Presentation is loading. Please wait.

Presentation is loading. Please wait.

For Students of Humble ISD

Similar presentations


Presentation on theme: "For Students of Humble ISD"— Presentation transcript:

1 For Students of Humble ISD
Acceptable Use Policy For Students of Humble ISD Using a computer at school is a privilege. It is the responsibility of every student to use it appropriately and according the the district AUP.

2 What is an AUP ? An acceptable use policy (AUP; also sometimes acceptable usage policy or Fair Use Policy) is a set of rules applied by the owner/manager of a network, website or large computer system that restrict the ways in which the network site or system may be used. AUP documents are written for corporations, businesses, universities, schools, internet service providers, and website owners often to reduce the potential for legal action that may be taken by a user.

3 Unacceptable Use of Computers and Network
1. Using the network for any illegal activity 2. Transmitting material in violation of any federal, state, or local law or school district policy 3. Violating software copyright or other contracts 4. Using district technology for financial or commercial or personal gain 5. Degrading or disrupting equipment or system performance 6. Vandalizing hardware 7. Vandalizing the data of another user 8. Wastefully using finite resources 9. Unauthorized use of district resources, including hardware (ie. Digital camera, projector, etc.) and printers for reasons other than school assignments and activities 10. Gaining unauthorized access to resources or entities

4 Unacceptable Use of Computers and Network
11. Invading the privacy of individuals 12. Using someone else’s username and password 13. Placing of unlawful information on a system 14. Using for political lobbying 15. Intentionally accessing pornographic, inappropriate or unauthorized material either directly or by proxy 16. Intentionally bypassing district network systems and/or policies 17. Intentionally transmitting viruses that may result in the loss of recipients' work or systems 18. Chain letters or any type of use that would cause congestion of the networks or otherwise interfere with the work of others 19. Installing software onto computers without appropriate approval

5 Group Activity Get into your groups Answer the questions
Prepare a PowerPoint Answer – Explain your questions. Discuss your scenario and give your solution to the class. Be prepared to explain your reasoning.


Download ppt "For Students of Humble ISD"

Similar presentations


Ads by Google