SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Diocese of Wilmington Catholic Schools
Acceptable Use of Technology Agreement
Access to technology is integral to the educational mission and purpose of our institution. These policies
address the appropriate use of technology provided by the school and personally owned technological
devices. This Technology Agreement is an abbreviation of full policies. For full policies, please refer to the
Catholic Schools Office Acceptable Use of Technology: Student Edition.

    •   We expect our students to act responsibly and thoughtfully when using technology.

    •   Students should not expect that what they write or publish online is private. The school reserves the
        right to monitor and track all behaviors and interactions that take place online or through the use
        of technology on our property or at our events.

    •   The use of all school-owned technologies including the school network and its Internet connection
        is limited to educational purposes.

    •   Commercial and recreational use of school technology resources is prohibited.

    •   Recreational use of the school technology is prohibited.

    •   All emails sent from school provided accounts are representative of the school.

    •   Connection to wireless Internet by students is prohibited unless otherwise directed/instructed.

    •   Students are responsible for any activity that occurs through their personal account.

    •   Students must respect the privacy of others.
            o Do not intentionally seek information on, obtain copies of, or modify files, other data, or
                passwords belonging to others.
            o Do not misrepresent or assume the identity of others.
            o Do not re-post information that was sent to you privately without the permission of the
                person who sent you the information.
            o Do not post private information about another person.
            o Do not post photos or videos of others without prior permission.
            o Do not use another person’s account. If you have been given an account with special
                privileges, do not use that account outside of the terms with which you were given access
                to that account.

    •   Do not voluntarily post private information about yourself online, including your name, your age,
        your school name, your address, your phone number, or other identifying information.

    •   Our institution prides itself on its reputation for excellence; therefore, you may not use the school’s
        name, logo, mascot or other likeness or representation on a non-school website without express
        permission from legitimate authority.

    •   Students may not initiate electronic communication with teachers, adult leaders in ministry, or
        administrators.

    •   Personal Technology Devices (PTDs) are for use only during an actual lock down and as instructed
        by emergency or parish/school personnel.

    •   Never use devices capable of capturing, transmitting, or storing images or recordings to record
        others without the expressed permission of the person(s) being recorded (including adult leaders
        and other young people). Such recording devices may never be accessed, turned on or operated
        in restrooms, sleeping areas, dressing rooms, or other areas where there is a reasonable
        expectation of privacy. Teachers or school personnel reserve the right to confiscate, collect, and
        inspect any PTD in accord with written policies.
•   Social networking websites, profiles, or accounts, may not be accessed through the school’s
        technology at any time. Students may not create social networking pages, accounts, sites, or
        groups that impersonate or misrepresent any individual.

    •   Students may not access material that is offensive, profane, or obscene including pornography
        and hate literature.

    •   Inappropriate communication is prohibited in any public messages, private messages, and
        material posted online by students.

    •   Students may not utilize any technology to harass, demean, humiliate, intimidate, embarrass, or
        annoy any individual.

    •   Unless explicit permission is granted by legitimate authority, students are not allowed to bring iPods,
        MP3 players, CD players, DVD players, or other similar data-accessing devices, or personal video
        game systems onto school property or to school events.

    •   International websites may only be accessed from school owned technology under the direction
        of legitimate authority.

    •   All students are expected to maintain academic honesty.

    •   All access to the Internet is filtered and monitored.

    •   Unless legitimate authority grants explicit permission, students are not allowed to alter, change,
        modify, repair, or reconfigure settings on school-owned computers. This includes downloading,
        adding, or installing new programs, software, or hardware.

    •   If you accidentally access inappropriate information or if someone sends you inappropriate
        information, you should immediately tell a staff member or teacher.

    •   If you witness someone else either deliberately or accidentally access inappropriate information or
        use technology in a way that violates this policy, you must report the incident as soon as possible.

    •   The school retains the right to suspend service, accounts, and access to data, including student
        files and any other stored data.

    •   The school is not responsible for any damages students may suffer, including but not limited to, loss
        of data or interruptions of service.

My child and I have read, understand, and he/she will follow all rules, regulations, and policies as outlined
in the Acceptable Use of Technology Policy. I/my child further understands that any violation of the policies
is unethical and may constitute a criminal offense. Should I/my child commit any violation of the policy, we
understand and agree that his/her access privileges may be revoked and discipline action and/or legal
action may be taken.

