SlideShare a Scribd company logo
1 of 2
USER GUIDELINES:
Internet access is coordinated through a complex association of government agencies and
regional and state networks. It is the school district’s intent that the Internet and our
telecommunications network be used in a responsible, efficient, ethical and legal manner. The
operation of the Internet relies heavily on the proper conduct of the users who must adhere to
strict guidelines. If a district user violates any of these provisions, their account will be
terminated and future access will be denied. In addition, serious violations may result in school
disciplinary action or legal action in accordance with Clay County policies, up to and including
termination of employment. A signature(s) on the Code of Conduct indicates that the user(s)
have read the terms and conditions carefully and understand their significance.
I. Acceptable Use: The use of your account must be in support of education and research that is
consistent with the educational goals and policies of the Clay County District Schools. Users are
encouraged to develop uses which meet their individual needs and that take advantage of the
network’s functions: electronic mail, conferences, bulletin boards, databases and access to the
Internet. Use of any other network or computing resources must be consistent with the rules
appropriate to that network.
II. Privileges: The use of Internet is a privilege. Inappropriate use will result in the cancellation of
that privilege. Each individual who accepts an account will receive information pertaining to the
proper use of the network. School and district administrators will decide what inappropriate use
is.
III. “Netiquette”: You are expected to abide by the generally accepted rules of network etiquette.
Be polite. Do not use vulgar or obscene language. Do not reveal your address or phone number
or those of others. Please remember that electronic mail is not guaranteed to be private. Do not
disrupt the network, the data, or other users.
IV. Unacceptable Uses of Network Include:
         A. Violating student or staff rights to privacy; or violating provisions of the Florida K-20
         Education Code, FERPA, or HIPPA;
         B. Using the Internet without application of common sense;
         C. Using profanity, obscenity, or other language which may be offensive to another user;
         including bullying;
         D. Sending or accessing pornographic text and/or graphics;
         E. Accessing unauthorized games;
         F. Engaging in illegal activities (defined as a violation of local, state, and/or federal laws.)
         G. Sending or receiving copyrighted materials, including computer software or material
         protected by trade secret, without permission;
         H. Plagiarizing;
         I. Reporting personal communications without the author’s prior consent;
         J. Using the network for commercial activities, product advertisement, or financial gain;
         K. Knowingly transmitting viruses or other destructive programming;
         L. Transmitting spam or chain letters;
         M. Unauthorized soliciting for goods and services, including personal solicitations such
         as garage sale announcements;
         N. Posting personal views on social, political, religious or other non-business related
         matters;
         O. Unauthorized streaming of video or music, such as listening to radio stations via the
         Internet.

I have read and understand the User Guidelines listed above:
PRINT YOUR FIRST AND LAST NAME:
________________________________________

________________________________________
     ____________________________

Student’s Signature                        Date

More Related Content

What's hot

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policycollimic
 
Digital law
Digital lawDigital law
Digital lawzrh48
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
Digital law
Digital lawDigital law
Digital lawCAQUES01
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismInternet Law Center
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"Wendy Knox Everette
 
Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation policeAshley Raymond
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safetyheidirobison
 
IT Digital Citizenship
IT Digital CitizenshipIT Digital Citizenship
IT Digital CitizenshipShayan Yazdani
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 
digital law
digital lawdigital law
digital law11tsk
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Fahad Saleem
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of ExpressionMark Jhon Oxillo
 

What's hot (20)

Cyber law1
Cyber law1Cyber law1
Cyber law1
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
 
Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation police
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safety
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
IT Digital Citizenship
IT Digital CitizenshipIT Digital Citizenship
IT Digital Citizenship
 
Digital law
Digital lawDigital law
Digital law
 
File000155
File000155File000155
File000155
 
Digital law
Digital lawDigital law
Digital law
 
digital law
digital lawdigital law
digital law
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Prekaj Cybercrime By the Italian Team
Prekaj Cybercrime  By the Italian TeamPrekaj Cybercrime  By the Italian Team
Prekaj Cybercrime By the Italian Team
 

Similar to Aceptable use policy user guidelines

Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docxResourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docxdebishakespeare
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfRegineManuel2
 
Online-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdfOnline-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdfmarissaramos007
 
Navigating Privacy And Spam Compliance In Social Media Advertising
Navigating Privacy And Spam Compliance In Social Media AdvertisingNavigating Privacy And Spam Compliance In Social Media Advertising
Navigating Privacy And Spam Compliance In Social Media Advertisingeldercomlaw
 
Content blocking and filtering: A Technical approach to solve Socio/Political...
Content blocking and filtering: A Technical approach to solve Socio/Political...Content blocking and filtering: A Technical approach to solve Socio/Political...
Content blocking and filtering: A Technical approach to solve Socio/Political...APNIC
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxzyleflorence
 
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxPPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxzyleflorence
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationKerry Rego
 
IASA social media presentation 2012
IASA social media presentation 2012IASA social media presentation 2012
IASA social media presentation 2012Steven Baule
 
Internet Liabilities Presentation
Internet Liabilities PresentationInternet Liabilities Presentation
Internet Liabilities PresentationShannon Evans
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxhealdkathaleen
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Vijay Dalmia
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 

