estem Public Charter School AUTHORIZED USE OF COMPUTER NETWORKS
|
|
|
- Morgan Gardner
- 10 years ago
- Views:
Transcription
1 1 estem Public Charter School AUTHORIZED USE OF COMPUTER NETWORKS The estem Public Charter School has policies in place that address all CIPA and FERPA laws. Guidelines regulating the use of the estem network--acceptable Use Policy--also include policies and consequences for violation of policies posted on the estem website and printed in the student handbook. These guidelines apply to all minors--anyone under the age of 17--and employees. Students, parents, employees and users must sign this agreement if they are to use the estem network. The student handbook is posted on the website and is issued to every student at pre-school registration and upon entering the charter school. New employees are issued the agreement upon employment. This policy governs the acceptable use of estem Public Charter School technology by all users. User access is a privilege with no entitlement guaranteed and access may be revoked at any time at the discretion of estem administrators. As an administrative authority for the estem Public Charter School, the Board is authorized to make CIPA certifications. This policy may be revised at any time by a majority vote of the Board or as state and federal law dictates. Purpose The Internet and its vast access to information provide an enormous resource for education and assistance in our goal to increase student achievement and professional development. The computer, computer related devices and software are valuable tools in the efforts of successful educational process. This, combined with the need of creating and maintaining a safe educational environment require the need for an adequate acceptable use policy for the estem Public Charter School. estem Public Charter School Responsibilities estem Public Charter School will take the following steps to assure proper use of the computer network: Teachers and/or support staff will supervise Internet sessions while in the classroom or computer lab. Filtering and network management software will be used to limit the risk of inappropriate material being accessed by students and other users. These programs monitor HTTP traffic and block inappropriate content based on an expanding database of sites and information related to trends in best practices, known information and constant system monitoring. Teachers will be provided with training and resources to understand the current trends and policies of Internet usage and safety practices. Staff will be required to instruct students on the proper use of Internet resources enabling them to make appropriate choices for appropriate content and its use. Current virus protection and anti-spyware software will be used as an added layer of protection for users against malicious software that may otherwise expose students and other users to inappropriate or harmful material. Definitions Internet: A network of computer networks. Networks in the internet are connected so they can communicate with each other regardless of their manufacturer.
2 Mobile Devices: Portable hand held computing device that mimics desktop computers in their function. These devices include Wi-Fi capability and may or may not have a touch screen, keyboard or cellular data connections. Users may access Internet content, stream video and have access to take and or post electronic photos/vides. Devices include, but are not limited to, tablet devices, smart phone and e-readers. Asynchronous Communication: A type of communication protocol that allows an amount of time to pass between communications. This communication includes but is not limited to s, discussion forums, weblogs (blogs) and social networking sites (MySpace, Facebook, etc). Synchronous Communication: A type of communication protocol that allows users to communicate instantly in real time. This communication includes but is not limited to chat rooms, instant messages, voice over IP and certain 3D environments. Users a. Users are defined as authorized personnel as defined by the charter school to operate computers, computer-related devices and other technology related equipment within the boundary of use of estem Public Charter School. b. Users are described but not limited to: administrators, teachers, students, substitutes, long-term substitutes, parents, support staff and charter school-authorized guests who are defined as vendors and presenters. c. The amount of access to the school equipment and network for each of these uses will be determined by function and need by the appropriate technology personnel. d. Any user under the age of 17 is considered a minor as determined by state and federal law. Social Networks: Websites that are virtual communities of people with common interest who are invited to share likes and dislikes on any particular subject, cause and/or theme or to just have an online meeting place for extemporaneous discussion. Members create accounts that consist of biographical information including but not limited to birthdays, gender, photos, occupation and addresses. Communication consists of both synchronous and asynchronous communication such as chat, voice over IP, blogs, discussion forums, and video. Mobile Apps (Mobile Applications): Programs specifically designed to run on mobile devices that at times mimic desktop computer programs. These applications may or may not need Internet access. These programs range from games to productivity applications. Malware: Various types of computer programs that use various techniques to duplicate themselves and travel between computers which can cause serious damage to computers such as erasing important data or disrupting a system or network. These programs may collect personal information about the user for exploitation which may or may not be for financial gain. CIPA-Children s Internet Protection Act Under CIPA, schools and libraries subject to CIPA do not receive the discounts offered by the "E-Rate" program (discounts that make access to the Internet affordable to schools and libraries) unless they certify that they have certain Internet safety 2
