Good Practices In Technology: The K-12 Classroom
|
|
|
- Douglas Dawson
- 9 years ago
- Views:
Transcription
1 Good Practices In Technology: The K-12 Classroom Elizabethtown Independent School District BUILDING ON A TRADITION OF EXCELLENCE Ver
2 Acceptable Use Policy All users must read the Acceptable Use Procedures (AUP) and sign an Individual Use Agreement (IUA). EIS electronic resources (Computers, Network, and Internet, etc.) are available to users for educational purposes. Users are solely responsible for their actions on the Internet. Use network with same good judgment expected when in the school building. Schools will provide reasonable supervision but are not responsible for individual user s actions.
3 Network, Internet and Guidelines Users are responsible for good behavior on the network Electronic assets are not for: Personal business (e.g., Tupperware, Avon, Mary Kay) Political activities Use your own login account do not give it to others Do not open others files, mail, etc. Only Principals can authorize access to student accounts Only Superintendent can authorize access to staff accounts Do not use destructive behavior such as sending viruses, deleting files, harassing, etc. Do not access network for hate mail, pornography, racist or other objectionable material. Obey copyright laws
4 Cyberbullying Part 1 90% of youth age communicate via ; 75% use IM Cyberbullying - willful and repeated harm inflicted through use of computers, cell phones and other electronic devices ; involves a minor Children have killed/committed suicide after cyberbullying Two types Direct Attacks Via proxy Some Examples of Direct Attacks Send threatening messages; create screennames similar to others Steal passwords and send messages, lock out user, hack into comp. Post blogs/videos and create malicious web sites about kids Send degrading pictures of kids Internet polling who s hot/who s not Send malicious code, porn, junk
5 Cyberbullying Part 2 Prevention Educate kids about consequences Use internet and mobile phones carefully Don t give out personal information Victims should: Talk to someone they trust Report the incident (to police if necessary) Block messages/ s Keep offensive messages as evidence
6 Good Practices Use to support the instructional program. Open from those you know- not from strangers. Close when not in use. Do not send or forward that is: Chain letter or spamish in nature Infected with a virus Offensive in any manner Make it a habit to not bad mouth anyone/anything
7 Good Etiquette Do not use all CAPS considered shouting. Keep messages concise and to the point Several short paragraphs better than longer narrative Avoid public "flames" - messages sent in anger. Always use a signature. Mail systems are not private. Don t send embarrassing messages. Emoticons ( ) can help convey a message. Proof before sending; consider a 5 minute timeout before sending emotional responses Use High Priority sparingly (or risk overuse)
8 Miscellaneous Musings Protect your password Keep PW to yourself, use letters, numbers & special characters Example, password of sports could be 5p0rt5 where 5 looks like an s, and a zero replaces the letter o Only download educational programs and files from established locations Obey copyrights (documents, music, etc.) Sites/programs to not use from district resources Non KETS (e.g., Hotmail, AOL mail) Instant Messaging (e.g. AIM0 Social Networking sites Facebook, Myspace, Twitter, etc. Note; When using from home, be aware of the risks these sites contain File Sharing sites like Kazaa Check with STC before using unauthorized antivirus/registry cleaners on district computers
9 Scams, Schemes & Such At home & work watch for scams Advance Fee Scams Nigerian Letter (cheated Americans of $122 mil) & Canadian Lottery Winner: You pay money to get money. Internet Schemes Auction web sites that don t deliver, phony s, verify your account number, etc. Cramming Mysterious charges on your phone bill (fine print of agreements) Bogus business opportunities Work at home scams, leasing ATMs Viaticals Buying life insurance of terminally ill patients
10 Chain Mail chain mail sounds reasonable but is designed to overload mail networks Topics: Make Money Fast Tracking Giveaway Good Luck Follow Directions Carefully Chains of Mourning Charity Chains Urban Myths (Spiders under toilet seats, gang initiations, etc.) Forwarding chain mail is a violation of the district s AUP If says Forward this to all it is probably chain mail
11 Chain Mail Example 1 (Note spelling errors were built in by author) Subject: PLEEEEEEASE READ!!!! it was on the news! To all of my friends, I do not usually forward messages, But this is from my good friend Pearlas Sandborn and she really is an attorney. For every person that you forward this to, Microsoft will pay you $ For every person that you sent it to that forwards it on, Microsoft will pay you $ and for every third person that receives it, You will be paid $ Within two weeks, Microsoft will contact you for your address and then send you a check. I thought this was a scam myself, But two weeks after receiving this and forwarding it on. Microsoft contacted me for my address and within days, I receive a check for $24, You need to respond before the beta testing is over. If anyone can affoard this, Bill gates is the man. It's all marketing expense to him. Please forward this to as many people as possible.