Similar to Aceptable use policy user guidelines (20)

Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docxResourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
 
Online-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdfOnline-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdf
 
Fundraising On The Internet
Fundraising On The InternetFundraising On The Internet
Fundraising On The Internet
 
MIL WEEK 8.pptx
MIL WEEK 8.pptxMIL WEEK 8.pptx
MIL WEEK 8.pptx
 
Navigating Privacy And Spam Compliance In Social Media Advertising
Navigating Privacy And Spam Compliance In Social Media AdvertisingNavigating Privacy And Spam Compliance In Social Media Advertising
Navigating Privacy And Spam Compliance In Social Media Advertising
 
Content blocking and filtering: A Technical approach to solve Socio/Political...
Content blocking and filtering: A Technical approach to solve Socio/Political...Content blocking and filtering: A Technical approach to solve Socio/Political...
Content blocking and filtering: A Technical approach to solve Socio/Political...
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
 
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxPPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentation
 
IASA social media presentation 2012
IASA social media presentation 2012IASA social media presentation 2012
IASA social media presentation 2012
 
Internet Liabilities Presentation
Internet Liabilities PresentationInternet Liabilities Presentation
Internet Liabilities Presentation
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 

More from dlwadsworth

Ymca presentation
Ymca presentationYmca presentation
Ymca presentationdlwadsworth
 
It 2nd segment pace chart
It 2nd segment   pace chartIt 2nd segment   pace chart
It 2nd segment pace chartdlwadsworth
 
IT 1st segment Traditional pace chart
IT 1st segment  Traditional pace chartIT 1st segment  Traditional pace chart
IT 1st segment Traditional pace chartdlwadsworth
 
Acbsi pacing chart 2nd semester -14-15
Acbsi pacing chart   2nd semester -14-15Acbsi pacing chart   2nd semester -14-15
Acbsi pacing chart 2nd semester -14-15dlwadsworth
 
Segment 1 exam review ppt
Segment 1   exam review pptSegment 1   exam review ppt
Segment 1 exam review pptdlwadsworth
 
Pace chart 1st segment - traditional - ccc
Pace chart   1st segment - traditional - cccPace chart   1st segment - traditional - ccc
Pace chart 1st segment - traditional - cccdlwadsworth
 
Pace chart 2nd segment - computing for college and careers
Pace chart   2nd segment - computing for college and careersPace chart   2nd segment - computing for college and careers
Pace chart 2nd segment - computing for college and careersdlwadsworth
 
Acbsi orientation ppt
Acbsi   orientation pptAcbsi   orientation ppt
Acbsi orientation pptdlwadsworth
 
Acbsi ppt - project 1 sample
Acbsi   ppt - project 1 sampleAcbsi   ppt - project 1 sample
Acbsi ppt - project 1 sampledlwadsworth
 
Html assignment 2 template
Html assignment 2 templateHtml assignment 2 template
Html assignment 2 templatedlwadsworth
 
ACBSI Syllabus - Sheridan
ACBSI Syllabus - SheridanACBSI Syllabus - Sheridan
ACBSI Syllabus - Sheridandlwadsworth
 
Acbsi syllabus - Wadsworth
Acbsi syllabus - WadsworthAcbsi syllabus - Wadsworth
Acbsi syllabus - Wadsworthdlwadsworth
 
Aup lesson for vll students
Aup lesson for vll studentsAup lesson for vll students
Aup lesson for vll studentsdlwadsworth
 
Odysseyware Orientation - Wadsworth
Odysseyware Orientation   - WadsworthOdysseyware Orientation   - Wadsworth
Odysseyware Orientation - Wadsworthdlwadsworth
 
Unit 12 sec 2-programming design
Unit 12 sec 2-programming designUnit 12 sec 2-programming design
Unit 12 sec 2-programming designdlwadsworth
 
Unit 12 section 1 - computer programming
Unit 12   section 1 - computer programmingUnit 12   section 1 - computer programming
Unit 12 section 1 - computer programmingdlwadsworth
 
Sam2010 getting started ppt
Sam2010 getting started pptSam2010 getting started ppt
Sam2010 getting started pptdlwadsworth
 
Cbs welcome to week 1 ppt
Cbs   welcome to week 1 pptCbs   welcome to week 1 ppt
Cbs welcome to week 1 pptdlwadsworth
 
Aup study guide for ppt pdf
Aup study guide for ppt  pdfAup study guide for ppt  pdf
Aup study guide for ppt pdfdlwadsworth
 

More from dlwadsworth (20)

Ymca presentation
Ymca presentationYmca presentation
Ymca presentation
 
It 2nd segment pace chart
It 2nd segment   pace chartIt 2nd segment   pace chart
It 2nd segment pace chart
 
IT 1st segment Traditional pace chart
IT 1st segment  Traditional pace chartIT 1st segment  Traditional pace chart
IT 1st segment Traditional pace chart
 
Acbsi pacing chart 2nd semester -14-15
Acbsi pacing chart   2nd semester -14-15Acbsi pacing chart   2nd semester -14-15
Acbsi pacing chart 2nd semester -14-15
 
