SlideShare a Scribd company logo
1 of 2
Download to read offline
WELLESLEY PUBLIC SCHOOLS
COMPUTER ACCEPTABLE USE POLICY

Description
Wellesley Public Schools provides computers, networks, and Internet access to enhance teaching
and learning. The computer can be a powerful research tool in a school setting, providing
information beyond what is available in local print resources. Through this technology, students
have the opportunity to access and explore local, national, and international resources. The
information available touches on every area of the curriculum. In order to become lifelong
learners, it is important for students to gain electronic information retrieval and evaluation skills
and to become responsible members of the global community.

Rights & Responsibilities
Computers enable students to conduct research and communicate with others. Access to
computers, research and communication tools, and the Internet will be provided only to those
students who agree to act in a responsible manner. Use of WPS computers, networks, and the
Internet is a privilege, not a right. This policy has been developed to outline the
responsibilities students must assume in order to maintain user privileges. Each student must
respect and maintain the rights of all other users. Responsible, ethical, and legal behavior is
expected from each student.

Rules and Regulations
Students are expected to follow all rules and regulations outlined in this policy, as well as those
indicated by faculty and staff. Any student who does not follow these rules may lose computer
privileges, face school disciplinary action, and even appropriate legal action.

Unacceptable use of technology includes, but is not limited to, the following:
 1. Using the computer/network for any illegal activity including violation of copyright or
      other contracts, plagiarism,, cyber-bullying, and electronic transmission of pornography.
 2. Using the computer/network for financial or commercial gain.
 3. Abusing or disrupting equipment, software, system configuration settings, or system
      performance, wastefully using finite resources (i.e. paper, ink. etc.), or violating
      computer system security.
 4. Copying or installing software or plug-ins.
 5. Deleting or altering files or file contents that do not belong to you.
 6. Gaining unauthorized access to servers or server accounts other than one's own.
 7. Invading the privacy of individuals, including vandalizing data and using an account
      owned by another user.
 8. Posting personal communications without the original author's consent.
 9. Accessing, downloading, storing, creating, or printing files or messages that are
      profane, obscene, or that use language that offends or tends to degrade others.
 10. Sending "chain letters," or "broadcast"' messages to lists or individuals, and any other
      types of use which would cause congestion of the network or otherwise interfere with
      the work of others.
 11. Using impersonation, anonymity, and/or pseudonyms.
 12. Using the computer/network for the purpose of harassing, threatening, or terrorizing
      any individual or group.
 13. Using social networking, instant messaging and chat rooms for non-school related
      reasons.
 14. Playing any type of computer game unless it is a school sanctioned activity.
 15. Using bandwidth to watch streaming videos for non-school related reasons
16.   Using computers to check email for non-school related reasons.
 17.   Using the computer in a disruptive or loud way such as listening to audio or video
       without headphones. Be considerate of others.


Online Safety and Etiquette
 Students are expected to abide by some general rules when using the Wellesley Public
 Schools’ networks. The accepted rules of online etiquette include but are not limited to the
 following:
   1. Do not reveal personal information about yourself or others (i.e., last name, home
       address, name of school, e-mail address, phone number).
   2. Remember that e-mail is not guaranteed to be private. Be careful what you say.
   3. Be polite and use appropriate language. Do not swear or use offensive language.

Technology Suggestions/Recommendations
There are multiple ways to save and store files:
  1. The Technology Department provides each student with storage space on a server that
       may be accessed in school but NOT from home. This space is accessed by a username
       and password given to each student. The server may not be used to store music or
       movies.
  2. Another storage option is for a student to purchase a USB flash drive, also known as a
       “thumb drive,” for moving about from computer to computer.