12 Chain Mail Example 2 Chain Prayers "We all need friends to pray for us!!! When you receive this, say the prayer. That's all you have to do. There is nothing attached. This is powerful. Just send this to four people and do not break this, please. Prayer is one of the best free gifts we receive. (general prayer follows)... Passing this on to anyone you consider a friend will bless you both. Passing this on to one not considered a friend is something Christ would do."
13 Some thoughts for home computers Must have Antivirus software (Norton s, MacAfee's, etc.) With current AV definitions (weekly updates) Must apply Microsoft Windows updates regularly Must have a firewall if using DSL, Cable Good to have: Spybot Adaware Antispam software Note there are free versions of all of these on the Internet. There are many good, safe sources for the free versions one is:
14 Some Freeware to Consider Open Office almost as good as Microsoft Office Firefox outdoes Internet Explorer browser AVG Antivirus software Misc Adaware Spybot Zone Alarm
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
Appendix A Cyber Security 1 Copyright 2012, Oracle and/or its affiliates. All rights Overview This lesson covers the following topics: Define cyber security. List the risks of cyber security. Identify
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)
Cybercrimes NATIONAL CRIME PREVENTION COUNCIL
NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range
Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
Computer and Information Security End User Questionnaire
Computer and Information Security End User Questionnaire Human Factors Issues in Computer and Information Security Funded by the National Science Foundation: EIA-0120092 Project http://cis.engr.wisc.edu/
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
PARENTS AND PUPILS UNITED HERZLIA SCHOOLS (UHS) INFORMATION AND COMMUNICATIONS TECHNOLOGY AND SOCIAL MEDIA POLICY
PARENTS AND PUPILS UNITED HERZLIA SCHOOLS (UHS) INFORMATION AND COMMUNICATIONS TECHNOLOGY AND SOCIAL MEDIA POLICY Copyright 2014 UHS. All Rights Reserved. INFORMATION AND COMMUNICATIONS TECHNOLOGY AND
Dauphin County Technical School
Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,
POLICY 4526. Adopted by Board of Education: 4/20/05
POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to interconnected computer systems within the district
Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only
Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only Imhotep Academy is committed to staying on the forefront of educational practices of the 21st century. We are piloting a new policy
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
Protection from Fraud and Identity Theft
Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...
Pacific Northwest University of Health Sciences
Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
Youth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
COMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
Saheel KHOYRATTY. Partner Technology Advisor
Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment
Recognizing Spam. IT Computer Technical Support Newsletter
IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the
TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus
Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP)
4510.2 INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP) The Board of Education is committed to the optimization of student learning and teaching. The Board considers computers to be a valuable tool for
Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
- Do not leave open email/network applications unattended. Log off of a computer when it is in an unsecured area and out of your sight.
STAFF PROCEDURES FOR ACCEPTABLE USE OF EMAIL/NETWORK AND INTERNET The primary purpose of Sycamore Community Schools email/network system is to provide resources to enhance and support educational instruction
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
Marion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to the Internet, and a Bring
(Internet) for students, staff and, if requested, members of the Board of Education. All computer
4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international
Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT
PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT Check Plan: Residential Business Installation Cost $45.00 $62.00 Check Plan: 256 Down/128 Up $24.95 $44.95 Monthly 1.544 Down/256 Up $39.95 $49.95 Monthly
COMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
You ve Got Email Etiquette
You ve Got Email Etiquette Email has become a way of life! We use it instead of snail mail and telephone calls. It has become a powerful tool, but can be a terrible thing if used incorrectly. Be concise
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
(EMC) ELECTRONICALLY MEDIATED COMMUNICATION. Communication sent via a channel such as a cell phone or the Internet (versus face-to-face).
ELECTRONICALLY MEDIATED COMMUNICATION (EMC) Communication sent via a channel such as a cell phone or the Internet (versus face-to-face). Examples of EMC Cell phones Computerconferencing Discussion boards
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Information Security Code of Conduct
Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security
Social Media and Cyber Safety
Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant [email protected] Social Media and Cyber Safety Our instructor today
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
Infocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE
ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.
Guideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Wakefield Public Schools Technology Acceptable Use Policy
Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES
Administrative RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES For any individual or group utilizing WRDSB technology Responsibility: Legal References: Related References:
Haddon Township School District Acceptable Use of Information and Communication Technology for Students
Haddon Township School District Acceptable Use of Information and Communication Technology for Students Please read the following carefully before signing the Acceptable Use Policy for Students Agreement.
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Students Acceptable Use Policy for Electronic Resources Rules Summary
Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
