OKALOOSA COUNTY SCHOOL DISTRICT ELECTRONIC RESOURCES RULES OF ACCEPTABLE USE FOR STUDENTS
|
|
|
- Heather Stevens
- 10 years ago
- Views:
Transcription
1 OKALOOSA COUNTY SCHOOL DISTRICT ELECTRONIC RESOURCES RULES OF ACCEPTABLE USE FOR STUDENTS This is a revision to the previously Board approved Internet Acceptable Use Policy/Procedures in order to comply with the requirements of the Children s Internet Protection Act ( CIPA ) and to implement additional Internet safety provisions and actions. These revised rules were adopted by the School Board of Okaloosa County, Florida on June 24, Information Technology provides exciting opportunities to expand learning for students and educators. However, with this opportunity comes the responsibility for appropriate use. The intent of the Okaloosa County School District s Electronic Resources Rules of for Acceptable Use for Students is to: (a) prevent user access over its computer network to, or transmission of, inappropriate material via Internet, electronic mail, or other forms of direct electronic communications; (b) prevent unauthorized access and other unlawful online activity; (c) prevent unauthorized online disclosure, use, or dissemination of personal identification information of minors; and (d) comply with the Children s Internet Protection Act [Pub. L. No and 47 USC 254(h)]. Therefore, the School Board of Okaloosa County has adopted the following Rules of Acceptable Use and procedural guidelines for accessing and using the electronic resources in Okaloosa County schools. OVERVIEW The Internet, a world-wide telecommunications network which allows millions of computers to exchange information, will be accessible to all Okaloosa County Schools through the Okaloosa Metropolitan Area Network (OMAN) and through various other access providers. The OMAN has not been established as a public access service or as a public forum. Therefore, the School Board of Okaloosa County has the right to place reasonable restrictions on the material accessed or posted through the system. Users are also expected to follow the rules set forth in the Code of Student Conduct and the law in their use of the Internet. Our goal in providing Internet access to faculty, staff and students is to promote educational excellence in the Okaloosa County Schools by facilitating resource sharing, innovation and communication. With access to computers and people all over the world comes the availability of material that may not be considered educationally valuable in the context of the school setting. There may be some material or individual communications which are not suitable for school-aged children. The School Board of Okaloosa County firmly believes that the valuable information and interaction available on this worldwide network far outweigh the possibility that users may obtain material that is not consistent with the educational goals of the District. The Okaloosa County School District views information gathered from the Internet in the same manner as reference materials identified by the schools. Specifically, the District supports resources that will enhance the learning environment while providing directed guidance and monitoring from the faculty and staff. While it is impossible to control all material on a public network, the OCSD has taken reasonable precautions to restrict access to materials it considers harmful and to materials that do not support approved educational objectives. 1
2 DEFINITIONS (terms denoted with an asterisk * are as defined in the CIPA) Blog and Blogging - A blog is a website in which items are posted on a regular basis and displayed in reverse chronological order. Like other media, blogs often focus on a particular subject, such as food, politics, or local news. Some blogs function as online diaries. A typical blog combines text, images, and links to other blogs, web pages, and other media related to its topic. The term blog is a shortened form of weblog or web log. Authoring a blog, maintaining a blog or adding an article to an existing blog is called "blogging". Individual articles on a blog are called "blog posts," "posts" or "entries". A person who posts these entries is called a "blogger". Computer virus - A computer virus is a piece of computer code that can replicate itself and cause the system to fail by using up all the memory and destroying programs on a computer. Cookies - The cookie is a well-known mechanism for storing information about an Internet user on their own computer. If a web site stores information about a person in a cookie that he doesn t know about, the cookie can be considered a form of spyware. District Web Page Server- This is the computer(s) where the District Internet Web Pages are stored. Download/Upload - Download means to transfer information to your computer over a network or via modem. Upload means to send information from your computer to another computer. Electronic Document - Electronic document means any computer data (other than programs or system files) that are intended to be used in their computerized form, without being printed (although printing is usually possible). Types of electronic documents include, but are not limited to, the file formats of various word processors, spreadsheets and graphical editors; digital media files including video, pictures and sound; generic view or read-only documents such as Adobe Acrobat PDF files; and documents written in standardized