More Related Content

What's hot

Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomMrs.Faust
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs studentsvlbrown
 
Diapositivas de diseño
Diapositivas de diseñoDiapositivas de diseño
Diapositivas de diseñoJoha Cabrera
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conductsupunls
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomjlknight
 
Lesson16.the internet and education (Escalo)
Lesson16.the internet and education (Escalo)Lesson16.the internet and education (Escalo)
Lesson16.the internet and education (Escalo)mikaescalo
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerNur Azlina
 
The Internet and Education
The Internet and EducationThe Internet and Education
The Internet and Educationleaniesurilla
 
School libraries... yesterday and today...
School libraries... yesterday and today...School libraries... yesterday and today...
School libraries... yesterday and today...ssmith7027
 
Presentación functionaal
Presentación functionaalPresentación functionaal
Presentación functionaalyoshipaulinik
 

What's hot (19)

Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Diapositivas de diseño
Diapositivas de diseñoDiapositivas de diseño
Diapositivas de diseño
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Presentation1
Presentation1Presentation1
Presentation1
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conduct
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
Lesson16.the internet and education (Escalo)
Lesson16.the internet and education (Escalo)Lesson16.the internet and education (Escalo)
Lesson16.the internet and education (Escalo)
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using Computer
 
cv
cvcv
cv
 
E resources
E resourcesE resources
E resources
 
The Internet and Education
The Internet and EducationThe Internet and Education
The Internet and Education
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
School libraries... yesterday and today...
School libraries... yesterday and today...School libraries... yesterday and today...
School libraries... yesterday and today...
 
Presentación functionaal
Presentación functionaalPresentación functionaal
Presentación functionaal
 

Similar to Draft Computer Acceptable Use Policy

Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYChano Alfornon
 
Safety Presentation
Safety PresentationSafety Presentation
Safety PresentationSarah Sutter
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
Et 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training sessionEt 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training sessionMichelle Abee
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 

Similar to Draft Computer Acceptable Use Policy (20)

SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Social media policy
Social media policySocial media policy
Social media policy
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
Et 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training sessionEt 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training session
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
Aup david.sayago
Aup david.sayagoAup david.sayago
Aup david.sayago
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
CMS Technology acceptable use policy
CMS Technology acceptable use policyCMS Technology acceptable use policy
CMS Technology acceptable use policy
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
Security Plan
Security PlanSecurity Plan
Security Plan
 

More from Wellesley Public School (20)

Bulletin 6-17-11
 Bulletin 6-17-11 Bulletin 6-17-11
Bulletin 6-17-11
 
Superintendents' Bulletin 6-10-11
Superintendents' Bulletin 6-10-11Superintendents' Bulletin 6-10-11
Superintendents' Bulletin 6-10-11
 
Superintendent's Bulletin 6-3-11
Superintendent's Bulletin 6-3-11Superintendent's Bulletin 6-3-11
Superintendent's Bulletin 6-3-11
 
WMS Summer Locker
WMS Summer LockerWMS Summer Locker
WMS Summer Locker
 
WMS June 2011
WMS June 2011WMS June 2011
WMS June 2011
 
WES June11
WES June11WES June11
WES June11
 
WHS June 2011
WHS June 2011WHS June 2011
WHS June 2011
 
Superintendent's Bulletin 5-27-11
Superintendent's Bulletin 5-27-11Superintendent's Bulletin 5-27-11
Superintendent's Bulletin 5-27-11
 
Superintendent's Bulletin 5-20-11
Superintendent's Bulletin 5-20-11Superintendent's Bulletin 5-20-11
Superintendent's Bulletin 5-20-11
 
Superintendent's Bulletin 5-13-11
Superintendent's Bulletin 5-13-11Superintendent's Bulletin 5-13-11
Superintendent's Bulletin 5-13-11
 
Superintendent's Bulletin 5-13-11
Superintendent's Bulletin 5-13-11Superintendent's Bulletin 5-13-11
Superintendent's Bulletin 5-13-11
 
Superintendent's Bulletin 5-13-11
Superintendent's Bulletin 5-13-11Superintendent's Bulletin 5-13-11
Superintendent's Bulletin 5-13-11
 
Wiki Syllabus
Wiki SyllabusWiki Syllabus
Wiki Syllabus
 
Superintendent's Bulletin 5-6-11
Superintendent's Bulletin 5-6-11Superintendent's Bulletin 5-6-11
Superintendent's Bulletin 5-6-11
 