3 measures in place. These include measures to block or filter pictures that: (a) are obscene, (b) contain child pornography, or (c) when computers with Internet access are used by minors, are harmful to minors. Schools subject to CIPA are required to adopt a policy to monitor online activities of minors. Schools and libraries subject to CIPA are required to adopt a policy addressing: (a) access by minors to inappropriate matter on the Internet and World Wide Web; (b) the safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications; (c) unauthorized access, including so-called hacking," and other unlawful activities by minors online; (d)unauthorized disclosure, use, and dissemination of personal information regarding minors; and (e) restricting minors' access to materials harmful to them. CIPA does not require the tracking of Internet use by minors or adults. FERPA- Family Educational Rights Privacy Act The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. 1232g; 34 CFR Part 99) is a Federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education. FERPA gives parents certain rights with respect to their children's educational records. These rights transfer to the student when he or she reaches the age of 18 or attends a school beyond the high school level. Students to whom the rights have transferred are "eligible students." The Digital Millennium Copyright Act (DMCA) passed in 1998 to protect software copyright holders, as well as owners of other digital media, from illegal copying of their products. Among other things, the DMCA prohibits circumventing commercial software's anti-copying or anti-piracy measures; prohibits the "manufacture, sale or distribution" of programs or devices used to circumvent software's anti-piracy measures, except when these items or programs are used to test antipiracy measures or to conduct research on encryption; allows nonprofit libraries, archives and educational institutions to make copies of software that is otherwise protected by anti-piracy measures; requires Internet service providers to remove software programs posted to users' websites if the programs appear to be posted in violation of copyright. The fair use provisions of the Copyright Act are still available to individuals charged with copyright infringement under the DMCA. Fair Use: One of the rights afforded to the owner of copyright is the right to reproduce or to authorize others to reproduce the work in copies of phone records. This right is subject to certain limitations found in sections 107 through 118 of the copyright law (title 17, US Code). One of the more important limitations is the doctrine of "fair use". The doctrine of fair use has developed through a substantial number of court decisions over the years and has been codified in section 107 of the copyright law. Section 107 contains a list of the various purposes for which the reproduction of a particular work may be considered fair use for the purpose of researching and teaching. Illegal Behavior: Defined as use that violates all applicable laws, municipal ordinances, state and federal law which includes abut are not limited to gaining unauthorized access to school computers, systems and networks or attempting to gain unauthorized access, copyright violations, distribution of pornography or obscene material, the creation and distribution of 3
4 4 malicious code (malware) and theft either of school or personal devices while on school property. Other types of illegal violations include, but are not limited to: Flaming: To send an message that is abusive or that offends. Typing in all capital letters is considered shouting and may be offensive. Internet: A network of computer networks. Networks in the Internet are connected so they can communicate with each other regardless of their manufacture. Spamming: To send an annoying or unnecessary message to a large number of people. An example might be a chain letter asking a user to forward the message to x number of people. Virus: A computer program that uses various techniques to duplicate itself and travel between computers. Viruses can cause serious damage to computers such as erasing important data or crashing a system. Spyware: This is a program designed to collect personal information about the user for exploitation which may or may not be for financial gain. Cyber bullying: The intentional act of posting, transmitting or the displaying of embarrassing, defaming and/or untrue information about a particular person or persons for the purpose of causing intimidation, ridicule, threat,harassment, embarrassment and/or an act of violence toward a student or public school employee. This behavior substantially disrupts the educational process within the classroom, overall school climate and the orderly operation of the school and the educational environment. The information is communicated through all forms of electronic communication including but not limited to text messaging, weblogs, podcast and social networking sites such as but not limited to MySpace, Face Book, and YouTube. General Requirements 1. Mobile devices, computers, computer related devices, telephonic and other communication devices, and networks are provided for conducting school business and for the educational development of students and staff. They are not intended for private or personal use. Internet and other network communications are being monitored for effective use and resource management. Users and their immediate supervisors may be notified of suspected abuse of network resources. 2. Users of the network are responsible for following local, state, federal and international laws. This includes copyright laws. 3. Users are responsible for the use of their own account, including security and proper use. Users are not to allow others to use their user name and password. Access to other user profiles is reserved for authorized network administrators. Users assigned user names and passwords are responsible for safeguarding this information, and will be held accountable for the consequences of intentional or negligent disclosure of this information. This includes posting account/passwords and access codes in public view or giving unauthorized users such as but not limited to students, parents or vendors access to the charter school network resources. Users in violation will be held accountable for the consequences of intentional or negligent disclosure of this information. 4. Users are responsible for respecting the policies of other networks, which they access, and for adhering to those policies.
