SlideShare una empresa de Scribd logo
1 de 4
Haplesmain Junior Academy
                                    Internet Policy

I. Responsibilities & Privileges

        The use of the Internet computer network for illegal, inappropriate, unacceptable, or
unethical purposes by students or employees is prohibited.



II. Authority

         The Haplesmain School District reserves the right to determine which network services
will be provided through the school district resources. It reserves the right to view and monitor
all applications provided through the network, including e-mail, and to log Internet use by
students and staff. The school district reserves the right to revoke user privileges, remove
user accounts, and refer to legal authorities when appropriate violation of this and any other
applicable district policies, including those governing network use, copyright, security, and
vandalism of district resources and equipment. The Haplesmain School District bears no
responsibility for information that is lost, damaged or unavailable due to technical problems.



III. Procedures

        Network accounts will be used only by the authorized user of the account for its
authorized purpose. Accounts will be made available according to a schedule developed by
appropriate district authorities given the capability of district hardware. Access to accounts will
be given out to only those individuals who meet the following requirements:

    1.   Have read the District Internet Policy and indicate their agreement with its provisions
         by signing the signature page and returning it to the appropriate district authority.
         Students must have their parent or guardian sign this signature page indicating the
         parent or guardian's agreement with the policy and their consent to allow the student
         to access and use the network.
    2.   Have successfully completed a district course, which will include but not be limited to
         instruction on network, access, use, acceptable vs. unacceptable uses, etiquette, and
         the consequences of abuse of privileges and responsibilities. This requirement shall
         apply for both students and district employees.



IV. Prohibitions

         The use of the Internet computer network for illegal, inappropriate, unacceptable, or
unethical purposes by students or employees is prohibited. The activities listed below are
strictly prohibited by all users of the network. The Haplesmain School District reserves the
right to determine if any activity not appearing in the list below constitutes an acceptable or
unacceptable use of the network. These prohibitions are in effect any time school district
resources are accessed.

    •    Use of the network for non-work or non-school related communications.

    •    Use of the network to access obscene or pornographic material.
•   Use of the network to transmit material likely to be offensive or objectionable to
        recipients.

    •   Use of the network to participate in inappropriate and /or objectionable discussions or
        news groups.

    •   Hate mail, harassment, discriminatory remarks and other antisocial communications
        on the network.

    •   Use of the network which results in any copyright violation.

    •   The illegal installation, distribution, reproduction, or use of copyrighted software on
        district computers.
    •   Use of the network to intentionally obtain or modify files, passwords, or data belonging
        to other users.
    •   Use of the network to misrepresent other users on the network.

    •   Use of school technology or the network for fraudulent copying, communications or
        modification of materials in violation of local, state, and federal law.

    •   Loading, downloading, or use of unauthorized games, programs, files or other
        electronic media.

    •   Malicious use of the network to develop programs that harass other users or infiltrate
        a computer system and/or damage the software components of a computer system.

    •   Destruction of district computer hardware or software.

    •   Use of the network to participate in Internet Relay chats (on-line real-time
        conversations).
    •   Use of the network to facilitate any illegal activity.

    •   Use of the network to communicate through e-mail for non-educational purposes or
        activities.

    •   Use of the network for commercial or for-profit purposes.

    •   Use of the network for product advertisement or political lobbying.



V. Consequences of Abuse

         Any user of the network, whether student or employee, who violates the prohibitions
listed in Section IV of the policy, engages in any other act determined to be unacceptable use
of the network by school authorities, or violates any other district policy governing use of
school resources and copyright law, will have their user privileges revoked and may face other
disciplinary procedures according to existing and applicable school district policies. In addition,
illegal use of the network, intentional deletion or damage to files of data, destruction of
hardware, copyright violations, or any other activity involving the violation of local, state, or
federal laws will be reported to the appropriate legal authorities for prosecution.




VI.Inappropriate Network Usage
To the extent practical, steps shall be taken to promote the safety and security of users of
the Richmond County Schools’ online computer network when using electronic mail,
chat rooms, instant messaging, and other forms of direct electronic communications.



Specifically, as required by the Children’s Internet Protection Act, prevention of
inappropriate network usage includes: (a) unauthorized access, including so-called
‘hacking,’ and other unlawful activities; and (b) unauthorized disclosure, use, and
dissemination of personal identification information regarding minors.



VII.Supervision and Monitoring



It shall be the responsibility of all educators of the Richmond County Schools, including
administrators, instructional supervisors, principals, teachers, media specialists,
technology specialists, guidance counselors, instructional paraprofessionals and any other
personnel having access to the online computer network for instructional purposes, to
supervise and monitor usage of the online computer network and access to the Internet in
accordance with this policy and the Children’s Internet Protection Act.



