CYBRARIAN Corporation. CYBRARIAN Software. Creating Library Policies Governing PC and Internet Use
|
|
|
- Kory Webster
- 9 years ago
- Views:
Transcription
1 CYBRARIAN Corporation CYBRARIAN Software Creating Library Policies Governing PC and Internet Use
2 TABLE OF CONTENTS Table of Contents... 2 A Sample Library PC and Internet Use Policy... 3 Getting Started... 3 Review Your Goals... 3 Explain Your Library Policies and Rationale... 3 Sample Text... 4 The Library's Mission... 4 Choosing and Evaluating Sources... 4 Access by Minors... 5 Rules Governing Use... 6 Security... 6 Compliance... 7 Access to Information... 7 More Equitable PC Sessions... 7 Accurate Statistical Data... 7 Patron Authentication... 8 All you need is a Library Card... 8 Library PC Use Policy Subject to Revision... 9 Trademarks
3 A SAMPLE LIBRARY PC AND INTERNET USE POLICY GETTING STARTED For your convenience, we provide a sample policy statement that you can adapt for your library. If you need assistance adopting or creating a "Library PC and Internet Use Policy" please contact us. The complete document is available as a Microsoft Word document, an Adobe PDF, or as an HTML page for use on your library related web site. REVIEW YOUR GOALS EXPLAIN YOUR LIBRARY POLICIES AND RATIONALE The document is designed to assist you in formulating and then explaining your Library Policies and Rationale to your patrons. Some of the issues covered require discussion and planning before you can set policies: workstation location library card configuration time limits reservations printing minors parental guidance staff intervention statistics and monitoring privacy applicable state and local laws 3
4 SAMPLE TEXT THE LIBRARY'S MISSION To fulfill its mission of providing public access to information of all types in a wide range of formats, The Library provides access to Internet resources. The Internet offers access to many valuable local, national and international sources of information. However, some information found on the Internet may be inaccurate, incomplete, dated, or offensive to some individuals. A good information consumer must evaluate the validity and appropriateness of information found. CHOOSING AND EVALUATING SOURCES The Internet is a series of communication linkages leading to a highly diverse array of information content. Library patrons use it at their own risk. In choosing sources to link to from its home pages, the Library follows its materials selection guidelines. Beyond this, the Library is not responsible for the content of the Internet, changes in content of the sources to which the Library home pages link, or for the content of sources accessed through secondary links. In an effort to assist its users, the Library has created web sites for the general population, for teens and for children to help guide them to sources that are accurate, complete and current and that provide them with a wealth of information on the local, national and global level. In addition, the Library provides training for members of the public to assist them in using the Internet in a safe, effective and efficient manner. 4
5 ACCESS BY MINORS Parents or legal guardians must assume responsibility for deciding which library resources are appropriate for their own children. Parents or legal guardians should guide their children in use of the Internet and inform them about materials they should not use. While the Library affirms and acknowledges the rights and responsibilities of parents and guardians to monitor and determine their children's access to Library materials and resources, including those available through the Internet, the Library has taken certain measures designed to assist in the safe and effective use of these resources by all minors. a. To address the issue of access by minors to inappropriate material on the Internet, including material that is harmful to minors, the Library: i. Develops and maintains special web sites for children and teens; ii. Develops and provides training programs on safe and effective Internet use; iii. Encourages staff to guide minors away from materials that may be inappropriate; and, iv. Distributes a publication entitled "A Safety Net for the Internet: A Parent's Guide." b. To address the issue of the safety and security of minors when using electronic mail, chat rooms and other forms of direct electronic communications, as well as the unauthorized disclosure, use and dissemination of personal identification information regarding minors, the Library provides training programs and also urges minors to keep in mind the following safety guidelines: i. Never give out identifying information such as home address, school name, or telephone number. ii. Let parents or guardians decide whether personal information such as age, marital status, or financial information should be revealed. iii. Never arrange a face-to-face meeting with someone via the computer without parents' or guardians' approval. iv. Never respond to messages that are suggestive, obscene, threatening, or make one uncomfortable. v. Have parents or guardians report an incident to the National Center for Missing and Exploited Children at if one becomes aware of the transmission of child pornography. vi. Remember that people online may not be who they say they are. vii. Remember that not everything one reads may be true. 5
