SlideShare a Scribd company logo
1 of 7
   An AUP is a written agreement, signed
    by students, their parents, and
    teachers, outlining the terms and
    conditions of Internet use.
Northeastern State University Acceptable
  Use Policy:
http://its.nsuok.edu/printableforms/accept
  ableusepolicy.aspx

Middle School Acceptable Use Policy:
http://www.ncsu.edu/ligon/au.policy.html
Components:
 School’s statement of philosophy
 Code of conduct
 Consequences of violating policy
 Student and Guardian signature
   · Educate parents about their children's use of the Internet.
   · Educate students about
                risks peculiar to computer communication.
               rules for efficient, ethical, legal computer/network use.
               safe and appropriate computer social behavior.
               use of available and unavailable services.
   · Protect vulnerable children from inappropriate approaches.
   · Discourage children from making inappropriate personal disclosures.
   · Encourage ethical behavior, and discourage criminal behavior.
   · Encourage accepted Netiquette from the very start.
   · Encourage polite and civil communication.
   · Encourage individual integrity and honesty.
   · Encourage respect for others and their private property.
   · Allow enforcement of necessary rules of behavior.
   · Protect the school networking equipment and software from danger.
   · Help improve network efficiency by influencing resource usage.
   · Share responsibility for the risks of using the Internet.
   · Reduce the risk of lawsuits against teachers, schools, and providers.
   · Discourage copyright infringement, software piracy, and plagiarism.
   · Discourage network game playing and/or anonymous messages.
   · Discourage use of computers and networks for profit or politics.
   · Assure Internet users that their online activities are monitored or assure Internet users that
         their e-mail privacy is (or is not) being respected.
 http://its.nsuok.edu/printableforms/acce
  ptableusepolicy.aspx
 http://www.ncsu.edu/ligon/au.policy.ht
  ml
 http://www.isafe.org/imgs/pdf/educatio
  n/AUPs.pdf
 http://en.wikipedia.org/wiki/Acceptable
  _use_policy
1.   Who uses Acceptable Use Policies?
     Schools, Universities
2.   What is an Acceptable Use Policy?
     Is a written agreement, signed by students, their
     parents, and teachers, outlining the terms and conditions
     of Internet use.
3.   What is one reason to have an AUP?
      Assure Internet users that their online activities are
     monitored or assure Internet users that their e-mail
     privacy is (or is not) being respected.

More Related Content

What's hot

Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyJulie Evans
 
Case study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian YouthsCase study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian YouthsRitika Kumari
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHSMisterHobbs
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
Education Privacy
Education Privacy Education Privacy
Education Privacy emilyensign
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policycollimic
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
ML, Copyright and Fair Use
ML, Copyright and Fair UseML, Copyright and Fair Use
ML, Copyright and Fair UseRenee Hobbs
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issuestuttitat
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 versionJohan Koren
 
Copyright For Administrators
Copyright For AdministratorsCopyright For Administrators
Copyright For AdministratorsJulie Putnam
 
E rate presentation
E rate presentationE rate presentation
E rate presentationbpgentry
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 versionJohan Koren
 
"Student Posts Phone Number on Internet!"
"Student Posts Phone Number on Internet!""Student Posts Phone Number on Internet!"
"Student Posts Phone Number on Internet!"Kya Range
 
Jennifer Reader Presentation 504
Jennifer Reader Presentation 504Jennifer Reader Presentation 504
Jennifer Reader Presentation 504jkdwb
 
Lt safety of student data
Lt safety of student dataLt safety of student data
Lt safety of student datagwens502
 

What's hot (20)

Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 Journey
 
Case study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian YouthsCase study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian Youths
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHS
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
1. iste, cones, ict
1. iste, cones, ict1. iste, cones, ict
1. iste, cones, ict
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
History of Technology
History of TechnologyHistory of Technology
History of Technology
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
ML, Copyright and Fair Use
ML, Copyright and Fair UseML, Copyright and Fair Use
ML, Copyright and Fair Use
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issues
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Technology @ASIJ & Responsible Cyber Citizenship
Technology @ASIJ & Responsible Cyber CitizenshipTechnology @ASIJ & Responsible Cyber Citizenship
Technology @ASIJ & Responsible Cyber Citizenship
 
Copyright For Administrators
Copyright For AdministratorsCopyright For Administrators
Copyright For Administrators
 
E rate presentation
E rate presentationE rate presentation
E rate presentation
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 
"Student Posts Phone Number on Internet!"
"Student Posts Phone Number on Internet!""Student Posts Phone Number on Internet!"
"Student Posts Phone Number on Internet!"
 
Jennifer Reader Presentation 504
Jennifer Reader Presentation 504Jennifer Reader Presentation 504
Jennifer Reader Presentation 504
 
Armenia2
Armenia2Armenia2
Armenia2
 
Lt safety of student data
Lt safety of student dataLt safety of student data
Lt safety of student data
 

Viewers also liked

Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet useBurkeV
 
Network acceptable policy
Network acceptable policyNetwork acceptable policy
Network acceptable policyguest9139550
 
Power Point Presentations
Power Point PresentationsPower Point Presentations
Power Point PresentationsS.D. H.
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internetjoshuathompson21
 
Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationAnne Arendt
 
Assessment - Ethical use of ICT
Assessment - Ethical use of ICTAssessment - Ethical use of ICT
Assessment - Ethical use of ICTErkkie Haipinge
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]ajdredla
 
