Technology acceptable use policy for students 08202011[1]
Upcoming SlideShare
Loading in...5

Technology acceptable use policy for students 08202011[1]






Total Views
Views on SlideShare
Embed Views



3 Embeds 249 247 1 1



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Technology acceptable use policy for students 08202011[1] Technology acceptable use policy for students 08202011[1] Presentation Transcript

  • Technology Acceptable UsePolicy Lockhart ISD
  • Technology Acceptable Use Policy  Purpose  StaffTechnology Acceptable Use Policy  Student Technology Acceptable Use Policy  User Agreements
  • Technology Acceptable Use PolicyPURPOSE
  • Purpose  Enhance quality of student learning  Enhance staff & student efficiency  Ensure protection of students and staff  Protect hardware and software  Sets standards for technology usage
  • Governances  School  Local, state and federal law  LISD has a duty to investigate suspected violations
  • Technology Resources  Any electronic tool, device, program, or system that aids the educational and work environment  Personal devices are included in the AUP  Must meet LISD minimum requirements— virus protection software  Approved by technology department or campus administrator
  • Staff Technology AcceptableUse Policy  LISD employees follow an acceptable use policy
  • Student Technology AcceptableUse Policy  Established for limited educational purposes  Classroom activities, career development, limited high-quality self-discovery activities  Not a public access service or public forum  Student has access unless a parent/guardian denies access  All activity is monitored  Follow same rules, good manners and common sense guidelines used with other daily school activities
  • General Unacceptable Behavior  Posting information that will cause damage or disruption of technology  Engaging in personal attacks  Harassing another person  Posting false or defamatory information  Using criminal speech  Using speech inappropriate in an educational setting
  • General Unacceptable Behavior  Abusing network resources–chain letters  Displaying, accessing or sending offensive messages or pictures  Using for commercial purposes—garage sales, fundraisers, benefits  Political lobbying  Accessing unauthorized district systems— Skyward
  • General Unacceptable Behavior  Using district resources to threaten employees  Sending or posting messages that are  Abusive  Obscene  Sexually oriented  Threatening  Harassing  Damaging to another’s reputation  Illegal  Bullying
  • E-Mail  Students will only use teacher or classroom accounts  No private email is allowed  Students cannot create private accounts at school  Students will not repost a message that was sent to them privately without the permission of the person who sent them the message.  Students will not post private information about another person.
  • World Wide Web  Online textbooks and curriculum sites  Sites will be actively monitored by teachers and the technology department  Annual Internet safety training for students
  • Real-time, InteractiveCommunication Areas  Blogs, Wikis, & Social Networking will only be used when directed by the teacher  Use only to support educational activities
  • School Web Sites  Class websites may have  Group pictures without identification  Individual students without identification  Student work with first name only  Materials on web must meet academic standards  Graphics, text, sound, etc. must have copyright approval  Must have link back to campus/district
  • Personal Safety  Students will not share personal contact information about themselves or other people.  Address  Telephone  School address  Home address  Do not give full name or any other personal contact information for any purpose.  Do not agree to meet with someone you have met online.  Tell an adult if any message received is inappropriate or makes you feel uncomfortable
  • System Security  Students should secure user names and passwords  Notify an adult if a security problem has been identified  Do not attempt to gain unauthorized access to LISD network  Do not attempt to disrupt the network or destroy data  Do not attempt to access blocked sites  Do not use sniffing or remote access technology to monitor network activity  Do not create unauthorized networks
  • Software and Files  Software is for educational use  Permission is needed to install, upload or download software  Intentional misuse may result in disciplinary action  Electronic files are not private  USB devices should be used for storage only—not software
  • Technology Hardware  Used for educational purposes  Do not relocate hardware  LISD regulates hardware/software on the network including personal devices  LISD equipment may only be used to support educational goals
  • Vandalism  Any malicious attempt to harm or destroy data or the network will result in cancellation of network privileges  Disciplinary measure will be enforced
  • Plagiarism and Copyright Infringement  Plagiarism is not allowed  Copyright laws govern use of material  Copyrighted material used in the district must have author’s permission
  • Videoconference  Videoconferencing is allowed  May be videotaped by district personnel  School acceptable use and behavior rules apply during conferences
  • Student Rights  Electronic network is a limited forum for valid educational purposes  Searches will be conducted if there is reasonable suspicion of a violation
  • Due Process  LISD will cooperate with local, state or federal officials if illegal activities occur  Student will be provided with notice and an opportunity to be heard in the manner set forth in the disciplinary code
  • Violations of this Acceptable UsePolicy  Violations of this policy may result in loss of access as well as other disciplinary or legal action.  Examples:  Use of district network only under direct supervision  Suspension of network privileges  Revocation of network privileges  Suspension of computer privileges  Suspension from school  Expulsion from school and/or  Legal action and prosecution by the authorities
  • Student User Agreement Student Name ___________________________________ Grade ________ School ________________________________________ I have read the Lockhart ISD Student Technology Acceptable Use Policy Rules and Procedures document. I agree to follow the rules contained in this policy. I understand that if I violate the rules my access can be terminated and I may face other disciplinary measures. Student Signature _____________________________________________ Date ________________