WHS Menus May 2011
WHS Menus May 2011WHS Menus May 2011
WHS Menus May 2011
 
Whsmay11
Whsmay11Whsmay11
Whsmay11
 
WES Menus May11
WES Menus May11WES Menus May11
WES Menus May11
 
WMS Menus May 2011
WMS Menus May 2011WMS Menus May 2011
WMS Menus May 2011
 
Superintendent's Bulletin 4-29-11
Superintendent's Bulletin 4-29-11Superintendent's Bulletin 4-29-11
Superintendent's Bulletin 4-29-11
 
Superintendent's Bulletin 4-15-11
Superintendent's Bulletin 4-15-11Superintendent's Bulletin 4-15-11
Superintendent's Bulletin 4-15-11
 

Recently uploaded

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 

Recently uploaded (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 

Draft Computer Acceptable Use Policy

  • 1. WELLESLEY PUBLIC SCHOOLS COMPUTER ACCEPTABLE USE POLICY Description Wellesley Public Schools provides computers, networks, and Internet access to enhance teaching and learning. The computer can be a powerful research tool in a school setting, providing information beyond what is available in local print resources. Through this technology, students have the opportunity to access and explore local, national, and international resources. The information available touches on every area of the curriculum. In order to become lifelong learners, it is important for students to gain electronic information retrieval and evaluation skills and to become responsible members of the global community. Rights & Responsibilities Computers enable students to conduct research and communicate with others. Access to computers, research and communication tools, and the Internet will be provided only to those students who agree to act in a responsible manner. Use of WPS computers, networks, and the Internet is a privilege, not a right. This policy has been developed to outline the responsibilities students must assume in order to maintain user privileges. Each student must respect and maintain the rights of all other users. Responsible, ethical, and legal behavior is expected from each student. Rules and Regulations Students are expected to follow all rules and regulations outlined in this policy, as well as those indicated by faculty and staff. Any student who does not follow these rules may lose computer privileges, face school disciplinary action, and even appropriate legal action. Unacceptable use of technology includes, but is not limited to, the following: 1. Using the computer/network for any illegal activity including violation of copyright or other contracts, plagiarism,, cyber-bullying, and electronic transmission of pornography. 2. Using the computer/network for financial or commercial gain. 3. Abusing or disrupting equipment, software, system configuration settings, or system performance, wastefully using finite resources (i.e. paper, ink. etc.), or violating computer system security. 4. Copying or installing software or plug-ins. 5. Deleting or altering files or file contents that do not belong to you. 6. Gaining unauthorized access to servers or server accounts other than one's own. 7. Invading the privacy of individuals, including vandalizing data and using an account owned by another user. 8. Posting personal communications without the original author's consent. 9. Accessing, downloading, storing, creating, or printing files or messages that are profane, obscene, or that use language that offends or tends to degrade others. 10. Sending "chain letters," or "broadcast"' messages to lists or individuals, and any other types of use which would cause congestion of the network or otherwise interfere with the work of others. 11. Using impersonation, anonymity, and/or pseudonyms. 12. Using the computer/network for the purpose of harassing, threatening, or terrorizing any individual or group. 13. Using social networking, instant messaging and chat rooms for non-school related reasons. 14. Playing any type of computer game unless it is a school sanctioned activity. 15. Using bandwidth to watch streaming videos for non-school related reasons
  • 2. 16. Using computers to check email for non-school related reasons. 17. Using the computer in a disruptive or loud way such as listening to audio or video without headphones. Be considerate of others. Online Safety and Etiquette Students are expected to abide by some general rules when using the Wellesley Public Schools’ networks. The accepted rules of online etiquette include but are not limited to the following: 1. Do not reveal personal information about yourself or others (i.e., last name, home address, name of school, e-mail address, phone number). 2. Remember that e-mail is not guaranteed to be private. Be careful what you say. 3. Be polite and use appropriate language. Do not swear or use offensive language. Technology Suggestions/Recommendations There are multiple ways to save and store files: 1. The Technology Department provides each student with storage space on a server that may be accessed in school but NOT from home. This space is accessed by a username and password given to each student. The server may not be used to store music or movies. 2. Another storage option is for a student to purchase a USB flash drive, also known as a “thumb drive,” for moving about from computer to computer.