Student Network Acceptable Use Policy Lone Jack C-6 School District



Similar documents
MEDWAY PUBLIC SCHOOLS Medway, MA. Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois

Hyde School Student Computer Systems Acceptable Use Policy

COMPUTER USE IN INSTRUCTION

COMPUTER NETWORK FOR EDUCATION

Ceres Unified School District

POLICY Adopted by Board of Education: 4/20/05

Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement

Descriptor Code: EFE-P

Forrestville Valley School District #221

COMPUTER, NETWORK AND INTERNET USE POLICY

POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan ACCEPTABLE USE POLICY

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Acceptable Use Policy

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Please direct any questions to me at

REGION 19 HEAD START. Acceptable Use Policy

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT , INTERNET AND COMPUTER USE

Acceptable Use Policy

Acceptable Use Policy

Internet Acceptable Use Policy

Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

COMPUTER NETWORK AGREEMENT FORM

AP 417 Information and Communication Services

APPROPRIATE USE OF DIGITAL COMMUNICATIONS AND TECHNOLOGIES POLICY

Haddon Township School District Acceptable Use of Information and Communication Technology for Students

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

Code of Virginia, 1950, as amended, Sections , :1, , , and

How To Use A College Computer System Safely

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

Revelstoke Board of Education Policy Manual

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY

ACCEPTABLE USE OF TECHNOLOGY

Computer, Network, and Internet Use Student Policy (As of 8/1/09)

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

Acceptable Use Policy

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

BOARD OF EDUCATION Cherry Hill, New Jersey

Insert GNIS Logo Here. Acceptable Use Policy & Guidelines Information Technology Policies & Procedures. Guangzhou Nanhu International School

region16.net Acceptable Use Policy ( AUP )

POLICY SUPPORT OPERATIONS 5042 ACCEPTABLE USE POLICY FOR NETWORK AND INTERNET ACCESS

Wikis: A wiki is a website that allows visitors to add, remove, and edit content online.

SAN BERNARDINO CITY UNIFIED SCHOOL DISTRICT Employee Technology Acceptable Use Agreement

RIVERVIEW SCHOOL DISTRICT

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN

Alvin Independent School District Student Responsible Use Guidelines for Technology

File: IIBEA ACCEPTABLE COMPUTER SYSTEM USE

13. Acceptable Use Policy

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures

Transcription:

Student Network Acceptable Use Policy The, hereinafter known as LJC6, provides students and staff with a service called the Network. The Network is a computer service, which includes, but is not limited to the use of computers, servers, e-mail and the Internet. Learning is enhanced through technology s endless possibilities. Students and teachers have opportunities to gather information, communicate with people all over the world, and create their own products. However, some of the Network s systems may contain offensive material. Even though it is impossible to have control over all the information on the Network, LJC6 has in place several ways to prevent access to inappropriate materials and to provide for a positive, productive educational experience. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at LJC6. These rules are in place to protect the student and LJC6. Inappropriate use exposes LJC6 to risks including virus attacks, compromise of network systems and services, and legal issues. Scope This policy applies to students of LJC6. This policy applies to all equipment that is owned or leased by LJC6. Policy The privilege of using the Network is conditional upon following the following guidelines and rules. Please read this document carefully. When signed by the user and guardian (if necessary), it becomes a legally binding contract. Terms and Conditions of the Contract: 1. Personal Responsibility: As a representative of this school, the user will accept personal responsibility for their reporting any misuse of the Network to the appropriate individuals (supervising teacher, principal, and/or Director of Technology). Misuse can come in many forms, but it is commonly viewed as any message(s) sent or received that indicate or suggest pornography, unethical or illegal solicitation, racism, sexism, inappropriate language, and other issues described below. Last modified on 8/5/2015 at 12:56 PM. Page 1 of 5