non-proprietary file formats such as HTML, SGML, and XML. - is short for electronic mail. spoofing - spoofing is the forgery of an header so that the message appears to have originated from someone or somewhere other than the actual source. Harmful to Minors* - The term ''harmful to minors'' is used in these rules and defined under CIPA. Instant messaging (IM) - Instant messaging is an Internet service that allows the user to communicate in real time with other users who have the same instant messaging application such as AOL s Instant Messenger (AIM), ICQ or MSN Messenger. Internet - The Internet is a large confederation of networks around the world. The networks that make up the Internet are connected through several backbone networks. The Internet grew out of the U.S. Government ARPA net project and is specifically designed to have no central governing authority or root node. Minor* - The term ''minor'' means any individual who has not attained the age of 17 years. 2
3 Okaloosa Metropolitan Area Network (OMAN) - OMAN is a Computer Network that serves as our gateway to the Internet. Any school linked to the OMAN network will also have access via cable to the Internet. Online documents - These are documents that are found on web pages and in files on the Internet. Peer-to-peer - This is a method of file sharing over a network in which individual computers are linked via the Internet or a private network to share programs or files, often illegally. Users download files directly from other users computers, rather than from a central server. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today such as Kaaza. Phishing - Phishing is a type of fraud where the perpetrator sends out legitimate-looking s that appear to come from well-known and trustworthy Web sites in an attempt to gather personal and financial information from the recipient. Removable Media - Removable media refers to cartridge and disc-based storage devices which can be used to easily move data between computers with the right readers. Floppy disks, compact discs and flash memory cards are all removable media. The term can also apply to hot swappable or hot-pluggable external storage devices, such as USB flash drives (also known as "key drives" or "memory keys") and FireWire external hard drives. Reposting - Reposting means to copy and send an article or information to other users or news groups that was sent to someone by someone else. This includes sending copies of messages that someone else sends to a person without their permission. Sexual Act; Sexual Contact* - The terms ''sexual act'' and ''sexual contact'' have the meanings given such terms in section 2246 of title 18, United States Code. Software - These are programs that computers operate. Spam - Spam is unsolicited on the Internet. From the sender's point-of-view, spam is a form of bulk mail, often sent to a list obtained from a spambot or to a list obtained by companies that specialize in creating distribution lists. To the receiver, it usually seems like junk . Spyware or Adware - Spyware or Adware is computer software that obtains information from a user's computer without the user's knowledge or consent. Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can infiltrate a computer as a software virus or as the result of installing a new program. Streaming Media - Streaming media is media that is consumed (read, heard, viewed) while it is being delivered. Streaming is more a property of the delivery system than the media itself. The distinction is usually applied to media that are distributed over computer networks. Streaming video or audio Streaming video or audio is downloading from a remote website video or audio that can be listened to as a file. 3
4 Technology Protection Measure* - The term ''technology protection measure'' means a specific technology that blocks or filters Internet access to visual depictions that are: 1. OBSCENE, as that term is defined in section 1460 of title 18, United States Code; 2. CHILD PORNOGRAPHY, as that term is defined in section 2256 of title 18, United States Code; or 3. Harmful to minors. Trojan Horse - A Trojan horse is a malicious computer software program that is disguised as legitimate software. There are two common types of Trojan horses. One is otherwise useful software that has been corrupted by a cracker (aka hacker) inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities. The other type is a stand alone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program's objectives. Trojan horse programs cannot operate autonomously, in contrast to some other types of spyware, like viruses or worms. USB Flash Drive - A USB flash drive is essentially NAND-type flash memory integrated with a USB 1.1 or 2.0 interface used as a small, lightweight, removable data storage device of up to 16 GB (as of 2006). USB flash drives are also known as pen drives, chip sticks, thumb drives, flash drives, USB keys, and a wide variety of other names. They are also sometimes erroneously called memory sticks, which is a Sony trademark describing their proprietary memory card system. Worm - In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources. EDUCATIONAL PURPOSES 1. All students will have access under school supervision to Internet World Wide Web information resources through their classroom, media center, or school computer lab. 2. The user and his parents must sign the District s MIS Form 5251 before being granted access to the OCSD network or the Internet through school electronic resources. Computer access can be withdrawn at any time by either a member of the school s staff or the student s parents. 3. Any student-produced electronic documents must be approved by the principal or designee before being linked to or stored on any District server. All student web pages created as part of a school project must relate to the specific school, educational, and/or career informational activities. 4. Any electronic storage areas may be treated like school lockers. Network administrators may review files and communications to check system integrity and be sure that users are using the system responsibly. Users should not expect that files stored on district servers are private. 4