Acceptable Use Policy - CTAP Training
Acceptable Use Policy - CTAP TrainingAcceptable Use Policy - CTAP Training
Acceptable Use Policy - CTAP TrainingGlenn Hervieux
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy projectRachel Nachman
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomjlknight
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomMrs.Faust
 
Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generationdlevin
 

Viewers also liked (17)

Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
 
Network acceptable policy
Network acceptable policyNetwork acceptable policy
Network acceptable policy
 
Power Point Presentations
Power Point PresentationsPower Point Presentations
Power Point Presentations
 
Aavikkoesitelmä sara taru
Aavikkoesitelmä sara taruAavikkoesitelmä sara taru
Aavikkoesitelmä sara taru
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher Education
 
Assessment - Ethical use of ICT
Assessment - Ethical use of ICTAssessment - Ethical use of ICT
Assessment - Ethical use of ICT
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]
 
Acceptable Use Policy - CTAP Training
Acceptable Use Policy - CTAP TrainingAcceptable Use Policy - CTAP Training
Acceptable Use Policy - CTAP Training
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy project
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generation
 

Similar to Acceptable use policy

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
School policies, procedures and contracts
School policies, procedures and contractsSchool policies, procedures and contracts
School policies, procedures and contractsHarleen Singh
 
Staff training session
Staff training sessionStaff training session
Staff training sessionmander5208
 
Telecommunications policy 2010 2011
Telecommunications policy 2010 2011Telecommunications policy 2010 2011
Telecommunications policy 2010 2011Tedd Wilson
 
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.moeenali5423
 
Ferrari v policy
Ferrari v policyFerrari v policy
Ferrari v policyvlferrari
 
Acceptable Internet Use In Schools
Acceptable Internet Use In SchoolsAcceptable Internet Use In Schools
Acceptable Internet Use In Schoolsvlferrari
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educatorsjessa_delingon
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]Debbie Oliver
 
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docxUNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docxdickonsondorris
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying ResourcesAndy Jeter
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813jennifer_lawrence
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Acceptable Use Policy - CTAP training
Acceptable Use Policy - CTAP trainingAcceptable Use Policy - CTAP training
Acceptable Use Policy - CTAP trainingGlenn Hervieux
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policyBadaiaEnglish
 

Similar to Acceptable use policy (20)

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Social media policy
Social media policySocial media policy
Social media policy
 
School policies, procedures and contracts
School policies, procedures and contractsSchool policies, procedures and contracts
School policies, procedures and contracts
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Telecommunications policy 2010 2011
Telecommunications policy 2010 2011Telecommunications policy 2010 2011
Telecommunications policy 2010 2011
 
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
 
Ferrari v policy
Ferrari v policyFerrari v policy
Ferrari v policy
 
Acceptable Internet Use In Schools
Acceptable Internet Use In SchoolsAcceptable Internet Use In Schools
Acceptable Internet Use In Schools
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docxUNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
E safety for governors & carers
E safety for governors & carersE safety for governors & carers
E safety for governors & carers
 
Acceptable Use Policy - CTAP training
Acceptable Use Policy - CTAP trainingAcceptable Use Policy - CTAP training
Acceptable Use Policy - CTAP training
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policy
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Acceptable use policy

  • 1.
  • 2. An AUP is a written agreement, signed by students, their parents, and teachers, outlining the terms and conditions of Internet use.
  • 3. Northeastern State University Acceptable Use Policy: http://its.nsuok.edu/printableforms/accept ableusepolicy.aspx Middle School Acceptable Use Policy: http://www.ncsu.edu/ligon/au.policy.html
  • 4. Components:  School’s statement of philosophy  Code of conduct  Consequences of violating policy  Student and Guardian signature
  • 5. · Educate parents about their children's use of the Internet.  · Educate students about risks peculiar to computer communication. rules for efficient, ethical, legal computer/network use. safe and appropriate computer social behavior. use of available and unavailable services.  · Protect vulnerable children from inappropriate approaches.  · Discourage children from making inappropriate personal disclosures.  · Encourage ethical behavior, and discourage criminal behavior.  · Encourage accepted Netiquette from the very start.  · Encourage polite and civil communication.  · Encourage individual integrity and honesty.  · Encourage respect for others and their private property.  · Allow enforcement of necessary rules of behavior.  · Protect the school networking equipment and software from danger.  · Help improve network efficiency by influencing resource usage.  · Share responsibility for the risks of using the Internet.  · Reduce the risk of lawsuits against teachers, schools, and providers.  · Discourage copyright infringement, software piracy, and plagiarism.  · Discourage network game playing and/or anonymous messages.  · Discourage use of computers and networks for profit or politics.  · Assure Internet users that their online activities are monitored or assure Internet users that their e-mail privacy is (or is not) being respected.
  • 6.  http://its.nsuok.edu/printableforms/acce ptableusepolicy.aspx  http://www.ncsu.edu/ligon/au.policy.ht ml  http://www.isafe.org/imgs/pdf/educatio n/AUPs.pdf  http://en.wikipedia.org/wiki/Acceptable _use_policy
  • 7. 1. Who uses Acceptable Use Policies? Schools, Universities 2. What is an Acceptable Use Policy? Is a written agreement, signed by students, their parents, and teachers, outlining the terms and conditions of Internet use. 3. What is one reason to have an AUP? Assure Internet users that their online activities are monitored or assure Internet users that their e-mail privacy is (or is not) being respected.