6 c. To address the issue of unauthorized access, including so-called "hacking," and other unlawful activities by a minor online, minors and all other Library users are hereby advised that use of the Library's computers for hacking or any other unlawful activity is strictly prohibited. RULES GOVERNING USE Due to the limited resources available for provision of public access to the Internet, the Library may set limits, for example, on use of large files of still or moving images or sound, or on downloading files in any medium. The Library also reserves the right to limit the amount of time an individual user can devote to a single session. The public must comply with all applicable federal, state and local laws, including laws governing the transmission and dissemination of information while accessing the Internet. Users may not: Use the network to make unauthorized entry into other computational, informational or communication services or resources. Distribute unsolicited advertising. Invade the privacy of others. Make any attempt to damage computer equipment or software. Engage in any activity that is harassing or defamatory. Use the Internet for any illegal activity, including violation of copyright or other rights of third parties, or in a manner inconsistent with the Library's tax-exempt status or its proper operation. Violations may result in loss of access. Unlawful activities will be dealt with in an appropriate manner. SECURITY Users should be aware that the Internet is not a secure medium and that third parties may be able to obtain information regarding users' activities. However, The Library will not release information on the use of specific Internet resources by members of the public except as required by law or necessary for the proper operation of the Library. 6
7 COMPLIANCE The Library reserves the right to take appropriate action to insure compliance with this policy. ACCESS TO INFORMATION The Library is guided by the following American Library Association statements on access to information: The Library Bill of Rights Freedom to Read Statement Interpretation of the Library Bill of Rights: Free Access to Libraries for Minors and Access to Electronic Information Services and Resources In general, the Library is guided by a commitment to access to information policies that provide appropriate protections to its patrons while being consistent with the Library's longstanding commitment to the principles of free expression as set forth in the First Amendment to the United States Constitution. MORE EQUITABLE PC SESSIONS PC and Internet users will be allowed to register two (2) one-hour sessions per day. These onehour sessions cannot be consecutive, but may be reserved in advance. During the one-hour session, the patron will be reminded several times that the session is coming to an end, by having pop-up boxes appear on the screen. Currently, our policy allows patrons to sign up for only one half-hour session per user, per day. Public PCs located in the Children's Area are primarily for the use of children and will have 30- minute time limits. ACCURATE STATISTICAL DATA CYBRARIAN software will allow the library to keep accurate statistical data on the usage of our public access computers, which is very important to us in applying for state funding and grant opportunities. It will also allow us to keep track of PC printing costs. The software will also allow us to assist law enforcement agencies to prevent and track criminal use of our public Internet PCs, in accordance with the USA Patriot Act. This software will not track site visits or record your Internet activity; this software acts only as a statistical and registration tool. 7
8 PATRON AUTHENTICATION As you may have noticed, our staff has already begun to ask for your birth date at checkout. This is because the system will automatically check against our patron accounts to allow our PC users over the age of 1 8 unfiltered access to the internet and our users under the age of 18 filtered access. The public Internet PCs located in the Children's Area of the branch will continue to be filtered regardless of the age of the user, to ensure a comfortable and safe environment for children and parents using those areas. ALL YOU NEED IS A LIBRARY CARD If you have a library card: o You're all set to use this new procedure! o Simply type in your library barcode for Internet access. If you do not have a library card: o You will be required to obtain a temporary 30-day Internet Only Card at the Circulation Desk. o This card will only allow you to use the PC stations; o You will not be able to check out library materials. o These cards will be free of charge during this evaluation period. o Beginning on September 3, 2015, there will be a $2. 00 annual card fee, per card, to obtain an Internet Only Library Card for our non-patrons. If you are here only for a one-time use of our PCs: o Please obtain a Day Guest Card at the Reference Desk. o You will be required to register and leave some form of identification with the staff. o The identification will be returned to you when you are finished with your session. o You may register for a Guest Card three times in a six-month period during one calendar year. Please Update Your Birth Date at the Circulation Desk Patron Confidentiality: o The Library is committed to the confidentiality of our patrons. We do not use your personal information for any other reason other than to statistically monitor the use of our resources. o We do act in accordance with the USA Patriot Act, which was created by Congressional leaders to respond to the legitimate concerns of national security. 8
9 LIBRARY PC USE POLICY SUBJECT TO REVISION The Library's "Policy on Public Use of the Internet" may be revised from time to time. 9
