SlideShare una empresa de Scribd logo
1 de 28
Technology Acceptable Use
Policy
  Lockhart ISD
Technology Acceptable Use Policy

  Purpose
  StaffTechnology Acceptable Use Policy
  Student Technology Acceptable Use
   Policy
  User Agreements
Technology Acceptable Use Policy

PURPOSE
Purpose

  Enhance  quality of student learning
  Enhance staff & student efficiency
  Ensure protection of students and staff
  Protect hardware and software
  Sets standards for technology usage
Governances

  School
  Local,  state and federal law
  LISD has a duty to investigate suspected
   violations
Technology Resources

  Any electronic tool, device, program, or
   system that aids the educational and
   work environment
  Personal devices are included in the
   AUP
    Must  meet LISD minimum requirements—
     virus protection software
    Approved by technology department or
     campus administrator
Technology Acceptable Use Policy

STAFF TECHNOLOGY
ACCEPTABLE USE POLICY
Staff Technology Acceptable
Use Policy
  LISD  employees
   follow an acceptable
   use policy
Technology Acceptable Use Policy

STUDENT TECHNOLOGY
ACCEPTABLE USE POLICY
Student Technology Acceptable
Use Policy
  Established    for limited educational purposes
      Classroom activities, career development, limited
       high-quality self-discovery activities
  Not  a public access service or public forum
  Student has access unless a parent/guardian
   denies access
  All activity is monitored
  Follow same rules, good manners and
   common sense guidelines used with other
   daily school activities
General Unacceptable Behavior
  Posting  information that will cause damage or
   disruption of technology
  Engaging in personal attacks
  Harassing another person
  Posting false or defamatory information
  Using criminal speech
  Using speech inappropriate in an educational
   setting
General Unacceptable Behavior
  Abusing    network resources–chain letters
  Displaying, accessing or sending offensive
   messages or pictures
  Using for commercial purposes—garage
   sales, fundraisers, benefits
  Political lobbying
  Accessing unauthorized district systems—
   Skyward
General Unacceptable Behavior
  Using district resources to threaten employees
  Sending or posting messages that are
    Abusive
    Obscene

    Sexually oriented

    Threatening

    Harassing

    Damaging to another’s reputation

    Illegal

    Bullying
E-Mail
    Students will only use teacher or classroom accounts
    No private email is allowed
    Students cannot create private accounts at school
    Students will not repost a message that was sent to
     them privately without the permission of the person
     who sent them the message.
    Students will not post private information about
     another person.
World Wide Web
                    Online textbooks and
                     curriculum sites
                    Sites will be actively
                     monitored by teachers
                     and the technology
                     department
                    Annual Internet safety
                     training for students
Real-time, Interactive
Communication Areas
  Blogs,  Wikis, &
   Social Networking
   will only be used
   when directed by the
   teacher
  Use only to support
   educational activities
School Web Sites
    Class websites may have
       Group pictures without identification

       Individual students without identification

       Student work with first name only

    Materials on web must meet academic standards
    Graphics, text, sound, etc. must have copyright
     approval
    Must have link back to campus/district
Personal Safety
    Students will not share personal contact information
     about themselves or other people.
        Address
        Telephone
        School address
        Home address
    Do not give full name or any other personal contact
     information for any purpose.
    Do not agree to meet with someone you have met
     online.
    Tell an adult if any message received is inappropriate
     or makes you feel uncomfortable
System Security
    Students should secure user names and passwords
    Notify an adult if a security problem has been
     identified
    Do not attempt to gain unauthorized access to LISD
     network
    Do not attempt to disrupt the network or destroy data
    Do not attempt to access blocked sites
    Do not use sniffing or remote access technology to
     monitor network activity
    Do not create unauthorized networks
Software and Files
                        Software is for educational
                         use
                        Permission is needed to
                         install, upload or download
                         software
                        Intentional misuse may
                         result in disciplinary action
                        Electronic files are not
                         private
                        USB devices should be
                         used for storage only—not
                         software
Technology Hardware
                   Used for educational
                    purposes
                   Do not relocate
                    hardware
                   LISD regulates
                    hardware/software on
                    the network including
                    personal devices
                   LISD equipment may
                    only be used to support
                    educational goals
Vandalism
  Any   malicious
   attempt to harm or
   destroy data or the
   network will result in
   cancellation of
   network privileges
  Disciplinary measure
   will be enforced
Plagiarism and Copyright Infringement

  Plagiarism   is not
   allowed
  Copyright laws
   govern use of
   material
  Copyrighted material
   used in the district
   must have author’s
   permission
Videoconference

  Videoconferencing   is allowed
  May be videotaped by district personnel
  School acceptable use and behavior
   rules apply during conferences
Student Rights