5 PROCEDURAL GUIDELINES All outgoing transmissions of information are unsecured and sent at the risk of the user. The District will remove any information from the system that school staff determines to be unlawful, obscene, pornographic, abusive, harassing, or otherwise in violation of this agreement, including all items defined as harmful matter. Staff will refer for disciplinary action any individual who violates provisions of this agreement. Cancellation of user privileges and other consequences will be at the discretion of the school principal or designee. Vandalism of a District computer system will result in cancellation of privileges and/or disciplinary action that may include notification of law enforcement. Vandalism includes, but is not limited to, the uploading or creation of computer viruses or similar software, the hacking or altering of software, and physical damage to electronic hardware. Parents or guardians may be held financially responsible for any harm resulting from their child s misuse of the computer system. Purposeful access, downloading, or transmission of any harmful matter in violation of any federal law, state law, or District policy is prohibited. This includes, but is not limited to: any information that violates or infringes upon the rights of any other person any hate-motivated, fraudulent, defamatory, abusive, obscene, profane, sexually-oriented, threatening, racially offensive or illegal language or material any information or communication that encourages the illegal use of controlled substances, or promotes criminal behavior any material that violates copyright laws ACCEPTABLE USES 1. All electronic resources are to be used in a responsible, efficient, ethical and legal manner during the hours approved by the school principal. Users must acknowledge their understanding of these rules and the procedural guidelines as a condition of using electronic resources. 2. Acceptable uses of the Internet are activities which support learning, collaborative work, and teaching. Students are encouraged to develop uses that meet their individual educational needs and that take advantage of the Internet s primary functions: communication, educational, information storage and retrieval. 3. The District cannot assure the rights of privacy on District computer systems. Parents have the right at any time to request to see the contents of their student s computer files. 4. Teachers will guide students toward appropriate materials. Outside of school, families have the responsibility to guide student use of the Internet, television, telephones, movies, radio, and other potentially offensive media. Individual users of the Internet are expected to follow the generally accepted rules of network etiquette. 5
6 UNACCEPTABLE USES Attempting any unauthorized access to any computer system is illegal and will be treated as such. Unacceptable uses of the Internet include, but are not limited to the following: 1. Violating the conditions of the Student Code of Conduct, especially those dealing with students rights to privacy. 2. Downloading inappropriate materials for personal use e.g. files, graphics, music and/or movies. 3. Re-posting personal communications without the author s prior consent. 4. Copying commercial software in violation of copyright law or other copyright protected materials, including photographs. 5. Using the network for financial gain or for any commercial or illegal activity. 6. Installing or storing any software on any District computer without the permission of the teacher or staff member responsible for the computer. 7. Making or attempting to make any changes in any configuration, password, or program on any computer system without permission. 8. Using any District computer without permission of the teacher or staff member responsible for that computer. 9. Use of vulgarities or any other inappropriate language, pictures or gestures on the Internet in any form including written, graphic, voice phone, and real-time. video applications. 10. Playing on-line games or accessing chat rooms. 11. Damaging computers, computer systems, software, computer networks, or data belonging to the District or someone else. 12. Using another person s user ID or password. 13. Revealing the full name, personal address, social security number or telephone number of any student or school staff member. 14. Use of district computers to access personal is forbidden. LIMITATION OF LIABILITY The School Board of Okaloosa County makes no warranties of any kind whether expressed or implied for the service it is providing. The School Board will not be responsible for any damages a user may suffer, including loss of data. The School Board of Okaloosa County will not be 6