Signature of Parent/Guardian                                          Date




Signature of Student                                                  Date

Más contenido relacionado

Destacado (8)

Math requirements2012
Math requirements2012Math requirements2012
Math requirements2012
 
О факультете внебюджетной подготовки СЮИ ФСИН России
О факультете внебюджетной подготовки СЮИ ФСИН РоссииО факультете внебюджетной подготовки СЮИ ФСИН России
О факультете внебюджетной подготовки СЮИ ФСИН России
 
Civil warsoldierletter8th
Civil warsoldierletter8thCivil warsoldierletter8th
Civil warsoldierletter8th
 
Guidelines for Holocaust Paper
Guidelines for Holocaust PaperGuidelines for Holocaust Paper
Guidelines for Holocaust Paper
 
Adding and subtracting matrices
Adding and subtracting matricesAdding and subtracting matrices
Adding and subtracting matrices
 
AUP Student Edition 2011
AUP Student Edition 2011AUP Student Edition 2011
AUP Student Edition 2011
 
Milk difference
Milk differenceMilk difference
Milk difference
 
Library curricula 2011 arranged by grade
Library curricula 2011 arranged by gradeLibrary curricula 2011 arranged by grade
Library curricula 2011 arranged by grade
 

Similar a Acceptable Use Agreement Students 2011

Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Matthew Rathbun
 
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptxSocial Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptxJPAballe
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyKoolteechatechnology
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentationCarl Hooker
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use PolicyBarb Jansen
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policycollimic
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policyiamprosperous
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010Barb Jansen
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreementPaula Naugle
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ssLenva Shearing
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditTamir Harper
 
ICT Acceptable Use POLICY
ICT Acceptable Use POLICYICT Acceptable Use POLICY
ICT Acceptable Use POLICYDebbie Oliver
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreementPaula Naugle
 

Similar a Acceptable Use Agreement Students 2011 (20)

Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Agreement for Use of Technology for Families
Agreement for Use of Technology for Families
 
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptxSocial Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
 
Social media policy
Social media policySocial media policy
Social media policy
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
CES BYOT Agreement
CES BYOT AgreementCES BYOT Agreement
CES BYOT Agreement
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentation
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
ICT Acceptable Use POLICY
ICT Acceptable Use POLICYICT Acceptable Use POLICY
ICT Acceptable Use POLICY
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 

Más de St. Mary Magdalen School (18)

Adding and subtracting matrices
Adding and subtracting matricesAdding and subtracting matrices
Adding and subtracting matrices
 
Adding and subtracting matrices
Adding and subtracting matricesAdding and subtracting matrices
Adding and subtracting matrices
 
Wikispaces for the classroom 2
Wikispaces for the classroom 2Wikispaces for the classroom 2
Wikispaces for the classroom 2
 
Collaborative documents
Collaborative documentsCollaborative documents
Collaborative documents
 
Flipping the classroom
Flipping the classroomFlipping the classroom
Flipping the classroom
 
Dickens and alcott webquest
Dickens and alcott webquestDickens and alcott webquest
Dickens and alcott webquest
 
Invisible web
Invisible webInvisible web
Invisible web
 
Wikispaces for the classroom
Wikispaces for the classroomWikispaces for the classroom
Wikispaces for the classroom
 
Banned books2010
Banned books2010Banned books2010
Banned books2010
 
Library intro8th
Library intro8thLibrary intro8th
Library intro8th
 
Library intro7th
Library intro7thLibrary intro7th
Library intro7th
 
Library intro8th
Library intro8thLibrary intro8th
Library intro8th
 
8th Gr. Holocaust Paper Rubric
8th Gr. Holocaust Paper Rubric8th Gr. Holocaust Paper Rubric
8th Gr. Holocaust Paper Rubric
 
Dickens And Alcott Webquest
Dickens And Alcott WebquestDickens And Alcott Webquest
Dickens And Alcott Webquest
 
Directions For Performing Linear Regression
Directions For  Performing  Linear  RegressionDirections For  Performing  Linear  Regression
Directions For Performing Linear Regression
 
