SlideShare a Scribd company logo
1 of 2
Acceptable Computer and Internet Usage Permission Form
Dear Parent or Guardian:
With your permission your child will be able to access the Computer and Internet at school as
part of their class instruction. Below are the rules at the school. Please read them over before
you consider granting permission.
Guidelines for Internet Usage:
1. All students must have a signed permission slip from their parent or guardian that
authorizes them access to the Internet.
1. Respect for the computer equipment and its network is a condition for use of the
computers.
1. Students are to notify the teacher immediately of any disturbing material they may
encounter on the Web or in e-mail.
1. For safety reasons, students are not to give out personal information such as telephone
number, full name, address, etc. to anyone on the Internet.
1. Students must never give anyone their password or allow another student to use their
account to access the Internet or the school’s network.
6. Students must not violate the rights to privacy of other students.
6. Students must get permission from the teacher before downloading any materials
from the Internet.
7. Students are restricted from changing the set-ups of the computers and removing
or adding programs to any of the school's computers.
8. If a student wants to use a zip drive for the computer, the teacher must scan it for
viruses before being used.
9. Students are not allowed to plagiarize works found on the Internet. Copy and
pasting work from the Internet into your work is a form of plagiarizing.
10. Students are restricted from using
obscene, profane, lewd, vulgar, rude, threatening, or disrespectful language while
using the school's computers.
Violation of any of these rules may result in forfeiture of permission to use the Internet
and school network and/or appropriate disciplinary action. Please sign below if
granting permission and please return this form to the school.
I __________________________________ (Parent Signature) give permission for my
son/daughter to access the Internet and to publish class-related information on it in
accordance with the above guidelines.
I __________________________________ (Student Signature) have also read the
above and will honor the guidelines established for Internet Usage.

More Related Content

What's hot

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policymaryjasperse
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPSJeanette Murphy
 
Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008JulieRen141
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Internet safety and acceptable use policies
Internet safety and acceptable use policiesInternet safety and acceptable use policies
Internet safety and acceptable use policiesjac2015
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy projectRachel Nachman
 
Golden Rules for Use Of Computer Rooms
Golden Rules for Use Of Computer RoomsGolden Rules for Use Of Computer Rooms
Golden Rules for Use Of Computer Roomsbtvssict
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 
Tan, Julius Peter Edtech2 Assignment Chapter 8
Tan, Julius Peter Edtech2 Assignment Chapter 8Tan, Julius Peter Edtech2 Assignment Chapter 8
Tan, Julius Peter Edtech2 Assignment Chapter 8Jaypee Tan
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet SafetyCharina Mostierra
 

What's hot (18)

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPS
 
WPS Elementary Student AUP
WPS Elementary Student AUPWPS Elementary Student AUP
WPS Elementary Student AUP
 
Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Internet safety and acceptable use policies
Internet safety and acceptable use policiesInternet safety and acceptable use policies
Internet safety and acceptable use policies
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy project
 
Golden Rules for Use Of Computer Rooms
Golden Rules for Use Of Computer RoomsGolden Rules for Use Of Computer Rooms
Golden Rules for Use Of Computer Rooms
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
Poe question 1
Poe question 1Poe question 1
Poe question 1
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
Aup ppt
Aup pptAup ppt
Aup ppt
 
Tan, Julius Peter Edtech2 Assignment Chapter 8
Tan, Julius Peter Edtech2 Assignment Chapter 8Tan, Julius Peter Edtech2 Assignment Chapter 8
Tan, Julius Peter Edtech2 Assignment Chapter 8
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
 
TeacherTechEthics11/12
TeacherTechEthics11/12TeacherTechEthics11/12
TeacherTechEthics11/12
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 

Viewers also liked

Formato robert (1)
Formato robert (1)Formato robert (1)
Formato robert (1)elduro299ful
 
Historia de la natación
Historia de la nataciónHistoria de la natación
Historia de la nataciónJohany ToVilla
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorUltraUploader
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesUltraUploader
 
Changes in-relationships
Changes in-relationshipsChanges in-relationships
Changes in-relationshipsHeber Sanchez
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virologyUltraUploader
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyUltraUploader
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksUltraUploader
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...UltraUploader
 
Binary obfuscation using signals
Binary obfuscation using signalsBinary obfuscation using signals
Binary obfuscation using signalsUltraUploader
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityUltraUploader
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applicationsUltraUploader
 

Viewers also liked (20)

Formato robert (1)
Formato robert (1)Formato robert (1)
Formato robert (1)
 
Historia de la natación
Historia de la nataciónHistoria de la natación
Historia de la natación
 
Guia autocad decimos_p2
Guia autocad decimos_p2Guia autocad decimos_p2
Guia autocad decimos_p2
 
Congreso margarita
Congreso margaritaCongreso margarita
Congreso margarita
 
Guiatermodinamic mil
Guiatermodinamic milGuiatermodinamic mil
Guiatermodinamic mil
 
Efruzhu endlessness theorem 4
Efruzhu  endlessness  theorem  4Efruzhu  endlessness  theorem  4
Efruzhu endlessness theorem 4
 
pirate ship
pirate ship pirate ship
pirate ship
 
134
134134
134
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 
Changes in-relationships
Changes in-relationshipsChanges in-relationships
Changes in-relationships
 
Becoming positive
Becoming positiveBecoming positive
Becoming positive
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virology
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassembly
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networks
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
 
Binary obfuscation using signals
Binary obfuscation using signalsBinary obfuscation using signals
Binary obfuscation using signals
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applications
 

Similar to AUP

11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreementPaula Naugle
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Paula Naugle
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreementPaula Naugle
 
Senior student e learning agreements for home
Senior student e learning agreements for homeSenior student e learning agreements for home
Senior student e learning agreements for homeEmma Watts
 
Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6RochelleStansfield
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy donekgrosvenor
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2guest594ea
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditTamir Harper
 
Security
SecuritySecurity
SecurityNabatah
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Fcpsbyodaup
FcpsbyodaupFcpsbyodaup
Fcpsbyodaupmclardy
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]Debbie Oliver
 
Internet Contract
Internet ContractInternet Contract
Internet Contractyasha15
 

Similar to AUP (20)

11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 
Senior student e learning agreements for home
Senior student e learning agreements for homeSenior student e learning agreements for home
Senior student e learning agreements for home
 
CES BYOT Agreement
CES BYOT AgreementCES BYOT Agreement
CES BYOT Agreement
 
Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 
Aup
AupAup
Aup
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2
 
CMS Technology acceptable use policy
CMS Technology acceptable use policyCMS Technology acceptable use policy
CMS Technology acceptable use policy
 
Technology acceptable use policy gr 7 day 1
Technology acceptable use policy   gr 7 day 1Technology acceptable use policy   gr 7 day 1
Technology acceptable use policy gr 7 day 1
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Social media policy
Social media policySocial media policy
Social media policy
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
Security
SecuritySecurity
Security
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
bk
bkbk
bk
 
Fcpsbyodaup
FcpsbyodaupFcpsbyodaup
Fcpsbyodaup
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
Internet Contract
Internet ContractInternet Contract
Internet Contract
 

AUP

  • 1. Acceptable Computer and Internet Usage Permission Form Dear Parent or Guardian: With your permission your child will be able to access the Computer and Internet at school as part of their class instruction. Below are the rules at the school. Please read them over before you consider granting permission. Guidelines for Internet Usage: 1. All students must have a signed permission slip from their parent or guardian that authorizes them access to the Internet. 1. Respect for the computer equipment and its network is a condition for use of the computers. 1. Students are to notify the teacher immediately of any disturbing material they may encounter on the Web or in e-mail. 1. For safety reasons, students are not to give out personal information such as telephone number, full name, address, etc. to anyone on the Internet. 1. Students must never give anyone their password or allow another student to use their account to access the Internet or the school’s network.
  • 2. 6. Students must not violate the rights to privacy of other students. 6. Students must get permission from the teacher before downloading any materials from the Internet. 7. Students are restricted from changing the set-ups of the computers and removing or adding programs to any of the school's computers. 8. If a student wants to use a zip drive for the computer, the teacher must scan it for viruses before being used. 9. Students are not allowed to plagiarize works found on the Internet. Copy and pasting work from the Internet into your work is a form of plagiarizing. 10. Students are restricted from using obscene, profane, lewd, vulgar, rude, threatening, or disrespectful language while using the school's computers. Violation of any of these rules may result in forfeiture of permission to use the Internet and school network and/or appropriate disciplinary action. Please sign below if granting permission and please return this form to the school. I __________________________________ (Parent Signature) give permission for my son/daughter to access the Internet and to publish class-related information on it in accordance with the above guidelines. I __________________________________ (Student Signature) have also read the above and will honor the guidelines established for Internet Usage.