7 responsible for the accuracy or quality of information obtained through any school District Internet connection. Parents will indemnify the District against any damage that is caused by the student s inappropriate use of the system. PROCEDURAL GUIDELINES COMPUTER VIRUS PROTECTION Users must avoid knowingly or inadvertently spreading computer viruses. 1. Do not download files from unknown sources. 2. Always download files to a computer that has adequate virus detection and protection installed. 3. Deliberate attempts to degrade or disrupt system performance will be viewed as criminal activity under applicable state and federal law. 4. Schools should scan all storage media for viruses before being used on District computers. 5. Do not connect any computer or electronic device to the Internet unless it has been approved by District Seat Management Project Manager, Eric Mitchell. ACCESS TO INAPPROPRIATE MATERIAL To the extent practical, technology protection measures (or Internet filters ) shall be used to block or filter Internet, or other forms of electronic communications, access to inappropriate information. Specifically, as required by the Children s Internet Protection Act, blocking shall be applied to visual depictions of material deemed obscene or child pornography, or to any material deemed harmful to minors. Subject to staff supervision, technology protection measures may be disabled for adults or, in the case of minors, minimized only for bona fide research or other lawful purposes. INAPPROPRIATE NETWORK USAGE To the extent practical, steps shall be taken to promote the safety and security of users of the Okaloosa County School District online computer network when using electronic mail, chat rooms, instant messaging, and other forms of direct electronic communications. Specifically, as required by the Children s Internet Protection Act, prevention of inappropriate network usage includes: (a) unauthorized access, including so-called hacking, and other unlawful activities; and (b) unauthorized disclosure, use, and dissemination of personal identification information regarding minors. EDUCATION, SUPERVISION AND MONITORING It shall be the responsibility of all members of the Okaloosa County School District staff, including but not limited to site based instructional personnel, to educate, supervise and monitor appropriate usage of the online computer network and access to the Internet in accordance with 7
8 this policy, the Children s Internet Protection Act, the Neighborhood Children s Internet Protection Act, and the Protecting Children in the 21st Century Act. Procedures for the disabling or otherwise modifying any technology protection measures shall be the responsibility of the Superintendent or designated representatives. Schools will provide age appropriate training for students who use their Internet facilities. The training provided will be designed to promote the District s commitment to: 1. The standards and acceptable use of Internet services as set forth in the Electronic Resources Rules of Acceptable Use 2. Student safety with regard to: a) safety on the Internet; b) appropriate behavior while on online, on social networking Web sites, and c) in chat rooms; and d) cyber bullying awareness and response. 3. Compliance with the E-rate requirements of the Children s Internet Protection Act ( CIPA ). Following receipt of this training, the student will acknowledge that he/she received the training, understood it, and will follow the provisions of the District's acceptable use policies. 8
BOARD OF EDUCATION POLICY
BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
USE OF TECHNOLOGY RESOURCES IN INSTRUCTION
I-6400 2012 Arizona School Boards Association IJNDB USE OF TECHNOLOGY RESOURCES IN INSTRUCTION Appropriate use of Electronic Information Services The District may provide electronic information services
POLICY SUPPORT OPERATIONS 5042 ACCEPTABLE USE POLICY FOR NETWORK AND INTERNET ACCESS
I. Overview Network and Internet access is available to students, teachers and staff in the Oneida City School District. The District s goal in providing such services is to promote educational excellence
COMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
RIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
Marion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
CENTRAL CAMBRIA SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS CENTRAL CAMBRIA SCHOOL DISTRICT TITLE: NETWORK USAGE AND SAFETY ADOPTED: March 2, 2009 REVISED: 815. NETWORK USAGE AND SAFETY ENCOMPASSING LOCAL, INTRANET AND INTERNET NETWORKS
Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE
Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
Dauphin County Technical School
Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,
MEDWAY PUBLIC SCHOOLS Medway, MA. Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12
MEDWAY PUBLIC SCHOOLS Medway, MA Policy #21-A Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12 The District s goal in providing computer network technology and Internet access
Descriptor Code: EFE-P
ADMINISTRATIVE PROCEDURE Descriptor Term: ACCEPTABLE USE OF ELECTRONIC TRANSMISSION CAPABILITIES Descriptor Code: EFE-P Date Issued: October 30, 2003 Date Changed June 26, 2008 September 30, 2009 1. Network
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.
