Download presentation
Presentation is loading. Please wait.
Published byAbner Robbins Modified over 8 years ago
2
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including email and Internet access, are provided for educational purposes. Adherence to the following policy is necessary for continued access to the school's technological resources.
3
All Users-Conduct that violates the AUP: Unauthorized use of a computer account Using the local area network to gain or attempt to gain unauthorized access to any computer system Misrepresenting the user’s identity or forging the identity of a user in an electronic correspondence Displaying or downloading obscene, lewd or sexually harassing images, text or audio Using electronic mail to harass or threatened others. (includes sending repeated, unwanted e-mail to another user) Transmitting or reproducing materials that are slanderous or defamatory or that otherwise violate existing laws and regulations
4
All Users-Conduct that violates the AUP Connecting unauthorized equipment to any part of the network Unauthorized attempts to circumvent data protection schemes or uncover security loopholes and/or decrypt intentionally secure data Deliberately or carelessly performing an act that will interfere with the normal operation of computers, terminals, peripherals or networks Deliberately or carelessly installing or running a program intended to damage or to place excessive burden on the computer system or network. This includes, but is not limited to, programs known as computer viruses, Trojan Horses, and worms Deliberately wasting or overloading computer resources, such as printing large quantities of a document from a workstation Violating terms of applicable software licensing agreements or copyright laws
5
All Users-Conduct that violates the AUP Attempting to monitor or tamper with another user’s electronic communications or reading, copying, altering, or deleting another user’s files or software without the user’s permission Using the computer or network facilities to conduct personal or business activities for entertainment or personal gain Using the computer or network facilities to engage in activities that do not support employee or student learning, instruction, or support processes.
6
Consequences for Violation Supervision and Monitoring. School and network administrators and their authorized employees monitor the use of information technology resources to help ensure that uses are secure and in conformity with this policy. Administrators reserve the right to examine, use, and disclose any data found on the school's information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect property. They may also use this information in disciplinary actions, and will furnish evidence of crime to law enforcement. Consequences for Violation. Violations of these rules will result in disciplinary action, including the loss of a student's privileges to use the school's information technology resources or in extreme situations suspension. Disciplinary action of an employee who violates these rules will result in loss of use, suspension, and/or termination.
7
Consequences for Violation-Students LEVEL I General infractions that result in no loss of data and or damage to a technology resource are not classified as a misdemeanor or felony. This level includes account sharing and misuse of computer resources. Penalty may be suspension of one month or more and/or technology resource access for one month or more and a letter of reprimand deposited in the student’s permanent deportment file. LEVEL II Infractions that result in minor loss of data or damage to a technology resource and are not classified as a misdemeanor or felony. This level includes unauthorized deletion of data files and unauthorized shut-down of file servers. Penalty may be suspension from school for two months and suspension from direct technology resource access for six months and a fine to cover replacement of data or resources. LEVEL III Infractions that result in irreplaceable loss of data or severe damage to a technology resource and are classified as a misdemeanor or felony. This includes copyright violations and virus introduction into a computer or network. Penalty may be permanent suspension from direct technology resource access and possible criminal charges and expulsion from school, and possible criminal charges and litigation.
8
Consequences for Violation-Employees LEVEL I General infractions that result in no loss of data or damage to a technology resource and are not classified as a misdemeanor or felony. This level includes account sharing and misuse of computer resources. Penalty may be suspension of an employee from direct technology resource access for one month and a letter of reprimand deposited in the permanent personnel file. LEVEL II Infractions that result in minor loss of data or damage to a technology resource and are not classified as a misdemeanor or felony. This level includes unauthorized deletion of data files and unauthorized shut-down of file servers. Penalty may be suspension from the workplace for three days and suspension from direct technology resource access for six months and a fine to cover replacement of data or resources. LEVEL III Infractions that result in irreplaceable loss of data or severe damage to a technology resource and are classified as a misdemeanor or felony. This includes copyright violations and virus introduction into a computer or network. Penalty may be permanent suspension from direct technology resource access and possible criminal charges and termination of employment.
9
Questions? If there is anything in this document you are unsure of please ask. I am more than happy to help! Students must sign the Acceptable Use Policy contract and turn in to the teacher before using any technology inside the classroom or school. *Resources-This Acceptable Use Policy was modeled after: http://www.bcps.k12.md.us/School_Board/pdf/Technology_Acceptable_Use_P olicy.pdf
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.