SlideShare a Scribd company logo
1 of 2
Download to read offline
Student Internet Contract

You may distribute the following Student Internet Contract to students. The Student Internet
Contract asks for students to act responsibly at any time they are using the computer and calls for
students to monitor their own activities.




Copyright © Glencoe/McGraw-Hill
Student Internet Contract

       Below are policies that will regulate our use of the Internet. These rules have been designed
to keep our computer and classroom functioning at the highest of standards. In order to have
access to E-mail and the Internet, please read the following and sign below.

For safety reasons, when using E-mail or the Internet:
1. I will not give out personal information such as my home address, parental information, or
   school name or location without the permission of my teacher.
2. I will immediately notify my teacher if I come across any information that makes me feel
   awkward.
3. I will never get together with someone I have “met” on-line without first getting my parents’ and
   teacher’s permission. If they agree, I will still bring an adult with me.
4. I will never forward my picture or anything else without first getting my teacher’s approval.
5. I will not return any messages that are inappropriate or make me feel uncomfortable. If I receive
   a message like this, I will notify my teacher.

The following activities are illegal, and I will not willingly participate in them:
1. Gaining unauthorized access to any place I am not supposed to be.
2. Disrupting any computer system.
3. Contributing to help spread electronic viruses.
4. Engaging in any illegal activity on-line.

I am aware that any on-line correspondence I send is a reflection of my school and myself.
1. My messages will be short, courteous, and to the point.
2. I will not use obscene language, engage in personal or discriminatory attacks, or post false or
    misleading information about individuals or organizations.

I will not access, download, or distribute:
1. Any pornographic, obscene, or sexually explicit materials.
2. Inappropriate information or graphics.

   These policies and procedures must be adhered to, and any violation of them will be met with
zero tolerance.

•   Students must abide by their signed contracts.
•   The use of the computer is a privilege, not a right.
•   If this contract is broken, the student’s privilege will be revoked.

I have read the “Student Internet Contract” above. By signing below, I fully agree with and
understand the contents of this contract. If I breach any rules, I understand my Internet and
computer privileges may be revoked.

Signed by:

Student:                                            Date:

Teacher:                                            Date:




Copyright © Glencoe/McGraw-Hill

More Related Content

What's hot

Cyber safety
Cyber safetyCyber safety
Cyber safety
smartins7
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
jpl17
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
smillerivy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
kirshee
 

What's hot (20)

E safety
E safetyE safety
E safety
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Family online-safety-contract
Family online-safety-contractFamily online-safety-contract
Family online-safety-contract
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked (20)

pltest01
pltest01pltest01
pltest01
 
PréMios 1ª Fase Livros1
PréMios 1ª Fase  Livros1PréMios 1ª Fase  Livros1
PréMios 1ª Fase Livros1
 
Project Primer
Project PrimerProject Primer
Project Primer
 
Estandards en elearning
Estandards en elearningEstandards en elearning
Estandards en elearning
 
Phd Test01
Phd Test01Phd Test01
Phd Test01
 
Tefelicito
TefelicitoTefelicito
Tefelicito
 
18
1818
18
 
27
2727
27
 
23
2323
23
 
ACTORES
ACTORESACTORES
ACTORES
 
Moraleja
MoralejaMoraleja
Moraleja
 
Reference Manager Manual
Reference Manager ManualReference Manager Manual
Reference Manager Manual
 
70723 Huycolombiaaa
70723 Huycolombiaaa70723 Huycolombiaaa
70723 Huycolombiaaa
 
8o D No10
8o D No108o D No10
8o D No10
 
26
2626
26
 
Alfa Junior
Alfa JuniorAlfa Junior
Alfa Junior
 
DAILY ROUTINES
DAILY ROUTINESDAILY ROUTINES
DAILY ROUTINES
 
Certificação Socioambiental
Certificação SocioambientalCertificação Socioambiental
Certificação Socioambiental
 
