Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ongoing / Living Document.  In others work without permission, their files, deleting information from the computer of others or computer lab.  Using.

Similar presentations


Presentation on theme: "Ongoing / Living Document.  In others work without permission, their files, deleting information from the computer of others or computer lab.  Using."— Presentation transcript:

1 Ongoing / Living Document

2  In others work without permission, their files, deleting information from the computer of others or computer lab.  Using others log on passwords or confidential information.  Violating copyright laws.  Transferring software belonging to the school.  Installing / distributing unlicensed software.  Pirating music, documents, and / or games to any school owned computer / tablet.

3  Using technology to embarrass, harass, humiliate, threaten or intimidate others.  Submitting, publishing, displaying and / or receiving defamatory, inaccurate, abusive comments, pictures or information about others that could harm them, their reputation or future opportunities.  Unauthorized audio / video recordings.

4  Creating, using, viewing, sending, receiving or accessing inappropriate language and images on the school network or internet using a school owned computer.  Any language, material or pictures that may be considered sexually explicit, profane, obscene, abusive, racial, violent, unlawful or offensive to others. (screen savers)

5  Failing to notify the helpdesk w/ in 24 hrs.  Intentionally damaging, disabling or destroying a school owned computer.  Habitual offender of computer neglect.

6  Using technology to relay (give/receive) questions / answers from test, quiz or assignments.

7  Connecting to a secondary Wi-Fi device (hot spot) or external device in an attempt to bypass the school network and security procedures.  Attempting to bypass restrictions established by individual teachers.  Failing to show up on DyKnow.  Failing to be connected to school network using their assigned username and password.  Attempting to bypass network security.  The use of software for hacking, eavesdropping or network administration / monitoring.

8  Participating in instant messaging, e-mailing, gaming, surfing the net, skyping and other tasks deemed inappropriate during instructional time. (including but not limited to ; facebook, pinterest, hulu, tumblr and haxball).

9  One to one  On their time.  Remind them of technology expectations.  Put it on them, Can they do it?  Consequence.  E-mail parent, lean on them - advise them you expect their help. Be specific.  Follow up w/ parents and let them know how their child is doing after intervention.  Parent communication will keep you in the drivers seat.

10  Minor infractions handled by classroom teacher.  Repeat minor infractions, refer to DOS.  Concerns of possibilities of bypassing networks or breech of security features refer to Technology department.  Major infractions refer to DOS.

11  Have plan to start the class each day. Make sure the kids know expectations.  Close laptops when not using them. T.D.A.  Move around classroom when possible.  Don’t burn out trying to catch them. The kids will win.


Download ppt "Ongoing / Living Document.  In others work without permission, their files, deleting information from the computer of others or computer lab.  Using."

Similar presentations


Ads by Google