Segment 1 exam review ppt
Segment 1   exam review pptSegment 1   exam review ppt
Segment 1 exam review ppt
 
Pace chart 1st segment - traditional - ccc
Pace chart   1st segment - traditional - cccPace chart   1st segment - traditional - ccc
Pace chart 1st segment - traditional - ccc
 
Pace chart 2nd segment - computing for college and careers
Pace chart   2nd segment - computing for college and careersPace chart   2nd segment - computing for college and careers
Pace chart 2nd segment - computing for college and careers
 
Acbsi orientation ppt
Acbsi   orientation pptAcbsi   orientation ppt
Acbsi orientation ppt
 
Acbsi ppt - project 1 sample
Acbsi   ppt - project 1 sampleAcbsi   ppt - project 1 sample
Acbsi ppt - project 1 sample
 
Html assignment 2 template
Html assignment 2 templateHtml assignment 2 template
Html assignment 2 template
 
ACBSI Syllabus - Sheridan
ACBSI Syllabus - SheridanACBSI Syllabus - Sheridan
ACBSI Syllabus - Sheridan
 
Acbsi syllabus - Wadsworth
Acbsi syllabus - WadsworthAcbsi syllabus - Wadsworth
Acbsi syllabus - Wadsworth
 
Aup lesson for vll students
Aup lesson for vll studentsAup lesson for vll students
Aup lesson for vll students
 
What is a will
What is a willWhat is a will
What is a will
 
Odysseyware Orientation - Wadsworth
Odysseyware Orientation   - WadsworthOdysseyware Orientation   - Wadsworth
Odysseyware Orientation - Wadsworth
 
Unit 12 sec 2-programming design
Unit 12 sec 2-programming designUnit 12 sec 2-programming design
Unit 12 sec 2-programming design
 
Unit 12 section 1 - computer programming
Unit 12   section 1 - computer programmingUnit 12   section 1 - computer programming
Unit 12 section 1 - computer programming
 
Sam2010 getting started ppt
Sam2010 getting started pptSam2010 getting started ppt
Sam2010 getting started ppt
 
Cbs welcome to week 1 ppt
Cbs   welcome to week 1 pptCbs   welcome to week 1 ppt
Cbs welcome to week 1 ppt
 
Aup study guide for ppt pdf
Aup study guide for ppt  pdfAup study guide for ppt  pdf
Aup study guide for ppt pdf
 

Aceptable use policy user guidelines

  • 1. USER GUIDELINES: Internet access is coordinated through a complex association of government agencies and regional and state networks. It is the school district’s intent that the Internet and our telecommunications network be used in a responsible, efficient, ethical and legal manner. The operation of the Internet relies heavily on the proper conduct of the users who must adhere to strict guidelines. If a district user violates any of these provisions, their account will be terminated and future access will be denied. In addition, serious violations may result in school disciplinary action or legal action in accordance with Clay County policies, up to and including termination of employment. A signature(s) on the Code of Conduct indicates that the user(s) have read the terms and conditions carefully and understand their significance. I. Acceptable Use: The use of your account must be in support of education and research that is consistent with the educational goals and policies of the Clay County District Schools. Users are encouraged to develop uses which meet their individual needs and that take advantage of the network’s functions: electronic mail, conferences, bulletin boards, databases and access to the Internet. Use of any other network or computing resources must be consistent with the rules appropriate to that network. II. Privileges: The use of Internet is a privilege. Inappropriate use will result in the cancellation of that privilege. Each individual who accepts an account will receive information pertaining to the proper use of the network. School and district administrators will decide what inappropriate use is. III. “Netiquette”: You are expected to abide by the generally accepted rules of network etiquette. Be polite. Do not use vulgar or obscene language. Do not reveal your address or phone number or those of others. Please remember that electronic mail is not guaranteed to be private. Do not disrupt the network, the data, or other users. IV. Unacceptable Uses of Network Include: A. Violating student or staff rights to privacy; or violating provisions of the Florida K-20 Education Code, FERPA, or HIPPA; B. Using the Internet without application of common sense; C. Using profanity, obscenity, or other language which may be offensive to another user; including bullying; D. Sending or accessing pornographic text and/or graphics; E. Accessing unauthorized games; F. Engaging in illegal activities (defined as a violation of local, state, and/or federal laws.) G. Sending or receiving copyrighted materials, including computer software or material protected by trade secret, without permission; H. Plagiarizing; I. Reporting personal communications without the author’s prior consent; J. Using the network for commercial activities, product advertisement, or financial gain; K. Knowingly transmitting viruses or other destructive programming; L. Transmitting spam or chain letters; M. Unauthorized soliciting for goods and services, including personal solicitations such as garage sale announcements; N. Posting personal views on social, political, religious or other non-business related matters; O. Unauthorized streaming of video or music, such as listening to radio stations via the Internet. I have read and understand the User Guidelines listed above:
  • 2. PRINT YOUR FIRST AND LAST NAME: ________________________________________ ________________________________________ ____________________________ Student’s Signature Date