Carolina
CarolinaCarolina
Carolina
 
Vdltest01
Vdltest01Vdltest01
Vdltest01
 

Similar to Internet Contract

Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
Jennifer Whitt
 
St Benedicts School ICT Acceptable Use Agreement
St Benedicts School ICT Acceptable Use AgreementSt Benedicts School ICT Acceptable Use Agreement
St Benedicts School ICT Acceptable Use Agreement
Dai Barnes
 
Senior student e learning agreements for home
Senior student e learning agreements for homeSenior student e learning agreements for home
Senior student e learning agreements for home
Emma Watts
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
Paula Naugle
 
Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6
RochelleStansfield
 
Social media policy
Social media policySocial media policy
Social media policy
Har1982
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
juliewltn
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
Linda Long
 

Similar to Internet Contract (20)

Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
St Benedicts School ICT Acceptable Use Agreement
St Benedicts School ICT Acceptable Use AgreementSt Benedicts School ICT Acceptable Use Agreement
St Benedicts School ICT Acceptable Use Agreement
 
Senior student e learning agreements for home
Senior student e learning agreements for homeSenior student e learning agreements for home
Senior student e learning agreements for home
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6
 
Social media policy
Social media policySocial media policy
Social media policy
 
Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Agreement for Use of Technology for Families
Agreement for Use of Technology for Families
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Internet safety and acceptable use policies
Internet safety and acceptable use policiesInternet safety and acceptable use policies
Internet safety and acceptable use policies
 
bk
bkbk
bk
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 

More from yasha15

More from yasha15 (7)

Untitled
UntitledUntitled
Untitled
 
Untitled
UntitledUntitled
Untitled
 
Untitled
UntitledUntitled
Untitled
 
Untitled
UntitledUntitled
Untitled
 
Introduction
IntroductionIntroduction
Introduction
 
Introduction
IntroductionIntroduction
Introduction
 
Y Wilson525 Final Presentationv2
Y Wilson525  Final Presentationv2Y Wilson525  Final Presentationv2
Y Wilson525 Final Presentationv2
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Internet Contract

  • 1. Student Internet Contract You may distribute the following Student Internet Contract to students. The Student Internet Contract asks for students to act responsibly at any time they are using the computer and calls for students to monitor their own activities. Copyright © Glencoe/McGraw-Hill
  • 2. Student Internet Contract Below are policies that will regulate our use of the Internet. These rules have been designed to keep our computer and classroom functioning at the highest of standards. In order to have access to E-mail and the Internet, please read the following and sign below. For safety reasons, when using E-mail or the Internet: 1. I will not give out personal information such as my home address, parental information, or school name or location without the permission of my teacher. 2. I will immediately notify my teacher if I come across any information that makes me feel awkward. 3. I will never get together with someone I have “met” on-line without first getting my parents’ and teacher’s permission. If they agree, I will still bring an adult with me. 4. I will never forward my picture or anything else without first getting my teacher’s approval. 5. I will not return any messages that are inappropriate or make me feel uncomfortable. If I receive a message like this, I will notify my teacher. The following activities are illegal, and I will not willingly participate in them: 1. Gaining unauthorized access to any place I am not supposed to be. 2. Disrupting any computer system. 3. Contributing to help spread electronic viruses. 4. Engaging in any illegal activity on-line. I am aware that any on-line correspondence I send is a reflection of my school and myself. 1. My messages will be short, courteous, and to the point. 2. I will not use obscene language, engage in personal or discriminatory attacks, or post false or misleading information about individuals or organizations. I will not access, download, or distribute: 1. Any pornographic, obscene, or sexually explicit materials. 2. Inappropriate information or graphics. These policies and procedures must be adhered to, and any violation of them will be met with zero tolerance. • Students must abide by their signed contracts. • The use of the computer is a privilege, not a right. • If this contract is broken, the student’s privilege will be revoked. I have read the “Student Internet Contract” above. By signing below, I fully agree with and understand the contents of this contract. If I breach any rules, I understand my Internet and computer privileges may be revoked. Signed by: Student: Date: Teacher: Date: Copyright © Glencoe/McGraw-Hill