R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY
FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal
Electronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY
1 The COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) a consortium of the Colusa County Office of Education (CCOE) with Colusa Unified School District, Maxwell Unified School District, Williams Unified School
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
Student Network Acceptable Use Policy Lone Jack C-6 School District
Student Network Acceptable Use Policy The, hereinafter known as LJC6, provides students and staff with a service called the Network. The Network is a computer service, which includes, but is not limited
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ BYOD (Bring Your Own Device) Technology Acceptable Use Washington District Schools provides all students access to technology, the district
THE SCHOOL DISTRICT OF PHILADELPHIA
No. 815 SECTION: OPERATIONS THE SCHOOL DISTRICT OF PHILADELPHIA TITLE: ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES ADOPTED: March 15, 2012 REVISED: August 21, 2014 815. ACCEPTABLE USE OF
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
Westmoreland Intermediate Unit Internet Acceptable Use Policy
Westmoreland Intermediate Unit Internet Acceptable Use Policy Overview: The Westmoreland Intermediate Unit provides Internet access to administrators, teachers, and students in the school districts of
Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
I. PERSONAL RESPONSIBILITY
ACCEPTABLE USE AND INTERNET SAFETY POLICY FOR STUDENTS USING THE COMPUTER SYSTEMS OF THE BUTLER TECHNOLOGY AND CAREER DEVELOPMENT SCHOOLS The Butler Technology and Career Development Schools is pleased
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
SAN BERNARDINO CITY UNIFIED SCHOOL DISTRICT Employee Technology Acceptable Use Agreement
SAN BERNARDINO CITY UNIFIED SCHOOL DISTRICT is providing employees access to the district s electronic network. This network includes Internet access, computer services, videoconferencing, computer equipment
Laptops and Classrooms in Olean City School District
OLEAN CITY SCHOOL DISTRICT STUDENT LAPTOP GUIDELINES AND PROCEDURES 1. RECEIVING A LAPTOP a. Each student will receive a Dell Latitude 3340 laptop, a power adapter, and a slip on case for the laptop. b.
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) The Middletown City School District provides an electronic communications network that allows District-authorized individuals internal access
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
POLICY TITLE: Computer and Network Services: POLICY NO. 698 Acceptable Internet Use Policy
POLICY TITLE: Computer and Network Services: POLICY NO. 698 Acceptable Internet Use Policy GENERAL Internet access is a service provided for students and staff members by this school district. Use of this
Chatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320
ACCEPTABLE USE OF VOICE, VIDEO AND DATA NETWORK Policy Code: 3225/7320 Chatham County Schools offers electronic network access for students, teachers, and staff within the school system. A component of
COMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
POLICY 4526. Adopted by Board of Education: 4/20/05
POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,