  Electronic  network is a
   limited forum for valid
   educational purposes
  Searches will be
   conducted if there is
   reasonable suspicion
   of a violation
Due Process

  LISD  will cooperate with local, state or
   federal officials if illegal activities occur
  Student will be provided with notice and
   an opportunity to be heard in the manner
   set forth in the disciplinary code
Violations of this Acceptable Use
Policy
  Violations of this policy may result in loss
   of access as well as other disciplinary or
   legal action.
  Examples:
    Use of district network only under direct supervision
    Suspension of network privileges
    Revocation of network privileges
    Suspension of computer privileges
    Suspension from school
    Expulsion from school and/or
    Legal action and prosecution by the authorities
Student User Agreement
 Student Name ___________________________________
 Grade ________ School ________________________________________

 I have read the Lockhart ISD Student Technology Acceptable Use Policy
     Rules and Procedures document. I agree to follow the rules contained in
     this policy. I understand that if I violate the rules my access can be
     terminated and I may face other disciplinary measures.

 Student Signature _____________________________________________
 Date ________________

Más contenido relacionado

La actualidad más candente

Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
vlbrown
 
Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conduct
supunls
 
Et 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training sessionEt 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training session
Michelle Abee
 
Williamsburg school internet policy
Williamsburg school internet policyWilliamsburg school internet policy
Williamsburg school internet policy
dsansford
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
Jana Baxter
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
leslieannpt
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630
Paula Naugle
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPS
Jeanette Murphy
 
Aup lesson for vll students
Aup lesson for vll studentsAup lesson for vll students
Aup lesson for vll students
dlwadsworth
 

La actualidad más candente (18)

Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Technology acceptable use policy gr 7 day 1
Technology acceptable use policy   gr 7 day 1Technology acceptable use policy   gr 7 day 1
Technology acceptable use policy gr 7 day 1
 
Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conduct
 
Et 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training sessionEt 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training session
 
Williamsburg school internet policy
Williamsburg school internet policyWilliamsburg school internet policy
Williamsburg school internet policy
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630
 
ICT Acceptable Use POLICY
ICT Acceptable Use POLICYICT Acceptable Use POLICY
ICT Acceptable Use POLICY
 
Student RUP Agreement explained
Student RUP Agreement explainedStudent RUP Agreement explained
Student RUP Agreement explained
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPS
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
Studying online
Studying onlineStudying online
Studying online
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Aup lesson for vll students
Aup lesson for vll studentsAup lesson for vll students
Aup lesson for vll students
 
BYOD presentation- Young Women's Leadership Academy
BYOD presentation- Young Women's Leadership AcademyBYOD presentation- Young Women's Leadership Academy
BYOD presentation- Young Women's Leadership Academy
 
R B S C P
R B S  C PR B S  C P
R B S C P
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 

Destacado

How hr can get a seat at the CEo's table
How hr can get a seat at the CEo's tableHow hr can get a seat at the CEo's table
How hr can get a seat at the CEo's table
Rashmi Rawat
 
Technology internet rules 08202011[1]
Technology internet rules 08202011[1]Technology internet rules 08202011[1]
Technology internet rules 08202011[1]
ajdredla
 
SharedCanvas: Dealing with Uncertainty in Digital Facsimiles
SharedCanvas: Dealing with Uncertainty in Digital FacsimilesSharedCanvas: Dealing with Uncertainty in Digital Facsimiles
SharedCanvas: Dealing with Uncertainty in Digital Facsimiles
Robert Sanderson
 
Challenges of dealing with uncertainty
Challenges of dealing with uncertaintyChallenges of dealing with uncertainty
Challenges of dealing with uncertainty
Bob Prieto
 

Destacado (7)

How hr can get a seat at the CEo's table
How hr can get a seat at the CEo's tableHow hr can get a seat at the CEo's table
How hr can get a seat at the CEo's table
 
Technology internet rules 08202011[1]
Technology internet rules 08202011[1]Technology internet rules 08202011[1]
Technology internet rules 08202011[1]
 
Securing HR's Seat at the Table: Developing and Selling Strategic Strategic "...
Securing HR's Seat at the Table: Developing and Selling Strategic Strategic "...Securing HR's Seat at the Table: Developing and Selling Strategic Strategic "...
Securing HR's Seat at the Table: Developing and Selling Strategic Strategic "...
 
