Download presentation
Presentation is loading. Please wait.
Published byMariah Manning Modified over 8 years ago
1
Ongoing / Living Document
2
In others work without permission, their files, deleting information from the computer of others or computer lab. Using others log on passwords or confidential information. Violating copyright laws. Transferring software belonging to the school. Installing / distributing unlicensed software. Pirating music, documents, and / or games to any school owned computer / tablet.
3
Using technology to embarrass, harass, humiliate, threaten or intimidate others. Submitting, publishing, displaying and / or receiving defamatory, inaccurate, abusive comments, pictures or information about others that could harm them, their reputation or future opportunities. Unauthorized audio / video recordings.
4
Creating, using, viewing, sending, receiving or accessing inappropriate language and images on the school network or internet using a school owned computer. Any language, material or pictures that may be considered sexually explicit, profane, obscene, abusive, racial, violent, unlawful or offensive to others. (screen savers)
5
Failing to notify the helpdesk w/ in 24 hrs. Intentionally damaging, disabling or destroying a school owned computer. Habitual offender of computer neglect.
6
Using technology to relay (give/receive) questions / answers from test, quiz or assignments.
7
Connecting to a secondary Wi-Fi device (hot spot) or external device in an attempt to bypass the school network and security procedures. Attempting to bypass restrictions established by individual teachers. Failing to show up on DyKnow. Failing to be connected to school network using their assigned username and password. Attempting to bypass network security. The use of software for hacking, eavesdropping or network administration / monitoring.
8
Participating in instant messaging, e-mailing, gaming, surfing the net, skyping and other tasks deemed inappropriate during instructional time. (including but not limited to ; facebook, pinterest, hulu, tumblr and haxball).
9
One to one On their time. Remind them of technology expectations. Put it on them, Can they do it? Consequence. E-mail parent, lean on them - advise them you expect their help. Be specific. Follow up w/ parents and let them know how their child is doing after intervention. Parent communication will keep you in the drivers seat.
10
Minor infractions handled by classroom teacher. Repeat minor infractions, refer to DOS. Concerns of possibilities of bypassing networks or breech of security features refer to Technology department. Major infractions refer to DOS.
11
Have plan to start the class each day. Make sure the kids know expectations. Close laptops when not using them. T.D.A. Move around classroom when possible. Don’t burn out trying to catch them. The kids will win.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.