• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Technology acceptable use policy for students 08202011[1]

Technology acceptable use policy for students 08202011[1]






Total Views
Views on SlideShare
Embed Views



2 Embeds 246

http://lhsfcenglish.blogspot.com 245
http://www.blogger.com 1



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Technology acceptable use policy for students 08202011[1] Technology acceptable use policy for students 08202011[1] Presentation Transcript

    • Technology Acceptable UsePolicy Lockhart ISD
    • Technology Acceptable Use Policy  Purpose  StaffTechnology Acceptable Use Policy  Student Technology Acceptable Use Policy  User Agreements
    • Technology Acceptable Use PolicyPURPOSE
    • Purpose  Enhance quality of student learning  Enhance staff & student efficiency  Ensure protection of students and staff  Protect hardware and software  Sets standards for technology usage
    • Governances  School  Local, state and federal law  LISD has a duty to investigate suspected violations
    • Technology Resources  Any electronic tool, device, program, or system that aids the educational and work environment  Personal devices are included in the AUP  Must meet LISD minimum requirements— virus protection software  Approved by technology department or campus administrator
    • Staff Technology AcceptableUse Policy  LISD employees follow an acceptable use policy
    • Student Technology AcceptableUse Policy  Established for limited educational purposes  Classroom activities, career development, limited high-quality self-discovery activities  Not a public access service or public forum  Student has access unless a parent/guardian denies access  All activity is monitored  Follow same rules, good manners and common sense guidelines used with other daily school activities
    • General Unacceptable Behavior  Posting information that will cause damage or disruption of technology  Engaging in personal attacks  Harassing another person  Posting false or defamatory information  Using criminal speech  Using speech inappropriate in an educational setting
    • General Unacceptable Behavior  Abusing network resources–chain letters  Displaying, accessing or sending offensive messages or pictures  Using for commercial purposes—garage sales, fundraisers, benefits  Political lobbying  Accessing unauthorized district systems— Skyward
    • General Unacceptable Behavior  Using district resources to threaten employees  Sending or posting messages that are  Abusive  Obscene  Sexually oriented  Threatening  Harassing  Damaging to another’s reputation  Illegal  Bullying
    • E-Mail  Students will only use teacher or classroom accounts  No private email is allowed  Students cannot create private accounts at school  Students will not repost a message that was sent to them privately without the permission of the person who sent them the message.  Students will not post private information about another person.
    • World Wide Web  Online textbooks and curriculum sites  Sites will be actively monitored by teachers and the technology department  Annual Internet safety training for students
    • Real-time, InteractiveCommunication Areas  Blogs, Wikis, & Social Networking will only be used when directed by the teacher  Use only to support educational activities
    • School Web Sites  Class websites may have  Group pictures without identification  Individual students without identification  Student work with first name only  Materials on web must meet academic standards  Graphics, text, sound, etc. must have copyright approval  Must have link back to campus/district
    • Personal Safety  Students will not share personal contact information about themselves or other people.  Address  Telephone  School address  Home address  Do not give full name or any other personal contact information for any purpose.  Do not agree to meet with someone you have met online.  Tell an adult if any message received is inappropriate or makes you feel uncomfortable
    • System Security  Students should secure user names and passwords  Notify an adult if a security problem has been identified  Do not attempt to gain unauthorized access to LISD network  Do not attempt to disrupt the network or destroy data  Do not attempt to access blocked sites  Do not use sniffing or remote access technology to monitor network activity  Do not create unauthorized networks
    • Software and Files  Software is for educational use  Permission is needed to install, upload or download software  Intentional misuse may result in disciplinary action  Electronic files are not private  USB devices should be used for storage only—not software
    • Technology Hardware  Used for educational purposes  Do not relocate hardware  LISD regulates hardware/software on the network including personal devices  LISD equipment may only be used to support educational goals
    • Vandalism  Any malicious attempt to harm or destroy data or the network will result in cancellation of network privileges  Disciplinary measure will be enforced
    • Plagiarism and Copyright Infringement  Plagiarism is not allowed  Copyright laws govern use of material  Copyrighted material used in the district must have author’s permission
    • Videoconference  Videoconferencing is allowed  May be videotaped by district personnel  School acceptable use and behavior rules apply during conferences
    • Student Rights  Electronic network is a limited forum for valid educational purposes  Searches will be conducted if there is reasonable suspicion of a violation
    • Due Process  LISD will cooperate with local, state or federal officials if illegal activities occur  Student will be provided with notice and an opportunity to be heard in the manner set forth in the disciplinary code
    • Violations of this Acceptable UsePolicy  Violations of this policy may result in loss of access as well as other disciplinary or legal action.  Examples:  Use of district network only under direct supervision  Suspension of network privileges  Revocation of network privileges  Suspension of computer privileges  Suspension from school  Expulsion from school and/or  Legal action and prosecution by the authorities
    • Student User Agreement Student Name ___________________________________ Grade ________ School ________________________________________ I have read the Lockhart ISD Student Technology Acceptable Use Policy Rules and Procedures document. I agree to follow the rules contained in this policy. I understand that if I violate the rules my access can be terminated and I may face other disciplinary measures. Student Signature _____________________________________________ Date ________________