Download presentation
Presentation is loading. Please wait.
Published byChester Miles Modified over 9 years ago
2
Granbury I.S.D. Acceptable Use Policy for Technology Resources 2010-2011
3
GISD Provides technology resources to its students and staff for educational and administrative purposes.
4
Some of the material found on the Internet may not be of educational value in the context of a school setting.
5
Users are cautioned to avoid inappropriate material.
6
Granbury ISD Believes the value of information, interaction, and research capabilities outweighs the possiblity that users may obtain material not consistent with the education goals of the District.
7
The District reserves the right to monitor all technology resource activity.
8
Acceptable Use The District’s technology resources will be used only for learning, teaching, and administrative purposes consistent with the District’s mission and goals.
9
Copyright: All users are expected to follow copyright laws.
10
Supervision and Permission: Student use of a computer and computer network must be supervised by a staff member.
11
Inappropriate Account Use: Attempting to log on to a computer or email system by using another user’s password is strictly prohibited.
12
Network – Improper or Illegal Use of any computer or network is prohibitied. Do not submit, publish, display any defamatory, inaccurate, racially offensive, abusive, obscene, profane, sexually oriented, or threatening materials or messages either public or private.
13
Do not use the network for financial gain, political, or commercial activity.
14
Do not attempt or harm equipment, materials or data.
15
Do not attempt or send anonymous messages.
16
Do not attempt or access inappropriate material.
17
Do not place a computer virus on a computer or network.
18
Security Do not share your account with anyone. Never leave your account unattended.
19
Electronic Communication Electronic mail is a privilege, not a right. Electronic communication is not private.
20
Do not use email for political or religious purposes. Delete email regularly to conserve server space. Mass distribution of chain email is not acceptable. Be polite.
21
Violation of the Law Transmission of any material in violation of U.S. or state law is prohibited. This includes, but is not limited to the following: copyrighted material, threatening, harrassing or obscene material, or material protected by trade secret.
22
Any attempt to break the law using the GISD Network/Internet account may result in litigation against the offender by the proper authorities.
23
If such an event should occur, GISD will fully comply with the authorities to provide any information necessary for the litigation process.
24
The use of these technology resources is a privilege, not a right!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.