Taken from Board Policy No. 2022P
The Normal Stuff
General Use                 Personal Security

Personal Responsibility     Copyright

Lab Management     ...
General Use
The network exists primarily for email and
  internet research.




                                     Retur...
General Use


It is not intended to be used for non academic
   purposes.
General Use




Network bandwidth is limited so teachers
 should not waste or allow students to waste
 this resource.
General Use
The network exists primarily for email and
   internet research.
It is not intended to be used for non academi...
Personal Responsibility
1. Use of network supports student learning
2.
3.
4.
5.
6.
7.
Personal Responsibility
1.
2. Do not break any laws or use network to make money.
3.
4.
5.
6.
7.
Personal Responsibility
1.
2.
3. Do not use network to express political views.
4.
5.
6.
7.
Personal Responsibility
1.
2.
3.
4. Do nothing to harm hardware, software, or the network.
5.
6.
7.
Personal Responsibility
1.
2.
3.
4.
5. Using the network to develop malicious programs is
   prohibited.
6.
7.
Personal Responsibility
1.
2.
3.
4.
5.
6. The use of the network to access, store, or distribute
   unauthorized material ...
Personal Responsibility
1. Use of network supports student learning
2. Do not break any laws or use network to make money....
Lab Management




       Return to contents
Lab Management
Please follow through on the following elements of lab management:
1) Use a seating chart so there is a rec...
Lab Management

Please follow through on the following elements of lab management:
1)
2) No food or drink near computers.
Lab Management

Please follow through on the following elements of lab management:
1)
2)
3) Manage by walking around (lab ...
Lab Management

Please follow through on the following elements of lab management:
1)
2)
3)
4) Use Management software (La...
Lab Management

Please follow through on the following elements of lab management:
1)
2)
3)
4) Make certain that the lab i...
Lab Management

Please follow through on the following elements of lab management:
1)
2)
3)
4)
5)
6) Make certain that you...
Lab Management

Please follow through on the following elements of lab management:
1) Use a seating chart so there is a re...
Personal Security

 Do not share your passwords or
  account privileges with anyone
  else.

 Doing so may be considered
 ...
The unauthorized…
   Copyright                    -installation -use -storage
                                -or distribu...
Repairs




Return to contents
Repairs
1) Turn everything off and back on (90% of problems
   may be solved by a simple reboot.)
2)
3)
4)
Repairs
1)
2) If it is a gray tower, we need to fix it ourselves. (Send
   Bill and Paul an email… do not just write it on...
Repairs
1)
2)
3) Do not let students work on computers.
4)
Repairs
1)
2)
3)
4) If you need a software update or a repair for a
   laptop/black tower, go online and fill out a troubl...
Repairs
1) Turn everything off and back on (90% of problems
   may be solved by a simple reboot.)
2) If it is a gray tower...
Consequences




               Return to contents
Consequences
• For security and administrative purposes the district retains
  the right for authorized personnel to revie...
Consequences
•

• The district reserves the right to remove a user account to
  prevent further unauthorized activity.

•
...
Consequences
•

•

• The District’s service provider reserves the right to
  disconnect the district to prevent further un...
Consequences
•

•

•

• Violation of any of the conditions of use may be cause
  for loss of network privileges and/or dis...
Consequences
• For security and administrative purposes the district retains
  the right for authorized personnel to revie...
Upcoming SlideShare
Loading in...5
×

Staff Acceptable Use Policy

371

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
371
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Staff Acceptable Use Policy

