SlideShare una empresa de Scribd logo
1 de 35
Taken from Board Policy No. 2022P
The Normal Stuff
General Use                 Personal Security

Personal Responsibility     Copyright

Lab Management              Repairs

                 Consequences

Please click on each title to learn more.
General Use
The network exists primarily for email and
  internet research.




                                     Return to contents
General Use


It is not intended to be used for non academic
   purposes.
General Use




Network bandwidth is limited so teachers
 should not waste or allow students to waste
 this resource.
General Use
The network exists primarily for email and
   internet research.
It is not intended to be used for non academic
   purposes.
Network bandwidth is limited so teachers
   should not waste or allow students to waste
   this resource.
Personal Responsibility
1. Use of network supports student learning
2.
3.
4.
5.
6.
7.
Personal Responsibility
1.
2. Do not break any laws or use network to make money.
3.
4.
5.
6.
7.
Personal Responsibility
1.
2.
3. Do not use network to express political views.
4.
5.
6.
7.
Personal Responsibility
1.
2.
3.
4. Do nothing to harm hardware, software, or the network.
5.
6.
7.
Personal Responsibility
1.
2.
3.
4.
5. Using the network to develop malicious programs is
   prohibited.
6.
7.
Personal Responsibility
1.
2.
3.
4.
5.
6. The use of the network to access, store, or distribute
   unauthorized material (i.e. pornography) is strictly
   prohibited.
7.
Personal Responsibility
1. Use of network supports student learning
2. Do not break any laws or use network to make money.
3. Do not use network to express political views.
4. Do nothing to harm hardware, software, or the network.
5. Using the network to develop malicious programs is
   prohibited.
6. Users are responsible for what they publish via the network.
   Harassment/Hate mail are prohibited. (remember whatever
   you write is a public document.)
7. The use of the network to access, store, or distribute
   unauthorized material (i.e. pornography) is strictly
   prohibited.
Lab Management




       Return to contents
Lab Management
Please follow through on the following elements of lab management:
1) Use a seating chart so there is a record of who was at each
    computer.
Lab Management

Please follow through on the following elements of lab management:
1)
2) No food or drink near computers.
Lab Management

Please follow through on the following elements of lab management:
1)
2)
3) Manage by walking around (lab time is not lecture, email, grading,
    or time for meeting with individuals).
Lab Management

Please follow through on the following elements of lab management:
1)
2)
3)
4) Use Management software (LanSchool).
Lab Management

Please follow through on the following elements of lab management:
1)
2)
3)
4) Make certain that the lab is cleaned up prior to the end of each
    period. (Leave at least 5 minutes for clean up).
Lab Management

Please follow through on the following elements of lab management:
1)
2)
3)
4)
5)
6) Make certain that your students know what they are doing prior
    to going to the lab… Most damage is done out of student
    frustration over assignments…If they don’t have a plan, they
    should not be on the computer…
Lab Management

Please follow through on the following elements of lab management:
1) Use a seating chart so there is a record of who was at each
    computer.
2) No food or drink near computers.
3) Manage by walking around (lab time is not lecture, email, grading,
    or time for meeting with individuals).
4) Use Management software (LanSchool).
5) Make certain that the lab is cleaned up prior to the end of each
    period. (Leave at least 5 minutes for clean up).
6) Make certain that your students know what they are doing prior
    to going to the lab… Most damage is done out of student
    frustration over assignments…If they don’t have a plan, they
    should not be on the computer…
Personal Security

 Do not share your passwords or
  account privileges with anyone
  else.

 Doing so may be considered
  making a gift of public funds
  and may jeopardize the security
  of your account.

                                    Return to contents
The unauthorized…
   Copyright                    -installation -use -storage
                                -or distribution of copyrighted
                                   material or software on district
                                   computers is prohibited.

Helpful hint… unless the district owns
the item or it is specifically marked as
being able to be used in educational
settings, it is copyrighted and you need
the creator’s permission.

This includes anything you get from the
internet as well.

           Return to contents
                                                     Image by Stephen Downes
Repairs




Return to contents
Repairs
1) Turn everything off and back on (90% of problems
   may be solved by a simple reboot.)
2)
3)
4)
Repairs
1)
2) If it is a gray tower, we need to fix it ourselves. (Send
   Bill and Paul an email… do not just write it on the
   board, we won’t see it)
3)
4)
Repairs
1)
2)
3) Do not let students work on computers.
4)
Repairs
1)
2)
3)
4) If you need a software update or a repair for a
   laptop/black tower, go online and fill out a trouble
   ticket. Do not leave it for someone else to take care
   of.
Repairs
1) Turn everything off and back on (90% of problems
   may be solved by a simple reboot.)
2) If it is a gray tower, we need to fix it ourselves. (Send
   Bill and Paul an email… do not just write it on the
   board, we won’t see it)
3) Do not let students work on computers.
4) If you need a software update or a repair for a
   laptop/black tower, go online and fill out a trouble
   ticket. Do not leave it for someone else to take care
   of.
Consequences




               Return to contents
Consequences
• For security and administrative purposes the district retains
  the right for authorized personnel to review network system
  use and file content.

•

•
Consequences
•

• The district reserves the right to remove a user account to
  prevent further unauthorized activity.

•

•
Consequences
•

•

• The District’s service provider reserves the right to
  disconnect the district to prevent further unauthorized
  activity.
•
Consequences
•

•

•

• Violation of any of the conditions of use may be cause
  for loss of network privileges and/or disciplinary action
  up to and including termination of employment.
Consequences
• For security and administrative purposes the district retains
  the right for authorized personnel to review network system
  use and file content.

• The district reserves the right to remove a user account to
  prevent further unauthorized activity.

• The District’s service provider reserves the right to disconnect
  the district to prevent further unauthorized activity.

• Violation of any of the conditions of use may be cause for loss
  of network privileges and/or disciplinary action up to and
  including termination of employment.

Más contenido relacionado

Similar a Staff Acceptable Use Policy

Project integrator
Project integratorProject integrator
Project integrator
Itzcel Mc'
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
North Texas Chapter of the ISSA
 
Enabling technologyvirtualisationproject
Enabling technologyvirtualisationprojectEnabling technologyvirtualisationproject
Enabling technologyvirtualisationproject
Jisc
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
DondonGoles
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
RichardSugbo
 
Getting Schooled DerbyCon 3.0
Getting Schooled DerbyCon 3.0Getting Schooled DerbyCon 3.0
Getting Schooled DerbyCon 3.0
TonikJDK
 
Short introduction about computer.
Short introduction about computer.Short introduction about computer.
Short introduction about computer.
Ramesh Pant
 

Similar a Staff Acceptable Use Policy (20)

Project integrator
Project integratorProject integrator
Project integrator
 
Health and safety in the workplace.
Health and safety in the workplace.Health and safety in the workplace.
Health and safety in the workplace.
 
Derby con 2014
Derby con 2014Derby con 2014
Derby con 2014
 
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IVIncident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Enabling technologyvirtualisationproject
Enabling technologyvirtualisationprojectEnabling technologyvirtualisationproject
Enabling technologyvirtualisationproject
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptx
 
IRJET- Use of the Neural Network in Database
IRJET- Use of the Neural Network in DatabaseIRJET- Use of the Neural Network in Database
IRJET- Use of the Neural Network in Database
 
Unit8 it solutions-nl-official
Unit8 it solutions-nl-officialUnit8 it solutions-nl-official
Unit8 it solutions-nl-official
 
CS Syllabus 2014
CS Syllabus 2014CS Syllabus 2014
CS Syllabus 2014
 
SUS - ease of use perceptions and eportfoliostfolios Stephen Bright
SUS - ease of use perceptions and eportfoliostfolios  Stephen BrightSUS - ease of use perceptions and eportfoliostfolios  Stephen Bright
SUS - ease of use perceptions and eportfoliostfolios Stephen Bright
 
SUS - ease of use perceptions and eportfoliostfolios Stephen Bright
SUS - ease of use perceptions and eportfoliostfolios  Stephen BrightSUS - ease of use perceptions and eportfoliostfolios  Stephen Bright
SUS - ease of use perceptions and eportfoliostfolios Stephen Bright
 
Getting Schooled DerbyCon 3.0
Getting Schooled DerbyCon 3.0Getting Schooled DerbyCon 3.0
Getting Schooled DerbyCon 3.0
 
Introduction to Basic IT Knowledge.pptx
Introduction to Basic IT  Knowledge.pptxIntroduction to Basic IT  Knowledge.pptx
Introduction to Basic IT Knowledge.pptx
 
Short introduction about computer.
Short introduction about computer.Short introduction about computer.
Short introduction about computer.
 

Más de lagrange (9)

Simple steps to incorporating you tube videos in powerpoint
Simple steps to incorporating you tube videos in powerpointSimple steps to incorporating you tube videos in powerpoint
Simple steps to incorporating you tube videos in powerpoint
 
Gimp Vs Photoshop
Gimp Vs PhotoshopGimp Vs Photoshop
Gimp Vs Photoshop
 
Creating stuff on Firstclass
Creating stuff on FirstclassCreating stuff on Firstclass
Creating stuff on Firstclass
 
Can You Blog In A Wiki
Can You Blog In A WikiCan You Blog In A Wiki
Can You Blog In A Wiki
 
Chapt 10 2 Qz Review
Chapt 10 2 Qz ReviewChapt 10 2 Qz Review
Chapt 10 2 Qz Review
 
Temps Et Sport
Temps Et SportTemps Et Sport
Temps Et Sport
 
Je Peux Te Parler
Je Peux Te ParlerJe Peux Te Parler
Je Peux Te Parler
 
Je Peux Te Parler
Je Peux Te ParlerJe Peux Te Parler
Je Peux Te Parler
 
Weather1
Weather1Weather1
Weather1
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Staff Acceptable Use Policy

