SlideShare a Scribd company logo
1 of 21
Acceptable Use Policy (AUP)
What does it actually say?
Why is it necessary?
Acceptable Use Policy
 “AUP”
 Signed by you and your parent
 District-wide policy
… responsibility for appropriate
use
With the use of electronic networks, including both
the Internet and the Intranet, the Humble Independent
School District is expanding learning access for
students, staff, parents and the entire Humble ISD
community. With this opportunity comes the
responsibility for appropriate use.
…responsible, ethical and legal
manner
Humble ISD users are expected to act in a
responsible, ethical and legal manner, in
accordance with the missions and purposes of the
networks they use on the Internet and with the
laws of Texas and the United States.
…authorized individuals only
School computer systems are for use by
authorized individuals only. Any
unauthorized access to these systems is
prohibited and is subject to criminal and
civil penalties.
Transmitting material in violation
... is prohibited
•illegal activity
•violating software copyright
•degrading or disrupting equipment or system performance
•vandalizing the data of another user
•wastefully using finite resources
•gaining unauthorized access to resources or entities
•invading the privacy of individuals
•using an account owned by another user without authorization
•intentionally transmitting viruses
•installing software onto computers
... use moral and ethical guidelines ...
regarding network use.
Students are expected to use moral and ethical
guidelines in making appropriate decisions
regarding network use. Use of the district network
is not a right, but a privilege, and inappropriate
use will result in cancellation of that privilege.
School and district administrators will decide
what is inappropriate use on the network and their
decision is final. Violations will be dealt with in
accordance with the Humble ISD Student Code of
Conduct policy.
… a security risk will be denied
access ...
Security is a high priority due to the number of users.
Identified security problems should be reported to a
system administrator or appropriate teacher immediately
and not shared with other users. Attempts to log on as
another user may result in cancellation of user privileges.
Any user identified as a security risk will be denied
access to the system.
Vandalism will result in cancellation
of user privileges
Vandalism is defined as any deliberate attempt to
harm or destroy data or property of another user, the
Internet/Intranet, or other networks. This includes
the creation of or the uploading of computer viruses
to the Internet/Intranet or host site. Vandalism will
result in cancellation of user privileges.
installation of any program … must
be approved...
Use of computer software is governed by copyright
laws and network configurations. Care must be taken
to avoid copyright violations and disruptions of the
network related to incompatible or corrupted
software; therefore, installation of any program or
application onto any computer with access to the
Humble ISD electronic network must be approved by
the Superintendent or his designees.
Handout: Definitions of Computer Violations
Definitions of Computer Violations
•Inappropriate Use of the Computer
•Instant Messaging
•MP3 Files
•Downloading
•Sharing Log-in (Username and/or Password)
•Games/Web sites not Curriculum Related
•E-mail
Inappropriate Use of the Computer
 Definition
Includes any file sharing
program and/or viewing
any site containing
pornography, extreme
violence, drugs, or
weapons
 Justification
Inappropriate use of the
network, non-academic,
allows students to share
files, network security
(allows outside access
to our network files)
Instant Messaging
 Definition
The use of any Internet-
based chat program
 Justification
Non-academic, network
security, student safety,
district/campus liability
MP3 Files
 Definition
Downloading, saving, or
listening to MP3 files,
unless instructed to do
so
 Justification
Copyright violation, takes
up campus server
space
Downloading
 Definition
Saving or installing an
executable program to
the computer
 Justification
Takes up campus server
space, network security,
non-academic,
district/campus liability
Sharing Log-in
(Username and/or Password)
 Definition
Giving another student
access to your
computer account
 Justification
Student accountability,
accessing of other
student folders can lead
to cheating and
destruction of student
files
Games/Web sites not Curriculum
Related
 Definition
Viewing any site or playing
a game that you were
not instructed to
 Justification
Non-academic, misuse of
system resources
E-mail
 Definition
The use of any Internet-
based mail program
unless instructed and
supervised by a teacher
 Justification
Non-academic, network
security, district/campus
liability, student safety
Signatures Required
I have read and understand these computer
violations. I also understand that an infraction
of these will result in a disciplinary
consequence by an Assistant Principal.
Student Signature:
_________________________________
Parent Signature:
________________________________
AUP.ppt

More Related Content

Similar to AUP.ppt

Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreementPaula Naugle
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditTamir Harper
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 Bjboulanger
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Paula Naugle
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]ajdredla
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]ajdredla
 
Security
SecuritySecurity
SecurityNabatah
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 

Similar to AUP.ppt (20)

Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
TUA Overview
TUA OverviewTUA Overview
TUA Overview
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]
 
Chapter8
Chapter8Chapter8
Chapter8
 
Security
SecuritySecurity
Security
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Responsible Use Presentation
Responsible Use PresentationResponsible Use Presentation
Responsible Use Presentation
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 

Recently uploaded

Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election CampaignN Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaignanjanibaddipudi1
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationReyMonsales
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Axel Bruns
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Ismail Fahmi
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
Chandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfChandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfauroraaudrey4826
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 

Recently uploaded (16)

Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election CampaignN Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and information
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
Chandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfChandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdf
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 

AUP.ppt

  • 1. Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
  • 2. Acceptable Use Policy  “AUP”  Signed by you and your parent  District-wide policy
  • 3. … responsibility for appropriate use With the use of electronic networks, including both the Internet and the Intranet, the Humble Independent School District is expanding learning access for students, staff, parents and the entire Humble ISD community. With this opportunity comes the responsibility for appropriate use.
  • 4. …responsible, ethical and legal manner Humble ISD users are expected to act in a responsible, ethical and legal manner, in accordance with the missions and purposes of the networks they use on the Internet and with the laws of Texas and the United States.
  • 5. …authorized individuals only School computer systems are for use by authorized individuals only. Any unauthorized access to these systems is prohibited and is subject to criminal and civil penalties.
  • 6. Transmitting material in violation ... is prohibited •illegal activity •violating software copyright •degrading or disrupting equipment or system performance •vandalizing the data of another user •wastefully using finite resources •gaining unauthorized access to resources or entities •invading the privacy of individuals •using an account owned by another user without authorization •intentionally transmitting viruses •installing software onto computers
  • 7. ... use moral and ethical guidelines ... regarding network use. Students are expected to use moral and ethical guidelines in making appropriate decisions regarding network use. Use of the district network is not a right, but a privilege, and inappropriate use will result in cancellation of that privilege. School and district administrators will decide what is inappropriate use on the network and their decision is final. Violations will be dealt with in accordance with the Humble ISD Student Code of Conduct policy.
  • 8. … a security risk will be denied access ... Security is a high priority due to the number of users. Identified security problems should be reported to a system administrator or appropriate teacher immediately and not shared with other users. Attempts to log on as another user may result in cancellation of user privileges. Any user identified as a security risk will be denied access to the system.
  • 9. Vandalism will result in cancellation of user privileges Vandalism is defined as any deliberate attempt to harm or destroy data or property of another user, the Internet/Intranet, or other networks. This includes the creation of or the uploading of computer viruses to the Internet/Intranet or host site. Vandalism will result in cancellation of user privileges.
  • 10. installation of any program … must be approved... Use of computer software is governed by copyright laws and network configurations. Care must be taken to avoid copyright violations and disruptions of the network related to incompatible or corrupted software; therefore, installation of any program or application onto any computer with access to the Humble ISD electronic network must be approved by the Superintendent or his designees.
  • 11. Handout: Definitions of Computer Violations
  • 12. Definitions of Computer Violations •Inappropriate Use of the Computer •Instant Messaging •MP3 Files •Downloading •Sharing Log-in (Username and/or Password) •Games/Web sites not Curriculum Related •E-mail
  • 13. Inappropriate Use of the Computer  Definition Includes any file sharing program and/or viewing any site containing pornography, extreme violence, drugs, or weapons  Justification Inappropriate use of the network, non-academic, allows students to share files, network security (allows outside access to our network files)
  • 14. Instant Messaging  Definition The use of any Internet- based chat program  Justification Non-academic, network security, student safety, district/campus liability
  • 15. MP3 Files  Definition Downloading, saving, or listening to MP3 files, unless instructed to do so  Justification Copyright violation, takes up campus server space
  • 16. Downloading  Definition Saving or installing an executable program to the computer  Justification Takes up campus server space, network security, non-academic, district/campus liability
  • 17. Sharing Log-in (Username and/or Password)  Definition Giving another student access to your computer account  Justification Student accountability, accessing of other student folders can lead to cheating and destruction of student files
  • 18. Games/Web sites not Curriculum Related  Definition Viewing any site or playing a game that you were not instructed to  Justification Non-academic, misuse of system resources
  • 19. E-mail  Definition The use of any Internet- based mail program unless instructed and supervised by a teacher  Justification Non-academic, network security, district/campus liability, student safety
  • 20. Signatures Required I have read and understand these computer violations. I also understand that an infraction of these will result in a disciplinary consequence by an Assistant Principal. Student Signature: _________________________________ Parent Signature: ________________________________