Directions For Performing Linear Regression
Directions For Performing Linear RegressionDirections For Performing Linear Regression
Directions For Performing Linear Regression
 
History Questions[1]
History Questions[1]History Questions[1]
History Questions[1]
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Acceptable Use Agreement Students 2011

  • 1. Diocese of Wilmington Catholic Schools Acceptable Use of Technology Agreement Access to technology is integral to the educational mission and purpose of our institution. These policies address the appropriate use of technology provided by the school and personally owned technological devices. This Technology Agreement is an abbreviation of full policies. For full policies, please refer to the Catholic Schools Office Acceptable Use of Technology: Student Edition. • We expect our students to act responsibly and thoughtfully when using technology. • Students should not expect that what they write or publish online is private. The school reserves the right to monitor and track all behaviors and interactions that take place online or through the use of technology on our property or at our events. • The use of all school-owned technologies including the school network and its Internet connection is limited to educational purposes. • Commercial and recreational use of school technology resources is prohibited. • Recreational use of the school technology is prohibited. • All emails sent from school provided accounts are representative of the school. • Connection to wireless Internet by students is prohibited unless otherwise directed/instructed. • Students are responsible for any activity that occurs through their personal account. • Students must respect the privacy of others. o Do not intentionally seek information on, obtain copies of, or modify files, other data, or passwords belonging to others. o Do not misrepresent or assume the identity of others. o Do not re-post information that was sent to you privately without the permission of the person who sent you the information. o Do not post private information about another person. o Do not post photos or videos of others without prior permission. o Do not use another person’s account. If you have been given an account with special privileges, do not use that account outside of the terms with which you were given access to that account. • Do not voluntarily post private information about yourself online, including your name, your age, your school name, your address, your phone number, or other identifying information. • Our institution prides itself on its reputation for excellence; therefore, you may not use the school’s name, logo, mascot or other likeness or representation on a non-school website without express permission from legitimate authority. • Students may not initiate electronic communication with teachers, adult leaders in ministry, or administrators. • Personal Technology Devices (PTDs) are for use only during an actual lock down and as instructed by emergency or parish/school personnel. • Never use devices capable of capturing, transmitting, or storing images or recordings to record others without the expressed permission of the person(s) being recorded (including adult leaders and other young people). Such recording devices may never be accessed, turned on or operated in restrooms, sleeping areas, dressing rooms, or other areas where there is a reasonable expectation of privacy. Teachers or school personnel reserve the right to confiscate, collect, and inspect any PTD in accord with written policies.
  • 2. Social networking websites, profiles, or accounts, may not be accessed through the school’s technology at any time. Students may not create social networking pages, accounts, sites, or groups that impersonate or misrepresent any individual. • Students may not access material that is offensive, profane, or obscene including pornography and hate literature. • Inappropriate communication is prohibited in any public messages, private messages, and material posted online by students. • Students may not utilize any technology to harass, demean, humiliate, intimidate, embarrass, or annoy any individual. • Unless explicit permission is granted by legitimate authority, students are not allowed to bring iPods, MP3 players, CD players, DVD players, or other similar data-accessing devices, or personal video game systems onto school property or to school events. • International websites may only be accessed from school owned technology under the direction of legitimate authority. • All students are expected to maintain academic honesty. • All access to the Internet is filtered and monitored. • Unless legitimate authority grants explicit permission, students are not allowed to alter, change, modify, repair, or reconfigure settings on school-owned computers. This includes downloading, adding, or installing new programs, software, or hardware. • If you accidentally access inappropriate information or if someone sends you inappropriate information, you should immediately tell a staff member or teacher. • If you witness someone else either deliberately or accidentally access inappropriate information or use technology in a way that violates this policy, you must report the incident as soon as possible. • The school retains the right to suspend service, accounts, and access to data, including student files and any other stored data. • The school is not responsible for any damages students may suffer, including but not limited to, loss of data or interruptions of service. My child and I have read, understand, and he/she will follow all rules, regulations, and policies as outlined in the Acceptable Use of Technology Policy. I/my child further understands that any violation of the policies is unethical and may constitute a criminal offense. Should I/my child commit any violation of the policy, we understand and agree that his/her access privileges may be revoked and discipline action and/or legal action may be taken. Signature of Parent/Guardian Date Signature of Student Date