Procedures for the disabling or otherwise modifying any technology protection measures
shall be the responsibility of the Director of Educational Media and Technology or
designated representatives.



CIPA DEFINITION OF TERMS:



TECHNOLOGY PROTECTION MEASURE. The term “technology protection
measure” means a specific technology that blocks or filters Internet access to visual
depictions that are:

   1.   OBSCENE, as that term is defined in section 1460 of title 18, United States Code;
   2.   CHILD PORNOGRAPHY, as that term is defined in section 2256 of title 18, United States Code; or
   3.   Harmful to minors.
HARMFUL TO MINORS. The term “harmful to minors” means any picture, image,
graphic image file, or other visual depiction that:

   1.   Taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or
        excretion;
   2.   Depicts, describes, or represents, in a patently offensive way with respect to what is suitable for
        minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted
        sexual acts, or a lewd exhibition of the genitals; and
   3.   Taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors

Más contenido relacionado

La actualidad más candente

CIPA Children's Internet Protection Act
CIPA Children's Internet Protection ActCIPA Children's Internet Protection Act
CIPA Children's Internet Protection Actgibb0
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overviewedtecher
 
Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000nielson900
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizensStaci Trekles
 
New teacher Technology Overview 2011
New teacher Technology Overview 2011New teacher Technology Overview 2011
New teacher Technology Overview 2011Dianne Krause
 
Telecommunications policy 2010 2011
Telecommunications policy 2010 2011Telecommunications policy 2010 2011
Telecommunications policy 2010 2011Tedd Wilson
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterMark Moran
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyNani Owen
 
Filtering in schools
Filtering in schoolsFiltering in schools
Filtering in schoolsmylee720
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy projectRachel Nachman
 
Online Copyright Education
Online Copyright EducationOnline Copyright Education
Online Copyright EducationGary Wilhelm
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
The Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsThe Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsDiana Benner
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomjlknight
 
CYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLECYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLEInterMediaKT
 

La actualidad más candente (20)

CIPA Children's Internet Protection Act
CIPA Children's Internet Protection ActCIPA Children's Internet Protection Act
CIPA Children's Internet Protection Act
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overview
 
Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 
New teacher Technology Overview 2011
New teacher Technology Overview 2011New teacher Technology Overview 2011
New teacher Technology Overview 2011
 
Telecommunications policy 2010 2011
Telecommunications policy 2010 2011Telecommunications policy 2010 2011
Telecommunications policy 2010 2011
 
D33 AUP
D33 AUPD33 AUP
D33 AUP
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Filtering in schools
Filtering in schoolsFiltering in schools
Filtering in schools
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy project
 
Online Copyright Education
Online Copyright EducationOnline Copyright Education
Online Copyright Education
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
The Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsThe Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School Districts
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
CYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLECYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLE
 
Its the law
Its the lawIts the law
Its the law
 

Similar a Internet policy[1]

Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Paula Naugle
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreementPaula Naugle
 
Safety Presentation
Safety PresentationSafety Presentation
Safety PresentationSarah Sutter
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptarhodes
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813jennifer_lawrence
 
C qlocal HCISD AUP
C qlocal HCISD AUPC qlocal HCISD AUP
C qlocal HCISD AUPsecretsvicky
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use PolicyBarb Jansen
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policyiamprosperous
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy donekgrosvenor
 
MISD Cyber Safety
MISD Cyber Safety MISD Cyber Safety
MISD Cyber Safety edtecher
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educatorsjessa_delingon
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelinesdlwadsworth
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
Acceptable use policy
Acceptable use policy Acceptable use policy
Acceptable use policy denverjewart
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyKoolteechatechnology
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance InformationTũi Wichets
 

Similar a Internet policy[1] (20)

Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting ppt
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813
 
C qlocal HCISD AUP
C qlocal HCISD AUPC qlocal HCISD AUP
C qlocal HCISD AUP
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 
MISD Cyber Safety
MISD Cyber Safety MISD Cyber Safety
MISD Cyber Safety
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Acceptable use policy
Acceptable use policy Acceptable use policy
Acceptable use policy
 
Social media policy
Social media policySocial media policy
Social media policy
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance Information
 

Último

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 

Último (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Internet policy[1]