  • 1. Taken from Board Policy No. 2022P
  • 2. The Normal Stuff General Use Personal Security Personal Responsibility Copyright Lab Management Repairs Consequences Please click on each title to learn more.
  • 3. General Use The network exists primarily for email and internet research. Return to contents
  • 4. General Use It is not intended to be used for non academic purposes.
  • 5. General Use Network bandwidth is limited so teachers should not waste or allow students to waste this resource.
  • 6. General Use The network exists primarily for email and internet research. It is not intended to be used for non academic purposes. Network bandwidth is limited so teachers should not waste or allow students to waste this resource.
  • 7. Personal Responsibility 1. Use of network supports student learning 2. 3. 4. 5. 6. 7.
  • 8. Personal Responsibility 1. 2. Do not break any laws or use network to make money. 3. 4. 5. 6. 7.
  • 9. Personal Responsibility 1. 2. 3. Do not use network to express political views. 4. 5. 6. 7.
  • 10. Personal Responsibility 1. 2. 3. 4. Do nothing to harm hardware, software, or the network. 5. 6. 7.
  • 11. Personal Responsibility 1. 2. 3. 4. 5. Using the network to develop malicious programs is prohibited. 6. 7.
  • 12. Personal Responsibility 1. 2. 3. 4. 5. 6. The use of the network to access, store, or distribute unauthorized material (i.e. pornography) is strictly prohibited. 7.
  • 13. Personal Responsibility 1. Use of network supports student learning 2. Do not break any laws or use network to make money. 3. Do not use network to express political views. 4. Do nothing to harm hardware, software, or the network. 5. Using the network to develop malicious programs is prohibited. 6. Users are responsible for what they publish via the network. Harassment/Hate mail are prohibited. (remember whatever you write is a public document.) 7. The use of the network to access, store, or distribute unauthorized material (i.e. pornography) is strictly prohibited.
  • 14. Lab Management Return to contents
  • 15. Lab Management Please follow through on the following elements of lab management: 1) Use a seating chart so there is a record of who was at each computer.
  • 16. Lab Management Please follow through on the following elements of lab management: 1) 2) No food or drink near computers.
  • 17. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) Manage by walking around (lab time is not lecture, email, grading, or time for meeting with individuals).
  • 18. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) 4) Use Management software (LanSchool).
  • 19. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) 4) Make certain that the lab is cleaned up prior to the end of each period. (Leave at least 5 minutes for clean up).
  • 20. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) 4) 5) 6) Make certain that your students know what they are doing prior to going to the lab… Most damage is done out of student frustration over assignments…If they don’t have a plan, they should not be on the computer…
  • 21. Lab Management Please follow through on the following elements of lab management: 1) Use a seating chart so there is a record of who was at each computer. 2) No food or drink near computers. 3) Manage by walking around (lab time is not lecture, email, grading, or time for meeting with individuals). 4) Use Management software (LanSchool). 5) Make certain that the lab is cleaned up prior to the end of each period. (Leave at least 5 minutes for clean up). 6) Make certain that your students know what they are doing prior to going to the lab… Most damage is done out of student frustration over assignments…If they don’t have a plan, they should not be on the computer…
  • 22. Personal Security Do not share your passwords or account privileges with anyone else. Doing so may be considered making a gift of public funds and may jeopardize the security of your account. Return to contents
  • 23. The unauthorized… Copyright -installation -use -storage -or distribution of copyrighted material or software on district computers is prohibited. Helpful hint… unless the district owns the item or it is specifically marked as being able to be used in educational settings, it is copyrighted and you need the creator’s permission. This includes anything you get from the internet as well. Return to contents Image by Stephen Downes
  • 25. Repairs 1) Turn everything off and back on (90% of problems may be solved by a simple reboot.) 2) 3) 4)
  • 26. Repairs 1) 2) If it is a gray tower, we need to fix it ourselves. (Send Bill and Paul an email… do not just write it on the board, we won’t see it) 3) 4)
  • 27. Repairs 1) 2) 3) Do not let students work on computers. 4)
  • 28. Repairs 1) 2) 3) 4) If you need a software update or a repair for a laptop/black tower, go online and fill out a trouble ticket. Do not leave it for someone else to take care of.
  • 29. Repairs 1) Turn everything off and back on (90% of problems may be solved by a simple reboot.) 2) If it is a gray tower, we need to fix it ourselves. (Send Bill and Paul an email… do not just write it on the board, we won’t see it) 3) Do not let students work on computers. 4) If you need a software update or a repair for a laptop/black tower, go online and fill out a trouble ticket. Do not leave it for someone else to take care of.
  • 30. Consequences Return to contents
  • 31. Consequences • For security and administrative purposes the district retains the right for authorized personnel to review network system use and file content. • •
  • 32. Consequences • • The district reserves the right to remove a user account to prevent further unauthorized activity. • •
  • 33. Consequences • • • The District’s service provider reserves the right to disconnect the district to prevent further unauthorized activity. •
  • 34. Consequences • • • • Violation of any of the conditions of use may be cause for loss of network privileges and/or disciplinary action up to and including termination of employment.
  • 35. Consequences • For security and administrative purposes the district retains the right for authorized personnel to review network system use and file content. • The district reserves the right to remove a user account to prevent further unauthorized activity. • The District’s service provider reserves the right to disconnect the district to prevent further unauthorized activity. • Violation of any of the conditions of use may be cause for loss of network privileges and/or disciplinary action up to and including termination of employment.