SharedCanvas: Dealing with Uncertainty in Digital Facsimiles
SharedCanvas: Dealing with Uncertainty in Digital FacsimilesSharedCanvas: Dealing with Uncertainty in Digital Facsimiles
SharedCanvas: Dealing with Uncertainty in Digital Facsimiles
 
DEALING WITH UNCERTAINITY
DEALING WITH UNCERTAINITYDEALING WITH UNCERTAINITY
DEALING WITH UNCERTAINITY
 
Dealing With Uncertainty
Dealing With UncertaintyDealing With Uncertainty
Dealing With Uncertainty
 
Challenges of dealing with uncertainty
Challenges of dealing with uncertaintyChallenges of dealing with uncertainty
Challenges of dealing with uncertainty
 

Similar a Technology acceptable use policy for students 08202011[1]

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
jsmarr11
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
jsmarr11
 
Social media policy
Social media policySocial media policy
Social media policy
Har1982
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
jessa_delingon
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
Lenva Shearing
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
Jennifer Whitt
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3
bweinert
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2
MGSD
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kit
trtkaren
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
Debbie Oliver
 

Similar a Technology acceptable use policy for students 08202011[1] (20)

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
CMS Technology acceptable use policy
CMS Technology acceptable use policyCMS Technology acceptable use policy
CMS Technology acceptable use policy
 
Social media policy
Social media policySocial media policy
Social media policy
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Privacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalPrivacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation final
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2
 
Security
SecuritySecurity
Security
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kit
 
Week 15 ppt eme2040
Week 15 ppt eme2040Week 15 ppt eme2040
Week 15 ppt eme2040
 
Responsible Use Presentation
Responsible Use PresentationResponsible Use Presentation
Responsible Use Presentation
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 

Más de ajdredla

Reading fair samples from pinterest
Reading fair samples from pinterestReading fair samples from pinterest
Reading fair samples from pinterest
ajdredla
 
Expository Writing
Expository WritingExpository Writing
Expository Writing
ajdredla
 
R&j act iii notes
R&j act iii notesR&j act iii notes
R&j act iii notes
ajdredla
 
Open-Ended Response rubric
Open-Ended Response rubricOpen-Ended Response rubric
Open-Ended Response rubric
ajdredla
 
Redeemed ministries austin
Redeemed ministries austinRedeemed ministries austin
Redeemed ministries austin
ajdredla
 
Ayn Rand Bio for class
Ayn Rand Bio for classAyn Rand Bio for class
Ayn Rand Bio for class
ajdredla
 
Genre terms
Genre termsGenre terms
Genre terms
ajdredla
 

Más de ajdredla (20)

Liturgist training
Liturgist trainingLiturgist training
Liturgist training
 
Economics unit 3 2
Economics unit 3 2Economics unit 3 2
Economics unit 3 2
 
Persuasive writing
Persuasive writingPersuasive writing
Persuasive writing
 
Persuasive Writing
Persuasive WritingPersuasive Writing
Persuasive Writing
 
W geo unit 2b canada
W geo unit 2b canadaW geo unit 2b canada
W geo unit 2b canada
 
W geo unit 2 landforms and resources us, canada
W geo unit 2 landforms and resources us, canadaW geo unit 2 landforms and resources us, canada
W geo unit 2 landforms and resources us, canada
 
The lady and the spider p point
The lady and the spider p pointThe lady and the spider p point
The lady and the spider p point
 
World history rome’s decline 3
World history rome’s decline 3World history rome’s decline 3
World history rome’s decline 3
 
World history roman republic
World history roman republicWorld history roman republic
World history roman republic
 
Economics unit 3 2
Economics unit 3 2Economics unit 3 2
Economics unit 3 2
 
Crossover short answer
Crossover short answerCrossover short answer
Crossover short answer
 
Greek Mythology Connections to Modern Times
Greek Mythology Connections to Modern TimesGreek Mythology Connections to Modern Times
Greek Mythology Connections to Modern Times
 
Roots
RootsRoots
Roots
 
Reading fair samples from pinterest
Reading fair samples from pinterestReading fair samples from pinterest
Reading fair samples from pinterest
 
Expository Writing
Expository WritingExpository Writing
Expository Writing
 
R&j act iii notes
R&j act iii notesR&j act iii notes
R&j act iii notes
 
Open-Ended Response rubric
Open-Ended Response rubricOpen-Ended Response rubric
Open-Ended Response rubric
 
Redeemed ministries austin
Redeemed ministries austinRedeemed ministries austin
Redeemed ministries austin
 
Ayn Rand Bio for class
Ayn Rand Bio for classAyn Rand Bio for class
Ayn Rand Bio for class
 
Genre terms
Genre termsGenre terms
Genre terms
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Technology acceptable use policy for students 08202011[1]

