Staff Acceptable Use Policy
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
733
On Slideshare
733
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
4
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Taken from Board Policy No. 2022P
  • 2. The Normal Stuff General Use Personal Security Personal Responsibility Copyright Lab Management Repairs Consequences Please click on each title to learn more.
  • 3. General Use The network exists primarily for email and internet research. Return to contents
  • 4. General Use It is not intended to be used for non academic purposes.
  • 5. General Use Network bandwidth is limited so teachers should not waste or allow students to waste this resource.
  • 6. General Use The network exists primarily for email and internet research. It is not intended to be used for non academic purposes. Network bandwidth is limited so teachers should not waste or allow students to waste this resource.
  • 7. Personal Responsibility 1. Use of network supports student learning 2. 3. 4. 5. 6. 7.
  • 8. Personal Responsibility 1. 2. Do not break any laws or use network to make money. 3. 4. 5. 6. 7.
  • 9. Personal Responsibility 1. 2. 3. Do not use network to express political views. 4. 5. 6. 7.
  • 10. Personal Responsibility 1. 2. 3. 4. Do nothing to harm hardware, software, or the network. 5. 6. 7.
  • 11. Personal Responsibility 1. 2. 3. 4. 5. Using the network to develop malicious programs is prohibited. 6. 7.
  • 12. Personal Responsibility 1. 2. 3. 4. 5. 6. The use of the network to access, store, or distribute unauthorized material (i.e. pornography) is strictly prohibited. 7.
  • 13. Personal Responsibility 1. Use of network supports student learning 2. Do not break any laws or use network to make money. 3. Do not use network to express political views. 4. Do nothing to harm hardware, software, or the network. 5. Using the network to develop malicious programs is prohibited. 6. Users are responsible for what they publish via the network. Harassment/Hate mail are prohibited. (remember whatever you write is a public document.) 7. The use of the network to access, store, or distribute unauthorized material (i.e. pornography) is strictly prohibited.
  • 14. Lab Management Return to contents
  • 15. Lab Management Please follow through on the following elements of lab management: 1) Use a seating chart so there is a record of who was at each computer.
  • 16. Lab Management Please follow through on the following elements of lab management: 1) 2) No food or drink near computers.
  • 17. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) Manage by walking around (lab time is not lecture, email, grading, or time for meeting with individuals).
  • 18. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) 4) Use Management software (LanSchool).
  • 19. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) 4) Make certain that the lab is cleaned up prior to the end of each period. (Leave at least 5 minutes for clean up).
  • 20. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) 4) 5) 6) Make certain that your students know what they are doing prior to going to the lab… Most damage is done out of student frustration over assignments…If they don’t have a plan, they should not be on the computer…
  • 21. Lab Management Please follow through on the following elements of lab management: 1) Use a seating chart so there is a record of who was at each computer. 2) No food or drink near computers. 3) Manage by walking around (lab time is not lecture, email, grading, or time for meeting with individuals). 4) Use Management software (LanSchool). 5) Make certain that the lab is cleaned up prior to the end of each period. (Leave at least 5 minutes for clean up). 6) Make certain that your students know what they are doing prior to going to the lab… Most damage is done out of student frustration over assignments…If they don’t have a plan, they should not be on the computer…
  • 22. Personal Security Do not share your passwords or account privileges with anyone else. Doing so may be considered making a gift of public funds and may jeopardize the security of your account. Return to contents
  • 23. The unauthorized… Copyright -installation -use -storage -or distribution of copyrighted material or software on district computers is prohibited. Helpful hint… unless the district owns the item or it is specifically marked as being able to be used in educational settings, it is copyrighted and you need the creator’s permission. This includes anything you get from the internet as well. Return to contents Image by Stephen Downes
  • 24. Repairs Return to contents
  • 25. Repairs 1) Turn everything off and back on (90% of problems may be solved by a simple reboot.) 2) 3) 4)
  • 26. Repairs 1) 2) If it is a gray tower, we need to fix it ourselves. (Send Bill and Paul an email… do not just write it on the board, we won’t see it) 3) 4)
  • 27. Repairs 1) 2) 3) Do not let students work on computers. 4)
  • 28. Repairs 1) 2) 3) 4) If you need a software update or a repair for a laptop/black tower, go online and fill out a trouble ticket. Do not leave it for someone else to take care of.
  • 29. Repairs 1) Turn everything off and back on (90% of problems may be solved by a simple reboot.) 2) If it is a gray tower, we need to fix it ourselves. (Send Bill and Paul an email… do not just write it on the board, we won’t see it) 3) Do not let students work on computers. 4) If you need a software update or a repair for a laptop/black tower, go online and fill out a trouble ticket. Do not leave it for someone else to take care of.
  • 30. Consequences Return to contents
  • 31. Consequences • For security and administrative purposes the district retains the right for authorized personnel to review network system use and file content. • •
  • 32. Consequences • • The district reserves the right to remove a user account to prevent further unauthorized activity. • •
  • 33. Consequences • • • The District’s service provider reserves the right to disconnect the district to prevent further unauthorized activity. •
  • 34. Consequences • • • • Violation of any of the conditions of use may be cause for loss of network privileges and/or disciplinary action up to and including termination of employment.
  • 35. Consequences • For security and administrative purposes the district retains the right for authorized personnel to review network system use and file content. • The district reserves the right to remove a user account to prevent further unauthorized activity. • The District’s service provider reserves the right to disconnect the district to prevent further unauthorized activity. • Violation of any of the conditions of use may be cause for loss of network privileges and/or disciplinary action up to and including termination of employment.