Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Technology acceptable use policy for students 08202011[1]

746 views

Published on

Published in: Technology, Education
  • Be the first to comment

  • Be the first to like this

Technology acceptable use policy for students 08202011[1]

  1. 1. Technology Acceptable UsePolicy Lockhart ISD
  2. 2. Technology Acceptable Use Policy  Purpose  StaffTechnology Acceptable Use Policy  Student Technology Acceptable Use Policy  User Agreements
  3. 3. Technology Acceptable Use PolicyPURPOSE
  4. 4. Purpose  Enhance quality of student learning  Enhance staff & student efficiency  Ensure protection of students and staff  Protect hardware and software  Sets standards for technology usage
  5. 5. Governances  School  Local, state and federal law  LISD has a duty to investigate suspected violations
  6. 6. Technology Resources  Any electronic tool, device, program, or system that aids the educational and work environment  Personal devices are included in the AUP  Must meet LISD minimum requirements— virus protection software  Approved by technology department or campus administrator
  7. 7. Technology Acceptable Use PolicySTAFF TECHNOLOGYACCEPTABLE USE POLICY
  8. 8. Staff Technology AcceptableUse Policy  LISD employees follow an acceptable use policy
  9. 9. Technology Acceptable Use PolicySTUDENT TECHNOLOGYACCEPTABLE USE POLICY
  10. 10. Student Technology AcceptableUse Policy  Established for limited educational purposes  Classroom activities, career development, limited high-quality self-discovery activities  Not a public access service or public forum  Student has access unless a parent/guardian denies access  All activity is monitored  Follow same rules, good manners and common sense guidelines used with other daily school activities
  11. 11. General Unacceptable Behavior  Posting information that will cause damage or disruption of technology  Engaging in personal attacks  Harassing another person  Posting false or defamatory information  Using criminal speech  Using speech inappropriate in an educational setting
  12. 12. General Unacceptable Behavior  Abusing network resources–chain letters  Displaying, accessing or sending offensive messages or pictures  Using for commercial purposes—garage sales, fundraisers, benefits  Political lobbying  Accessing unauthorized district systems— Skyward
  13. 13. General Unacceptable Behavior  Using district resources to threaten employees  Sending or posting messages that are  Abusive  Obscene  Sexually oriented  Threatening  Harassing  Damaging to another’s reputation  Illegal  Bullying
  14. 14. E-Mail  Students will only use teacher or classroom accounts  No private email is allowed  Students cannot create private accounts at school  Students will not repost a message that was sent to them privately without the permission of the person who sent them the message.  Students will not post private information about another person.
  15. 15. World Wide Web  Online textbooks and curriculum sites  Sites will be actively monitored by teachers and the technology department  Annual Internet safety training for students
  16. 16. Real-time, InteractiveCommunication Areas  Blogs, Wikis, & Social Networking will only be used when directed by the teacher  Use only to support educational activities
  17. 17. School Web Sites  Class websites may have  Group pictures without identification  Individual students without identification  Student work with first name only  Materials on web must meet academic standards  Graphics, text, sound, etc. must have copyright approval  Must have link back to campus/district
  18. 18. Personal Safety  Students will not share personal contact information about themselves or other people.  Address  Telephone  School address  Home address  Do not give full name or any other personal contact information for any purpose.  Do not agree to meet with someone you have met online.  Tell an adult if any message received is inappropriate or makes you feel uncomfortable
  19. 19. System Security  Students should secure user names and passwords  Notify an adult if a security problem has been identified  Do not attempt to gain unauthorized access to LISD network  Do not attempt to disrupt the network or destroy data  Do not attempt to access blocked sites  Do not use sniffing or remote access technology to monitor network activity  Do not create unauthorized networks
  20. 20. Software and Files  Software is for educational use  Permission is needed to install, upload or download software  Intentional misuse may result in disciplinary action  Electronic files are not private  USB devices should be used for storage only—not software
  21. 21. Technology Hardware  Used for educational purposes  Do not relocate hardware  LISD regulates hardware/software on the network including personal devices  LISD equipment may only be used to support educational goals
  22. 22. Vandalism  Any malicious attempt to harm or destroy data or the network will result in cancellation of network privileges  Disciplinary measure will be enforced
  23. 23. Plagiarism and Copyright Infringement  Plagiarism is not allowed  Copyright laws govern use of material  Copyrighted material used in the district must have author’s permission
  24. 24. Videoconference  Videoconferencing is allowed  May be videotaped by district personnel  School acceptable use and behavior rules apply during conferences
  25. 25. Student Rights  Electronic network is a limited forum for valid educational purposes  Searches will be conducted if there is reasonable suspicion of a violation
  26. 26. Due Process  LISD will cooperate with local, state or federal officials if illegal activities occur  Student will be provided with notice and an opportunity to be heard in the manner set forth in the disciplinary code
  27. 27. Violations of this Acceptable UsePolicy  Violations of this policy may result in loss of access as well as other disciplinary or legal action.  Examples:  Use of district network only under direct supervision  Suspension of network privileges  Revocation of network privileges  Suspension of computer privileges  Suspension from school  Expulsion from school and/or  Legal action and prosecution by the authorities
  28. 28. Student User Agreement Student Name ___________________________________ Grade ________ School ________________________________________ I have read the Lockhart ISD Student Technology Acceptable Use Policy Rules and Procedures document. I agree to follow the rules contained in this policy. I understand that if I violate the rules my access can be terminated and I may face other disciplinary measures. Student Signature _____________________________________________ Date ________________

×