempt to bypass the school network and security procedures.  Attempting to bypass restrictions established by individual teachers.  Failing to show up on DyKnow.  Failing to be connected to school network using their assigned username and password.  Attempting to bypass network security.  The use of software for hacking, eavesdropping or network administration / monitoring.

 Participating in instant messaging, ing, gaming, surfing the net, skyping and other tasks deemed inappropriate during instructional time. (including but not limited to ; facebook, pinterest, hulu, tumblr and haxball).

 One to one  On their time.  Remind them of technology expectations.  Put it on them, Can they do it?  Consequence.  parent, lean on them - advise them you expect their help. Be specific.  Follow up w/ parents and let them know how their child is doing after intervention.  Parent communication will keep you in the drivers seat.

 Minor infractions handled by classroom teacher.  Repeat minor infractions, refer to DOS.  Concerns of possibilities of bypassing networks or breech of security features refer to Technology department.  Major infractions refer to DOS.

 Have plan to start the class each day. Make sure the kids know expectations.  Close laptops when not using them. T.D.A.  Move around classroom when possible.  Don’t burn out trying to catch them. The kids will win.