  • 1. Haplesmain Junior Academy Internet Policy I. Responsibilities & Privileges The use of the Internet computer network for illegal, inappropriate, unacceptable, or unethical purposes by students or employees is prohibited. II. Authority The Haplesmain School District reserves the right to determine which network services will be provided through the school district resources. It reserves the right to view and monitor all applications provided through the network, including e-mail, and to log Internet use by students and staff. The school district reserves the right to revoke user privileges, remove user accounts, and refer to legal authorities when appropriate violation of this and any other applicable district policies, including those governing network use, copyright, security, and vandalism of district resources and equipment. The Haplesmain School District bears no responsibility for information that is lost, damaged or unavailable due to technical problems. III. Procedures Network accounts will be used only by the authorized user of the account for its authorized purpose. Accounts will be made available according to a schedule developed by appropriate district authorities given the capability of district hardware. Access to accounts will be given out to only those individuals who meet the following requirements: 1. Have read the District Internet Policy and indicate their agreement with its provisions by signing the signature page and returning it to the appropriate district authority. Students must have their parent or guardian sign this signature page indicating the parent or guardian's agreement with the policy and their consent to allow the student to access and use the network. 2. Have successfully completed a district course, which will include but not be limited to instruction on network, access, use, acceptable vs. unacceptable uses, etiquette, and the consequences of abuse of privileges and responsibilities. This requirement shall apply for both students and district employees. IV. Prohibitions The use of the Internet computer network for illegal, inappropriate, unacceptable, or unethical purposes by students or employees is prohibited. The activities listed below are strictly prohibited by all users of the network. The Haplesmain School District reserves the right to determine if any activity not appearing in the list below constitutes an acceptable or unacceptable use of the network. These prohibitions are in effect any time school district resources are accessed. • Use of the network for non-work or non-school related communications. • Use of the network to access obscene or pornographic material.
  • 2. Use of the network to transmit material likely to be offensive or objectionable to recipients. • Use of the network to participate in inappropriate and /or objectionable discussions or news groups. • Hate mail, harassment, discriminatory remarks and other antisocial communications on the network. • Use of the network which results in any copyright violation. • The illegal installation, distribution, reproduction, or use of copyrighted software on district computers. • Use of the network to intentionally obtain or modify files, passwords, or data belonging to other users. • Use of the network to misrepresent other users on the network. • Use of school technology or the network for fraudulent copying, communications or modification of materials in violation of local, state, and federal law. • Loading, downloading, or use of unauthorized games, programs, files or other electronic media. • Malicious use of the network to develop programs that harass other users or infiltrate a computer system and/or damage the software components of a computer system. • Destruction of district computer hardware or software. • Use of the network to participate in Internet Relay chats (on-line real-time conversations). • Use of the network to facilitate any illegal activity. • Use of the network to communicate through e-mail for non-educational purposes or activities. • Use of the network for commercial or for-profit purposes. • Use of the network for product advertisement or political lobbying. V. Consequences of Abuse Any user of the network, whether student or employee, who violates the prohibitions listed in Section IV of the policy, engages in any other act determined to be unacceptable use of the network by school authorities, or violates any other district policy governing use of school resources and copyright law, will have their user privileges revoked and may face other disciplinary procedures according to existing and applicable school district policies. In addition, illegal use of the network, intentional deletion or damage to files of data, destruction of hardware, copyright violations, or any other activity involving the violation of local, state, or federal laws will be reported to the appropriate legal authorities for prosecution. VI.Inappropriate Network Usage
  • 3. To the extent practical, steps shall be taken to promote the safety and security of users of the Richmond County Schools’ online computer network when using electronic mail, chat rooms, instant messaging, and other forms of direct electronic communications. Specifically, as required by the Children’s Internet Protection Act, prevention of inappropriate network usage includes: (a) unauthorized access, including so-called ‘hacking,’ and other unlawful activities; and (b) unauthorized disclosure, use, and dissemination of personal identification information regarding minors. VII.Supervision and Monitoring It shall be the responsibility of all educators of the Richmond County Schools, including administrators, instructional supervisors, principals, teachers, media specialists, technology specialists, guidance counselors, instructional paraprofessionals and any other personnel having access to the online computer network for instructional purposes, to supervise and monitor usage of the online computer network and access to the Internet in accordance with this policy and the Children’s Internet Protection Act. Procedures for the disabling or otherwise modifying any technology protection measures shall be the responsibility of the Director of Educational Media and Technology or designated representatives. CIPA DEFINITION OF TERMS: TECHNOLOGY PROTECTION MEASURE. The term “technology protection measure” means a specific technology that blocks or filters Internet access to visual depictions that are: 1. OBSCENE, as that term is defined in section 1460 of title 18, United States Code; 2. CHILD PORNOGRAPHY, as that term is defined in section 2256 of title 18, United States Code; or 3. Harmful to minors.
  • 4. HARMFUL TO MINORS. The term “harmful to minors” means any picture, image, graphic image file, or other visual depiction that: 1. Taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion; 2. Depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals; and 3. Taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors