Dresden International School Computer and IT Use Policy
|
|
|
- Kory Dean
- 10 years ago
- Views:
Transcription
1 Dresden International School Computer and IT Use Policy Overview This document specifies the important ground rules that students must follow when using computers, IT services and IT equipment provided by Dresden International School. Above and beyond everything, students must: use school computers and IT equipment respectfully and carefully, keep personal data and login data secret, not use school computers to download, duplicate, modify and/or distribute copyrighted materials (in accordance with German copyright law), not use computers to distribute illegal content over the local area network or through the internet, not use computers to distribute personal data (name, birth date, personal photos) of themselves, classmates or teachers to the public (for example, via the internet). Please take the time to read through and understand this important document. A. Use of computer and media equipment in the school 1) Scope of Application The rules in section A are valid for the use of the computers, the computers services, and the network located and accessed on Dresden International School campuses. These rules also apply to any devices that are connected to the school computers or the network either provided by the school, the teachers or the students (for example, personal laptops, digital cameras, digital video equipment, USB sticks, etc.). 2) Authorized Use Students are authorized to use available computers and laptops as designated by their teachers or school staff in accordance with the rules outlined in this policy document. 3) Login Information a) All students may receive logins and passwords for access to the school s computer systems and school network. b) Users must choose their own passwords. Passwords should be at least 8 characters in length, should not contain any identifying information and should contain a combination of letters, numbers and special characters. c) When a student is finished using a school-provide computer, the student must log out. 4) Password Secrecy
2 a) Students have the responsibility to protect the secrecy of their passwords. This means that a student must not give his or her login information to other people and must not log in to the computer system for other people. Students are expected to report when they notice other people using another person s login and password for access to the school s computer systems. The school administration has the right to deactivate any login that is suspected to be compromised. b) A student is not allowed to use someone else s username and password to access the school s computer systems and/or network. c) Students are not allowed to obtain passwords of other system users by any means. 5) Copyrighted Materials a) Students may not use the school computer systems and/or network to duplicate, distribute or alter copyrighted digital media without express written permission of the copyright holder or copyright administrative organization and permission of a teacher or school staff. b) Students may not use the school computer systems to circumvent copy protection (such as DRM) on digital media. c) Students may not store copyrighted material on the school s computer systems (for example, music, movie clips, images, software etc.). Copyrighted material may be deleted without notification. d) Students may not use their own devices to transmit copyrighted materials to other people s devices. 6) Computer Use for School Purposes Only The school computer systems and network (e.g. computers, intranet, internet access, software, external devices, cameras, video cameras, printers, scanners, etc.) may only be used for school-related purposes. This rule applies during class, during break and lunch times, before school and after school. 7) Bring Your Own Device a) Students must bring a fully charged, functioning laptop to school in accordance with the BYOD requirements and bring it to all classes with the exception of physical education. b) Laptops must be charged at home. Students may not charge their laptop batteries in the school. c) Students must follow teacher instructions with respect to their personal laptops. 8) Device Use a) Students must provide their own way of storing and backing up their school computer files. This can be accomplished, for example, by storing documents online, storing them on student owned laptops or on students'
3 own USB sticks. The school will not provide any storage for students' computer files. b) Students may bring other electronic devices to school in addition to their laptops (for example mobile phones, digital cameras, video cameras, etc.), but they may do so at their own risk. The school does not take any responsibility for loss, theft or damage of these items. c) Students may not alter, damage, or otherwise attempt to corrupt school computers or the computers of other students, computer workspaces, external devices, the school network or software. d) Students may not have food or drink near a computer or computing equipment. e) After finishing using a school computer, a student should leave the workspace ready for the next person. This means that the student should remove all materials from the workspace, push the chair back in under the desk, and log out. f) Students may not use school electronic devices (for example, video cameras, digital cameras, card readers, laptops, beamers, etc.) without the permission and supervision of a teacher or staff member. g) In special cases, students may check out special electronic media devices for use off-campus and without teacher or staff member supervision. For these purposes, a different procedure applies and the student s parents/guardians will be informed in advance in writing. h) Students may not use devices to share assessment materials with other students unless explicitly instructed to do so by a teacher. 9) Damaged Items a) In the case that an item of the school s IT equipment (computer systems, network or devices) has been damaged, students should report the damage to a teacher or school staff member. In the case that a student has damaged an item, that student s parents/guardians will be billed for the replacement or repair of the damaged item. b) In the case that a student's laptop or other media equipment is damaged, the student's family has the responsibility to have the item repaired or replaced. 10) System Configurations a) Students may not change the installation and configuration of the school computer systems (both hardware and software) and network. b) Students may only restart computers with the permission of teachers or school staff. c) Students may not access, modify, delete or destroy another user s files. d) Students may not deactivate virus scanners and configured start-up processes. e) Students may not install software on any school computing device.
4 f) Students may not introduce viruses, trojans, worms, root-kits, keyloggers, network sniffers, etc. to the schools computer systems and network. 11) Printing a) Students may use the printers and copiers in the hallways, library and secondary technology lab to print out documents or to make copies. b) Students will be issued one copy card which is needed to access the copiers and printers. c) The copy card will contain a limited number of pages that can be printed or copied. Once a student's balance reaches zero, he or she will have to request additional copies. d) The school reserves the right to charge fees or to turn off a student's copy card account in the case of excessive copying or printing. e) If a student loses his or her copy card, a 2.00 fee will be charged for replacement. f) Students may not share their copy card with others. 12) Fees a) Use of computers, IT and media equipment is currently available in the school without additional fees to the student. Students are expected to use the school computer systems and network respectfully and mindfully. b) The school reserves the right to charge fees in the future for specific IT services in the schools. Notifications of fee changes will be announced in advance in writing. B. Internet Access and Use 13) Prohibited Use Students who access the Internet using school computers should avoid legally prohibited websites. Above all others, sites that have pornographic content, offer gratuitous violence, contain racist content, or in some other way violate Germany s Jugendschutzgesetz[1] are forbidden. In the case that a student accidentally accesses such a page, the student should report this to a teacher or staff member immediately. 14) School Web Filter One of the ways that the school controls and monitors web access for students is via a web filter. Students may not attempt to bypass the school s web filter (for example, by attempting to use a proxy service). 15) Download of Internet Content a. Students may not download copyrighted digital media. b. Establishing and using file sharing networks is not allowed. c. Downloading software and making that software available to others is
5 not allowed. d. Downloading large files (>100Mb) over the school network is not allowed unless the student has permission from a teacher or other school staff member. e. Any file that is deemed inappropriate by school administration may be deleted from the schools computing resources without notice. 16) Access to School Databases In some cases, students may receive general logins and/or passwords to schoolacquired, academic resources in the internet. Students may not share logins or passwords for these resources with individuals outside of the school. 17) Online Subscriptions and Purchases a. Students may not enter any other internet subscriptions, contracts or agreements while at school without the permission of a teacher. b. Students may not provide personal information online in exchange for internet services. C. Publishing Content Online 18) School Online Sites a. Students may not upload content to the school's Internet site. b. Students may upload content to the school s intranet site. 19) Illegal Content a. Posting pornographic, violent, racist, youth-inappropriate, or intentionally-harmful content on the school s internet site or intranet site is forbidden. b. Content should not be posted in the Internet or intranet that would bring harm to the school s image. c. Posting political or commercial advertisements on the school s Internet or intranet sites is not allowed. 20) Copyrighted Content a. Students may upload their own work to the school s intranet site. b. Students may not upload copyrighted digital media to the school s intranet site without the express, written permission of the copyright holder or copyright administrative organization and permission of a member of school staff. c. Non-copyrighted material may be uploaded to the school s intranet site with the permission of a member of school staff. Non-copyrighted material includes public domain works, certain items under the creative commons license, and certain items under copyleft licenses.
6 d. Items that have been inappropriately uploaded to the school s intranet site or Internet site will be deleted as soon as they are discovered. e. Students may not publish sites in the name of the school online without the express, written permission of the school administration. This is also valid for web addresses that are not hosted by the school itself. 21) Personal Photos Students may not upload photos of other students, teachers or school staff members to the school Internet or intranet sites unless they have written permission from those individuals in the photographs. In the case that the photographed person is less than 18 years of age, written permission from that person s parent/guardian is required. 22) Social Networking a. Students may not use the school s computer systems and network to access social networking, file sharing, instant messaging or chat sites in the internet. 23) Use of School Identity a. Students may not enter into any Internet contracts or agreements on the behalf of the school without the express, written permission of the school administration. b. Students may not publish content on behalf of the school on any Internet site without the express, written permission of the school administration. D. Data Security 24) Supervisory Measures, Administration a. The school has the responsibility to supervise student activity on the computer systems and the school network. For this reason, data and activities are monitored on the school s computer systems and network. Monitoring is done both manually through visual inspections and by electronic means. b. IT administrators may freely access all files and folders stored on public, shared directories. c. The IT administrators have the responsibility to protect users privacy and will not distribute files stored in users home directories to third parties except in cases outlined in clause 23b. 25) & Online Learning Tools a. The school will provide accounts for and online productivity tools for students. b. School and productivity tools should primarily be used for class
7 purposes. c. Students may not use the school computer systems, these accounts or the network for mass mailings or any other inappropriate messages. d. Students must ask for permission from a teacher or school staff member before accessing their non-school accounts. e. Using another person s account is forbidden. E. Additional Rules for the Use of Computers Outside of Class 25) Availability a. School computers are not available for use by students outside of class time or the library without the supervision and permission of a staff member or teacher. b. Neither school computers nor personal laptops may be used in the cafeteria. c. During lunch periods, student laptops must be stored in students' lockers. d. If a student is not in class, and the library is open, he or she should go to the library to use his or her laptop. 26) Supervisory Responsibility Teachers and school staff members have the responsibility to watch and supervise students use of school computing resources. Students must expect and allow such supervision. F. Final Agreement 27) Parent/Guardian Signature A student may not have access to the school s computer systems and network until this form has been signed by the student s parent/guardian and returned to the student s advisor. The returned form will be kept in school records. 28) Cases of Inappropriate Use The school administration reserves the right to restrict the computer and/or network access of or temporarily remove the computer access from those students who do not adhere to the rules in the school. In serious cases, a student may be banned from the school s computer systems and network. Students who do not follow the rules outlined in this policy document may face additional disciplinary and/or legal (civil or criminal) consequences. 29) Appropriate versus Inappropriate Use In individual cases, the school reserves the right to define further appropriate and inappropriate uses of the school s computing systems and network that are currently outside the scope of the current version of this document. Such a determination would be for actions that cause harm to the school, its students and/or its teachers or
8 staff members. In the case that it has been determined that a student has acted inappropriately, and that student s actions do not fall within the terms of this policy, the school administration has the right to apply disciplinary actions as specified in clause 29. In some cases there may also be legal (civil or criminal) consequences. 30) Responsibility of the School a. The school does not guarantee the function of computing resources in the school. Nor does it guarantee the modification of school systems to meet the individual demands of students. b. Due to restricted resources, the school cannot ensure the backup of saved data on the school s computers or servers. Students have the responsibility to back up their own work. c. The school administration has the right to alter this policy. In the case of a change, users will be informed in writing [1]Information about Germany s Jugendschutzgesetz can be found at the internet site for the Bundesministerium für Familie, Senioren, Frauen und Jugend ( Translations of the law are available there in English as well as other languages. Jugendschutzgesetz. Internetredaktion des Bundesministeriums für Familie, Senioren, Frauen und Jugend, 6 June Bundesministeriums für Familie, Senioren, Frauen und Jugend. < Last accessed: 17 August 2011.
9 Dresden International School Computer and IT Use Policy Please detach this form, sign it, and return it to the school. Students will be issued a login and password once they have returned this signed form to the school. Both the student and a parent/guardian must sign the document. I have read and understood the policies set forth in the Dresden International School Computer and IT Use Policy. By signing this document, I am accepting the terms set forth in the policy. Student Name (please print): Student Signature Loccation, Date Parent/Guardian Signature Location, Date
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
ipad Acceptable Use Regulation
ipad Acceptable Use Regulation The Mamaroneck School District has purchased Apple ipads for selected students of the Mamaroneck School District. These students will be issued ipads with predetermined applications
CC. TECHNOLOGY ACCEPTABLE USE POLICY. 1. Purpose
CC. TECHNOLOGY ACCEPTABLE USE POLICY 1. Purpose a. The Children s Internet Protection Act (CIPA), 47 U.S.C. 254(h)(5), and South Dakota Consolidated Statues Section 22-24-55 require public schools to implement
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students AUP Sections 1. Acceptable Use 2. Privileges 3. Internet Access 4. Procedures & Caveats 5. Netiquette
INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP)
4510.2 INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP) The Board of Education is committed to the optimization of student learning and teaching. The Board considers computers to be a valuable tool for