5 5. Users may not deliberately damage or disrupt a network, computer or computer related device, telephonic or other communication device, and/or removable media that they have been given authorized use. System components such as hardware, software, or other property will not be removed, destroyed, modified, or abused. Examples of activities that are prohibited: altering security codes or passwords and introducing computer viruses and/or malware, removing memory chips, hard drives and other hardware components. 6. No estem network, phone, or computer system will be used to terrorize, intimidate, threaten, or harass. 7. Users will not use the charter school network for financial or commercial gain or to advertise, promote or endorse products or personal services. 8. The charter school will not be responsible for financial obligations or legal infractions arising from unauthorized use of the system. 9. Network resources, information, Internet and intranet traffic, folders, drives, mobile devices and charter school provided removable media and electronic mail have no expectation of privacy. Routine maintenance and monitoring of the system may lead to the discovery that a violation of a law or regulation has occurred. If there is reasonable suspicion that a law or regulation has been violated, an investigation will be conducted, and items seized and searched. Any suspected illegal activity in the charter school which may or may not be computer or network related in nature may result in the search of said resources. 10. Long-term substitutes may be granted network privileges at the request of the director. If granted, the long-term substitute must sign the Employee Use Agreement. 11. Users may not store student or employee personal data on their personal computing, mobile or storage device. 12. Users are restricted from viewing, downloading or sharing pornographic, sexually explicit, obscene and/or inappropriate content using personal mobile devices in the presence of other users, on charter school property and/or while performing charter school business. 13. Users may not gain unauthorized access or attempt to gain unauthorized access to other users' accounts, computers or devices. Hardware 1. Only authorized individuals will install, service, or maintain charter school-owned hardware. 2. All personal hardware such as media players of any kind and their content are subject to estem policies that refer to electronic communication devices. Software 1. Only software that is authorized by the charter school may be installed on computer hardware. 5
6 6 2. Only authorized individuals will install software on charter school equipment. The estem Public Charter School reserves the right to remove any software that violates charter school software policy, software that is deemed illegal or inappropriate, or degrades network performance. 3. Authorized users of student and employee data will take proper care to guard the privacy of such information. Any violation of privacy to such information should be reported to authorities immediately. 4. Mobile Apps that are to be purchased for use in the classroom must be submitted for software approval before purchase. Internet 1. The primary purpose of providing Internet access to employees is for conducting official business. The purpose of providing Internet access to students is for educational benefit only. 2. Before a student is allowed to access the Internet, a Student Use Agreement must be signed by both the student and parent. Students and parents will sign the AUP each time a student enrolls at a new campus. 3. accounts will be issued to charter school employees. estem students will not be issued individual accounts but may be provided access to through a classroom account. 4. Users will not post personal contact information about themselves or other people. 5. Users are not allowed to intentionally transmit or receive obscene, pornographic, or inappropriately suggestive content or language in the form of images, files or multimedia files types through any synchronous or asynchronous communication device or software used in the charter school network. Use of the system to access, store or distribute obscene, pornographic, or inappropriately suggestive material is prohibited. 6. All users should observe network etiquette. Users are expected to be polite and use appropriate language. Using vulgar or profane language is not appropriate. Engaging in flaming or spamming is not appropriate. Students are prohibited from using chat rooms and instant messenger services. Participation in cyber bullying (original, secondary, or distributed), is prohibited. 7. Use of the system to access, store, or distribute obscene, pornographic, or inappropriately suggestive material is prohibited. 8. Use of the charter school network and computers to access, store, or distribute materials or sites that are considered racially derogatory or hate sites is strictly prohibited. 9. Students are to report immediately any inappropriate material they access to a teacher or other staff person. Students are not to share inappropriate materials or their sources with other students. 10. Users who receive files that contain personal information about employees or students either by intentional or unintentional means must maintain all privacy regulations as stated in this policy. They may not copy, forward or distribute such information.