  • 2. Technology Acceptable Use Policy  Purpose  StaffTechnology Acceptable Use Policy  Student Technology Acceptable Use Policy  User Agreements
  • 3. Technology Acceptable Use Policy PURPOSE
  • 4. Purpose  Enhance quality of student learning  Enhance staff & student efficiency  Ensure protection of students and staff  Protect hardware and software  Sets standards for technology usage
  • 5. Governances  School  Local, state and federal law  LISD has a duty to investigate suspected violations
  • 6. Technology Resources  Any electronic tool, device, program, or system that aids the educational and work environment  Personal devices are included in the AUP  Must meet LISD minimum requirements— virus protection software  Approved by technology department or campus administrator
  • 7. Technology Acceptable Use Policy STAFF TECHNOLOGY ACCEPTABLE USE POLICY
  • 8. Staff Technology Acceptable Use Policy  LISD employees follow an acceptable use policy
  • 9. Technology Acceptable Use Policy STUDENT TECHNOLOGY ACCEPTABLE USE POLICY
  • 10. Student Technology Acceptable Use Policy  Established for limited educational purposes  Classroom activities, career development, limited high-quality self-discovery activities  Not a public access service or public forum  Student has access unless a parent/guardian denies access  All activity is monitored  Follow same rules, good manners and common sense guidelines used with other daily school activities
  • 11. General Unacceptable Behavior  Posting information that will cause damage or disruption of technology  Engaging in personal attacks  Harassing another person  Posting false or defamatory information  Using criminal speech  Using speech inappropriate in an educational setting
  • 12. General Unacceptable Behavior  Abusing network resources–chain letters  Displaying, accessing or sending offensive messages or pictures  Using for commercial purposes—garage sales, fundraisers, benefits  Political lobbying  Accessing unauthorized district systems— Skyward
  • 13. General Unacceptable Behavior  Using district resources to threaten employees  Sending or posting messages that are  Abusive  Obscene  Sexually oriented  Threatening  Harassing  Damaging to another’s reputation  Illegal  Bullying
  • 14. E-Mail  Students will only use teacher or classroom accounts  No private email is allowed  Students cannot create private accounts at school  Students will not repost a message that was sent to them privately without the permission of the person who sent them the message.  Students will not post private information about another person.
  • 15. World Wide Web  Online textbooks and curriculum sites  Sites will be actively monitored by teachers and the technology department  Annual Internet safety training for students
  • 16. Real-time, Interactive Communication Areas  Blogs, Wikis, & Social Networking will only be used when directed by the teacher  Use only to support educational activities
  • 17. School Web Sites  Class websites may have  Group pictures without identification  Individual students without identification  Student work with first name only  Materials on web must meet academic standards  Graphics, text, sound, etc. must have copyright approval  Must have link back to campus/district
  • 18. Personal Safety  Students will not share personal contact information about themselves or other people.  Address  Telephone  School address  Home address  Do not give full name or any other personal contact information for any purpose.  Do not agree to meet with someone you have met online.  Tell an adult if any message received is inappropriate or makes you feel uncomfortable
  • 19. System Security  Students should secure user names and passwords  Notify an adult if a security problem has been identified  Do not attempt to gain unauthorized access to LISD network  Do not attempt to disrupt the network or destroy data  Do not attempt to access blocked sites  Do not use sniffing or remote access technology to monitor network activity  Do not create unauthorized networks
  • 20. Software and Files  Software is for educational use  Permission is needed to install, upload or download software  Intentional misuse may result in disciplinary action  Electronic files are not private  USB devices should be used for storage only—not software
  • 21. Technology Hardware  Used for educational purposes  Do not relocate hardware  LISD regulates hardware/software on the network including personal devices  LISD equipment may only be used to support educational goals
  • 22. Vandalism  Any malicious attempt to harm or destroy data or the network will result in cancellation of network privileges  Disciplinary measure will be enforced
  • 23. Plagiarism and Copyright Infringement  Plagiarism is not allowed  Copyright laws govern use of material  Copyrighted material used in the district must have author’s permission
  • 24. Videoconference  Videoconferencing is allowed  May be videotaped by district personnel  School acceptable use and behavior rules apply during conferences
  • 25. Student Rights  Electronic network is a limited forum for valid educational purposes  Searches will be conducted if there is reasonable suspicion of a violation
  • 26. Due Process  LISD will cooperate with local, state or federal officials if illegal activities occur  Student will be provided with notice and an opportunity to be heard in the manner set forth in the disciplinary code
  • 27. Violations of this Acceptable Use Policy  Violations of this policy may result in loss of access as well as other disciplinary or legal action.  Examples:  Use of district network only under direct supervision  Suspension of network privileges  Revocation of network privileges  Suspension of computer privileges  Suspension from school  Expulsion from school and/or  Legal action and prosecution by the authorities
  • 28. Student User Agreement Student Name ___________________________________ Grade ________ School ________________________________________ I have read the Lockhart ISD Student Technology Acceptable Use Policy Rules and Procedures document. I agree to follow the rules contained in this policy. I understand that if I violate the rules my access can be terminated and I may face other disciplinary measures. Student Signature _____________________________________________ Date ________________