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
7. Do not download or install software applications on WCSD issued Devices.
Wasatch County School District Student/Parent Device Agreement Handbook 2015/2016 School Year This document will outline the policies and procedures that are in place for the Wasatch School District Student/Parent
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
Quincy Public Schools Information Technology. Acceptable Use Policy for Staff, Students, and Guests
Quincy Public Schools Information Technology Acceptable Use Policy for Staff, Students, and Guests Revised May 6, 2013 Introduction This Acceptable Use Policy is enacted as of May 2013 by the Quincy School
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy
LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology
Acceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
Laptops for Students Program
Laptops for Students Program Technology Use Agreement Handbook Expanding Learning to the 21st Century and Beyond PAGE 1 OF 13 Table of Contents Laptop Policy & Procedures Handbook 3 Objectives 3 Laptop
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
STUDENT LAPTOP GUIDELINES
Bellmawr Public Schools STUDENT LAPTOP GUIDELINES Laptop Initiative Guiding Principles Laptops are provided first and foremost to further academic achievement Students are responsible for themselves and
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
Lighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15)
Lighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15) Student Name Date Responsible Use Agreement (in four parts) Part 1: Responsible Internet and Network Use Part 2: Responsible
Marion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students
Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3
INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET
INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET ACCEPTABLE USE POLICY As part of the College IT programme we offer pupils filtered access to the Internet. Before being allowed to use
Technology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY
HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY This policy applies whenever you are using Heathfield High School information technology equipment or services. It should be read in
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Acceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
Passwords Students should not share their assigned password, or attempt to discover the school Apple Id.
Alta Loma Christian School Acceptable Use Policy 1:1 ipad Program Revised January 20, 2014 Alta Loma Christian (ALCS) recognizes that access to technology in school gives students greater opportunities
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ BYOD (Bring Your Own Device) Technology Acceptable Use Washington District Schools provides all students access to technology, the district
1:1 COMPUTER PROGRAM LAPTOP POLICY
1:1 COMPUTER PROGRAM LAPTOP POLICY STATEMENT The focus of learning with laptops at Greater Clark County Schools (GCCS) is to prepare students for their future, a world of digital technology and information.
Dulwich College ICT Acceptable Use Policy
Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These
BOARD OF EDUCATION Cherry Hill, New Jersey
BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to
Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only
Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only Imhotep Academy is committed to staying on the forefront of educational practices of the 21st century. We are piloting a new policy
Eastwood Local Schools Laptop Policies and Handbook
Eastwood Local Schools Laptop Policies and Handbook Table of Contents Program Overview - 3 Acceptable Use Policy - 4 Information Technology Resources Responsibilities & Agreement - 7 District Laptop Service
POLICIES AND REGULATIONS Policy #78
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015
TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015 Tekamah-Herman Community Schools is proud to offer our High School Students Apple MacBook Air computers for use at school
RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES
Administrative RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES For any individual or group utilizing WRDSB technology Responsibility: Legal References: Related References:
BOARD OF EDUCATION POLICY
BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate
COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY
1 The COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) a consortium of the Colusa County Office of Education (CCOE) with Colusa Unified School District, Maxwell Unified School District, Williams Unified School
Vail School District Acceptable Use Policy 2015 2016
Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will
OCS Student / Parent Laptop Agreement
OCS Student / Parent Laptop Agreement Terms and Conditions of Use By signing this form, the student and the student s parent/guardian certify that they have thoroughly read, understand, and accept the
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
How To Understand The Bring Your Own Device To School Policy At A School
The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD) Purpose As a teacher, I want to move students forward into the 21 st century learning environment. Many students already use technology to access information 24/7 and we are
Technology Acceptable Use Policy. Introduction
Technology Acceptable Use Policy Introduction Shiloh Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop skills
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources
Boston Public Schools Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and Scope of Policy Technology Resources ACCEPTABLE USE POLICY AND GUIDELINES Boston
ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
Please Note: This is the Eastern School District policy in its entirety. Not all regulations are relevant to a K-6 school. Policy Statement ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY All
ICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures Purpose The purpose of the ACH Network Acceptable Use Procedures is to provide the procedures, rules, guidelines,
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
We have opted to implement a modified Bring Your Own Device (BYOD) program at the high school level.
Attention 7-12 parents and students: Last year we had the opportunity to pilot a 1:1 Chromebook program in grades 7-8. During this program, we were able to assess the impact providing each student with