  1. 1. Taken from Board Policy No. 2022P
  2. 2. The Normal Stuff General Use Personal Security Personal Responsibility Copyright Lab Management Repairs Consequences Please click on each title to learn more.
  3. 3. General Use The network exists primarily for email and internet research. Return to contents
  4. 4. General Use It is not intended to be used for non academic purposes.
  5. 5. General Use Network bandwidth is limited so teachers should not waste or allow students to waste this resource.
  6. 6. General Use The network exists primarily for email and internet research. It is not intended to be used for non academic purposes. Network bandwidth is limited so teachers should not waste or allow students to waste this resource.
  7. 7. Personal Responsibility 1. Use of network supports student learning 2. 3. 4. 5. 6. 7.
  8. 8. Personal Responsibility 1. 2. Do not break any laws or use network to make money. 3. 4. 5. 6. 7.
  9. 9. Personal Responsibility 1. 2. 3. Do not use network to express political views. 4. 5. 6. 7.
  10. 10. Personal Responsibility 1. 2. 3. 4. Do nothing to harm hardware, software, or the network. 5. 6. 7.
  11. 11. Personal Responsibility 1. 2. 3. 4. 5. Using the network to develop malicious programs is prohibited. 6. 7.
  12. 12. Personal Responsibility 1. 2. 3. 4. 5. 6. The use of the network to access, store, or distribute unauthorized material (i.e. pornography) is strictly prohibited. 7.
  13. 13. Personal Responsibility 1. Use of network supports student learning 2. Do not break any laws or use network to make money. 3. Do not use network to express political views. 4. Do nothing to harm hardware, software, or the network. 5. Using the network to develop malicious programs is prohibited. 6. Users are responsible for what they publish via the network. Harassment/Hate mail are prohibited. (remember whatever you write is a public document.) 7. The use of the network to access, store, or distribute unauthorized material (i.e. pornography) is strictly prohibited.
  14. 14. Lab Management Return to contents
  15. 15. Lab Management Please follow through on the following elements of lab management: 1) Use a seating chart so there is a record of who was at each computer.
  16. 16. Lab Management Please follow through on the following elements of lab management: 1) 2) No food or drink near computers.
  17. 17. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) Manage by walking around (lab time is not lecture, email, grading, or time for meeting with individuals).
  18. 18. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) 4) Use Management software (LanSchool).
  19. 19. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) 4) Make certain that the lab is cleaned up prior to the end of each period. (Leave at least 5 minutes for clean up).
  20. 20. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) 4) 5) 6) Make certain that your students know what they are doing prior to going to the lab… Most damage is done out of student frustration over assignments…If they don’t have a plan, they should not be on the computer…
  21. 21. Lab Management Please follow through on the following elements of lab management: 1) Use a seating chart so there is a record of who was at each computer. 2) No food or drink near computers. 3) Manage by walking around (lab time is not lecture, email, grading, or time for meeting with individuals). 4) Use Management software (LanSchool). 5) Make certain that the lab is cleaned up prior to the end of each period. (Leave at least 5 minutes for clean up). 6) Make certain that your students know what they are doing prior to going to the lab… Most damage is done out of student frustration over assignments…If they don’t have a plan, they should not be on the computer…
  22. 22. Personal Security Do not share your passwords or account privileges with anyone else. Doing so may be considered making a gift of public funds and may jeopardize the security of your account. Return to contents
  23. 23. The unauthorized… Copyright -installation -use -storage -or distribution of copyrighted material or software on district computers is prohibited. Helpful hint… unless the district owns the item or it is specifically marked as being able to be used in educational settings, it is copyrighted and you need the creator’s permission. This includes anything you get from the internet as well. Return to contents Image by Stephen Downes
  24. 24. Repairs Return to contents
  25. 25. Repairs 1) Turn everything off and back on (90% of problems may be solved by a simple reboot.) 2) 3) 4)
  26. 26. Repairs 1) 2) If it is a gray tower, we need to fix it ourselves. (Send Bill and Paul an email… do not just write it on the board, we won’t see it) 3) 4)
  27. 27. Repairs 1) 2) 3) Do not let students work on computers. 4)
  28. 28. Repairs 1) 2) 3) 4) If you need a software update or a repair for a laptop/black tower, go online and fill out a trouble ticket. Do not leave it for someone else to take care of.
  29. 29. Repairs 1) Turn everything off and back on (90% of problems may be solved by a simple reboot.) 2) If it is a gray tower, we need to fix it ourselves. (Send Bill and Paul an email… do not just write it on the board, we won’t see it) 3) Do not let students work on computers. 4) If you need a software update or a repair for a laptop/black tower, go online and fill out a trouble ticket. Do not leave it for someone else to take care of.
  30. 30. Consequences Return to contents
  31. 31. Consequences • For security and administrative purposes the district retains the right for authorized personnel to review network system use and file content. • •
  32. 32. Consequences • • The district reserves the right to remove a user account to prevent further unauthorized activity. • •
  33. 33. Consequences • • • The District’s service provider reserves the right to disconnect the district to prevent further unauthorized activity. •
  34. 34. Consequences • • • • Violation of any of the conditions of use may be cause for loss of network privileges and/or disciplinary action up to and including termination of employment.
  35. 35. Consequences • For security and administrative purposes the district retains the right for authorized personnel to review network system use and file content. • The district reserves the right to remove a user account to prevent further unauthorized activity. • The District’s service provider reserves the right to disconnect the district to prevent further unauthorized activity. • Violation of any of the conditions of use may be cause for loss of network privileges and/or disciplinary action up to and including termination of employment.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×