7 7 11. Use of the charter school's networks and computers to access, store or distribute materials or sites that are considered racially derogatory, homophobic or "hate sites" is strictly prohibited. 12. Teachers and staff should report any inappropriate, illegal behavior or misuse of charter school devices, systems or networks immediately to their supervisors. Social Networks All users must maintain a high level of respect when using social media as a charter school employee or as students. Educators should follow the Arkansas Department of Education Rules Governing the Code of Ethics for Arkansas Educators when dealing with students in online activities. See Standards of Professional Conduct A. Use of Personal Electronic Devices estem will grant teachers and students permission to bring a personal web-enabled device to campus for academic use. Student owned devices must have a traditional keyboard. Student use of personally owned devices will be at the discretion of the campus administrator and/or classroom teachers. All policies stated in this document apply to personal devices used on estem campuses. Students who use personally owned web-enabled devices will have access to wireless Internet but will not have access to any charter school drives such as network folders. Network drives can only be accessed via charter school machines. estem is not liable for any loss or damage incurred, nor will estem staff offer technical support or load software on any personal device. All users are responsible for the security of any equipment brought with them to school. All laptops and other devices should contain proper antivirus software as well as fully patched operating systems and should be clearly marked with user s name for identification purposes. Users will not loan their device to someone else. The user is responsible for the content contained on the device regardless of how it originated. All devices brought onto an estem campus are subject to search and seizure. Improper use will result in the loss of privileges for such devices. estem is not responsible for lost, damaged, or stolen personally owned devices. B. Supervision of the Computer Network estem Public Charter School reserves the right to log, monitor, and review Internet, , and other network use of each user. This logging, monitoring, and review may be conducted without cause and without notice. Each user of a charter school computer or the network, and/or use of a personally owned device used on the charter school s network, by the use thereof, agrees and consents to such logging, monitoring, and review and acknowledges that s/he has no right or expectation of confidentiality or privacy with respect to Internet, or other network resources. Users should expect that files stored on charter school servers or computers will not be private.
8 8 1. Coordination of the charter school computer network is under the supervision of the school director or designee. The director or designee will be responsible for coordination of activities related to the network. 2. The director or designee will establish a system that ensures that all employees and students receive instruction in charter school policies that address computer systems and networks. The director or designee will also establish a process for supervision of students using the system and will maintain user and account agreements. 3. The director or designee will establish a process for reviewing these regulations with employees annually. The Employee Use Agreement must be signed annually by all employees. The students will sign the Acceptable Use Policy, once in Elementary, Middle and Senior High. Parent s signature will be required even when a student transfers to another school. 4. Monitoring for proper use and/or violations of any type are performed through, but not limited to, teacher observations, filtering and network management software. C. Penalties for Non-Permitted Activities 1. Any user who violates this policy and accompanying regulations is subject to loss of computer, phone, and network privileges as well as other charter school disciplinary actions. Date: October, 2013
9 9 estem Public Charter School AUTHORIZED USE OF COMPUTER NETWORKS School or Department: Employee Name: Employee access to the estem network is primarily to be used as a tool in the performance of the employee s job. I have read the estem Public Charter School Authorized Use of Computer Networks Policy. I agree to follow the rules contained in this policy. I understand that if I violate the rules my account can be terminated and I may face other disciplinary measures. Employee Signature Date
10 10 estem Public Charter School AUTHORIZED USE OF COMPUTER NETWORKS Student Name: Grade: I have read the estem Public Charter School Authorized Use of Computer Networks Policy. I agree to follow the rules contained in this policy. I understand that if I violate the rules my computer privileges can be terminated and I may face other disciplinary measures. Student Signature Date Parent or Guardian Section I have read the estem Public Charter School Authorized Use of Computer Networks Policy. I hereby release estem Public Charter School, estem Public Charter School Board of Directors, staff, employees, and any institutions with which it is affiliated, from any and all claims and damages of any nature arising from my child s use of, or inability to use, the charter school s computer network. This includes but is not limited to claims that may arise from the unauthorized use of the system to purchase products or services. I will instruct my child regarding any additional restrictions I wish to be followed in addition to those outlined in these regulations. I will emphasize to my child the importance of following the rules for personal safety. I give permission for my child to participate in the charter school s electronic communications system and certify that the information contained on this form is correct. This authorization will remain in effect as long as my child is enrolled in estem Public Charter School or until I revoke this authorization in writing to the school director or until this policy is revised by the school. I do not give permission for my child to participate in the charter school s electronic communications system. Parent/Guardian Signature Date: Print Parent Name Home Address City State Zip Home Phone Cell phone Parent s address
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures Purpose The purpose of the ACH Network Acceptable Use Procedures is to provide the procedures, rules, guidelines,
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ BYOD (Bring Your Own Device) Technology Acceptable Use Washington District Schools provides all students access to technology, the district
Acceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
Marion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
RIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
Red Cloud Community Schools Acceptable Use and Internet Safety Policy
Red Cloud Community Schools Acceptable Use and Internet Safety Policy The Red Cloud Community School system maintains quality technology systems (hardware, software, and services) for the purposes of enhancing
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
Bring Your Own Device (BYOD) Handbook. Smackover-Norphlet School District
Bring Your Own Device (BYOD) Handbook Smackover-Norphlet School District August, 2014 For the purposes of BYOD, devices means personally owned, wireless portable electronic equipment used for instructional
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
BOARD OF EDUCATION POLICY
BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate
Dracut Public Schools Technology Acceptable Use Policy Revised 2014
1 Dracut Public Schools Technology Acceptable Use Policy Revised 2014 The Dracut Public Schools (DPS) encourages the use of information technology to assist staff and students with academic success, preparation
COMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.
LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN
LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN TITLE: NUMBER: BUL - 999.8 ISSUER: Acceptable Use Policy (AUP) For District Computer and Network Systems Ronald S. Chandler, Chief Information Officer
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to interconnected computer systems within the district
Ceres Unified School District
Ceres Unified School District TECHNOLOGY USE POLICY Grades K-12 Please read this policy below carefully to be instructed in proper behavior and use regarding the Internet. This policy covers technology
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students AUP Sections 1. Acceptable Use 2. Privileges 3. Internet Access 4. Procedures & Caveats 5. Netiquette
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Electronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
We have opted to implement a modified Bring Your Own Device (BYOD) program at the high school level.
Attention 7-12 parents and students: Last year we had the opportunity to pilot a 1:1 Chromebook program in grades 7-8. During this program, we were able to assess the impact providing each student with
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Descriptor Code: EFE-P
ADMINISTRATIVE PROCEDURE Descriptor Term: ACCEPTABLE USE OF ELECTRONIC TRANSMISSION CAPABILITIES Descriptor Code: EFE-P Date Issued: October 30, 2003 Date Changed June 26, 2008 September 30, 2009 1. Network
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
How To Use The Internet Safely
Administrative Procedure 140 DISTRICT-WIDE NETWORK AND INTERNET APPROPRIATE USE Background School District No.43 (Coquitlam)'s District-wide network provides data communication links among all District
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) The Middletown City School District provides an electronic communications network that allows District-authorized individuals internal access
Geyserville New Tech Academy Student Technology Acceptable Use Policy
Geyserville New Tech Academy Student Technology Acceptable Use Policy Overview. The (GUSD) makes a variety of communications and information technologies available to students through computer/network/internet
Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn
Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn 1. Purpose: Throughout the years, the Catholic Schools within the Diocese of Brooklyn have maintained a steadfast dedication
- Do not leave open email/network applications unattended. Log off of a computer when it is in an unsecured area and out of your sight.
STAFF PROCEDURES FOR ACCEPTABLE USE OF EMAIL/NETWORK AND INTERNET The primary purpose of Sycamore Community Schools email/network system is to provide resources to enhance and support educational instruction
School Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY
FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal
Johnson Creek School District Parent/Student Information Packet
Johnson Creek School District Parent/Student Information Packet This packet includes Johnson Creek School Board policies as referenced on the Parent/Student Signature Page, as well as, the Johnson Creek
Technology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
Dauphin County Technical School
Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,
CENTRAL CAMBRIA SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS CENTRAL CAMBRIA SCHOOL DISTRICT TITLE: NETWORK USAGE AND SAFETY ADOPTED: March 2, 2009 REVISED: 815. NETWORK USAGE AND SAFETY ENCOMPASSING LOCAL, INTRANET AND INTERNET NETWORKS
Wakefield Public Schools Technology Acceptable Use Policy
Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of
Haddon Township School District Acceptable Use of Information and Communication Technology for Students
Haddon Township School District Acceptable Use of Information and Communication Technology for Students Please read the following carefully before signing the Acceptable Use Policy for Students Agreement.
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to the Internet, and a Bring
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
I. PERSONAL RESPONSIBILITY
ACCEPTABLE USE AND INTERNET SAFETY POLICY FOR STUDENTS USING THE COMPUTER SYSTEMS OF THE BUTLER TECHNOLOGY AND CAREER DEVELOPMENT SCHOOLS The Butler Technology and Career Development Schools is pleased
Board of Education Procedure 9.21a Findlay City School District
USE OF PERSONAL ELECTRONIC COMMUNICATIONS EQUIPMENT BY STUDENTS: Bring Your Own Technology (B.Y.O.T.) Providing students and staff with a 21 st century digital learning environment is part of the technology
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE
Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students