2. Acceptable Use: The use of an assigned account must be in support of education and with the educational goals and objectives of LJC6. The user is personally responsible for this provision at all times when using the Network and additionally agrees to the following acceptable use conditions: a. Use of the organization s Network or computing resources must comply with rules appropriate to that network. b. Transmission of any material in violation of any United States or other State law is prohibited. This includes, but is not limited to copyrighted material, threatening or obscene material, or material protected by trade secret. c. Use of the Network by commercial agencies with the intent of profiting is generally not acceptable. d. Use of the Network for product advertisement or political lobbying is prohibited. e. The user will conduct themselves in a manner consistent with school policy and expectations when communicating across the Network (e-mail, chat rooms, and videoconferencing). f. The user understands that the inappropriate use of electronic information resources can be a violation of local, state, and federal laws and that he or she can be prosecuted for violating those laws. g. Students will not use the Network for the following, unless being used for a specific class project: Email, Chat, Instant Messaging, Blogging, Facebook. h. Students will not make fraudulent offers of products, items, or services originating from any LJC6 account or equipment. i. Students will not affect security breaches or disruptions of network communication. Security breaches include, but are not limited to, accessing data of which the user is not an intended recipient or logging into a server or account that the student is not expressly authorized to access. For purposes of this section, disruption includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information for malicious purposes. j. Students will not execute any form of network monitoring. k. Students will not circumvent user authentication or security of any host, network, or account. l. Students will not interfere with or deny service to any user. m. Students will not use any program/script/command or send messages of any kind, with the intent to interfere with, or disable, a user s terminal session, via any means, locally or via the Internet/Intranet/Extranet. n. Students will not provide information about, or lists of, LJC6 employees or students to parties outside LJC6. Last modified on 8/5/2015 at 12:56 PM. Page 2 of 5

3. Privileges: The use of the Network is a privilege, not a right, and inappropriate use will result in a cancellation of those privileges. LJC6 has the right to decide what use is appropriate and their decisions are final. The staff or faculty of LJC6 may request at any time that the Network Administrator deny, revoke, or suspend specific user accounts. LJC6 also reserves the right to monitor individual use. 4. Network Etiquette and Privacy: The user is expected to abide by the generally accepted rules of network etiquette. These rules include (but are not limited to) the following: a. Be polite. Do not send or encourage others to send abusive messages. b. Use appropriate language. Never use profanity, vulgarities, or any other illegal or unethical language. Illegal activities of any kind are strictly forbidden. c. Maintain appropriate privacy. Do not reveal personal information over the Network, or the personal information of others. d. Avoid disruptions. Do not use the Network in any way that would disrupt use of the Network by others (i.e. downloading programs, files, or graphics unless authorized by Technology Staff). e. Network protection. Do not use questionable discs or software not licensed by LJC6 on any LJC6 computer. Use caution when using e-mail to avoid potential problems and do not download attachments unless authorized by Technology Staff. 5. Services: LJC6 makes no warranties of any kind, whether expressed or implied, for the service it is providing. LJC6 will not be responsible for any damages suffered while on the Network. These damages include loss of data as a result of delays, non-deliveries, inaccurate deliveries, or service interruptions caused by the system or human errors and omissions. Use of any information acquired from the Network is at the user s own risk. LJC6 specifically disclaims any responsibility for the accuracy of information obtained through its services. 6. Security: Security on any computer system is a high priority because there are so many users. If the user identifies a problem with security on the Network, he or she will notify Technology Staff at once. The user will never demonstrate the problem to other users. The user will never reveal or use another s account without the written permission of that person. All use of the system will be under the user s own account. For security and network maintenance purposes, authorized individuals within LJC6 may monitor equipment, systems and network traffic at any time. LJC6 reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy. Last modified on 8/5/2015 at 12:56 PM. Page 3 of 5

7. Vandalism: Vandalism is defined as any malicious attempt to harm or destroy data of another user or any other agencies or networks connected to the system. This includes, but is not limited to, the uploading or creation of computer viruses, tampering with system files, and entering into areas of the Network which are considered off-limits. Any vandalism of network or equipment will result in the loss of network services, disciplinary action and legal referral. 8. Updating: The Network may occasionally require new registration and account information from the user to continue service. The user must notify the system administrator of any changes in the user s account information. 9. Consequences of Violations: Consequences for violations of this contract may include, but are not limited to: a. Suspension from all or some network resources b. Revocation of some or all network resources c. In-School Suspension d. Out-of-School Suspension e. School Expulsion f. Legal action and prosecution by law enforcement authorities LJC6 has the right to restrict or terminate network access to any or all users at any time and for any reason. LJC6 further has the right to monitor network activity in any form that it sees fit in order to maintain the integrity of the Network. The student has no expectation of privacy in the use of the LJC6 Network. Last modified on 8/5/2015 at 12:56 PM. Page 4 of 5

2015-2016 Grade Student s name (printed) I have read, understood and agree to the information contained on pages 1-4 of the Network User Agreement Form. I understand that by signing this form, the User defined below will be granted access to the Network and the privileges and responsibilities involved. Student s Signature Date Parent/Guardian s Signature Date 2015-2016 Network Acceptable Use Agreement A copy of the Student Network Acceptable Use Policy can be found at all school offices or by visiting www.lonejackc6.net >District>Technology Last modified on 8/5/2015 at 12:56 PM. Page 5 of 5