10 TRADEMARKS Copyright CYBRARIAN Corporation. All Rights Reserved. CYBRARIAN is a trademark of the CYBRARIAN Corporation. All Rights Reserved. All other brands and product names referred to in this manual are the trademarks or registered trademarks of their respective holders. ABOUT CYBRARIAN SOFTWARE We welcome all questions and comments regarding our software products. Visit us online at CYBRARIAN.com 10
~Osgood Public Library ~ Milan Branch Library Computer and Internet Acceptable Use Policy
~Osgood Public Library ~ Milan Branch Library Computer and Internet Acceptable Use Policy The Library is committed to providing technology tools and information in a variety of formats to meet the needs
USE OF TECHNOLOGY RESOURCES IN INSTRUCTION
I-6400 2012 Arizona School Boards Association IJNDB USE OF TECHNOLOGY RESOURCES IN INSTRUCTION Appropriate use of Electronic Information Services The District may provide electronic information services
The Top Ten Of Public Computers And Their Perpetuation
2.10 PUBLIC COMPUTER USE POLICY The Library offers public computers that patrons may use to access the Internet or perform computer-assisted tasks using basic applications software for word processing,
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
Children s Internet Protection Plan. IIBGA Children s Internet Protection Plan (CIPA) Plan. Children s Internet Protection Act (CIPA) Safety Plan
IIBGA Children s Internet Protection Plan (CIPA) Plan IIBGA Children s Internet Protection Act (CIPA) Safety Plan [Revise and edit as necessary to fit USD goals and include in Handbook] Goals: It is the
Library Space: Any property owned or rented by the SSMPL, including exterior space.
Title: Internet Service Policy Policy Type: Operational Community Perspectives Policy No.: OCP-12 Approved By: Sault Ste. Marie Public Library Board Effective Date: November 19, 2012 Review Date: October
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
COMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
Descriptor Code: EFE-P
ADMINISTRATIVE PROCEDURE Descriptor Term: ACCEPTABLE USE OF ELECTRONIC TRANSMISSION CAPABILITIES Descriptor Code: EFE-P Date Issued: October 30, 2003 Date Changed June 26, 2008 September 30, 2009 1. Network
Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE
Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
BOARD OF EDUCATION POLICY
BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate
(Internet) for students, staff and, if requested, members of the Board of Education. All computer
4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
Marion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to interconnected computer systems within the district
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
POLICY SUPPORT OPERATIONS 5042 ACCEPTABLE USE POLICY FOR NETWORK AND INTERNET ACCESS
I. Overview Network and Internet access is available to students, teachers and staff in the Oneida City School District. The District s goal in providing such services is to promote educational excellence
Red Cloud Community Schools Acceptable Use and Internet Safety Policy
Red Cloud Community Schools Acceptable Use and Internet Safety Policy The Red Cloud Community School system maintains quality technology systems (hardware, software, and services) for the purposes of enhancing
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
COMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
RIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
Hyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Internet Safety Policies and CIPA: An E-Rate Primer for Schools and Libraries
Internet Safety Policies and CIPA: An E-Rate Primer for Schools and Libraries Prepared by E-Rate Central The Children s Internet Protection Act ( CIPA ), enacted December 21, 2000, requires recipients
Administrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes
Chatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320
ACCEPTABLE USE OF VOICE, VIDEO AND DATA NETWORK Policy Code: 3225/7320 Chatham County Schools offers electronic network access for students, teachers, and staff within the school system. A component of
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
STUDENTS 5118.5. Children s Internet Protection Act, Pub. Law 106-554, codified at 47 USC 254(h) Conn. Gen. Stat. 53a-182b; 53a-183; 53a-250
STUDENTS 5118.5 Student Use of Computer Systems and Internet Safety Computers, computer networks, Internet Access, and e-mail are effective and important technological resources in today s educational
Dauphin County Technical School
Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,
Jozii LLC WEBSITE TERMS OF SERVICE
Jozii LLC WEBSITE TERMS OF SERVICE 1. Acceptance of Terms. Welcome to Jozii. By using our Internet website, you indicate your unconditional acceptance of the following Terms of Service. Please read them
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES
RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES The following constitute the terms and conditions of access and use of the Services, as defined hereunder, which shall be deemed to have been read and
Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224
COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist
POLICY 4526. Adopted by Board of Education: 4/20/05
POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
File: IIBEA ACCEPTABLE COMPUTER SYSTEM USE
File: IIBEA ACCEPTABLE COMPUTER YTEM UE The chool Board provides a computer system, including the Internet, to promote educational excellence by facilitating resource sharing, innovation and communication.
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
