SlideShare a Scribd company logo
1 of 3
Download to read offline
Acceptable Use Policy
ACA provides students and employees with extensive technology resources, including computing facilities,
local area networks, Internet access, and e-mail addresses. Our goal is to promote educational excellence by
facilitating resource sharing, innovation and communication within our own community and around the world.
As a member of the ACA community, I agree to follow School rules and commit to the School’s values. To
maintain these values as related to technology, we must all agree to support the needs of the School
community even if they may conflict with one’s personal desires.
ACA Technology Ownership
• ACA owns all systems, software, and e-mail addresses. Content created with the School’s technology tools
and saved on the School network is the property of the School.
• Computer resources at ACA are a limited resource and are reserved for educational and school-related
business.
• If I leave the School community, I may take copies of anything I have created. However, this content can
continue to be used by the School for educational purposes.
My Use of School Computing Resources
• I will help to create a positive atmosphere by allowing those engaged in academic work priority use of the
computers.
• I will respect the work and privacy of others throughout the ACA network.
• I will use my applications, e-mail accounts, and ACA network space appropriately for school-related
activities.
• I will not save or install files and/or software on School equipment without the authorization of a teacher or
the network administrators.
• I will not use ACA technology resources for commercial activity, for seeking monetary gain, or for political
purposes.
System Security
• I will log on to the network only as myself.
• I am responsible for my individual account and will take all reasonable precautions to prevent others from
being able to use my account.
• I will immediately notify a faculty or staff member if I have identified a possible security problem.
• I will not intentionally introduce a virus or other harmful code anywhere on the ACA network, and I will
make an effort to keep my home computer free from viruses and other destructive materials. If my files are
accidentally infected, I will seek help from a member of the technology staff.
• I know that any electronic devices brought on this campus are subject to search without notice or warning. I
will refrain from using any device or software that masks my use of the school resources. This includes but is
not limited to anonymizers and any application or hardware device that circumvents network security, logging,
or tracking procedures.
Use of ACA Content or School Information on Non-ACA Websites
• Content about ACA anywhere on the World Wide Web should observe all aspects of the School’s Acceptable
Use Policy.
• Official School files or documents are not to be posted on non-ACA sites.
• Individuals who post content on World Wide Web sites away from ACA should not present content as if it
represents any official views of ACA.
• The official ACA website represents the School. No representation of ACA should be made on any other
website.
Intellectual Property and Privacy
• I will not copy or transfer any copyrighted software to or from computers on the ACA School network
without the permission of the technology staff in my building. This includes but is not limited to web browsers,
MP3 players, and games.STUDENT HANDBOOK
• I will not plagiarize words or phrases that I find in books, on the Internet, on CD ROMs, or on other online
resources.
• I will respect the rights of copyright owners, including those who have created music, images, video,
software, etc.
• I should have no expectation of privacy when I use on-line resources since materials are owned by the site
and can be redistributed without an author’s permission. I should check each site’s privacy and security
policies carefully before posting or adding content I may not wished viewed by others presently or in the
future.
• I will not repost a message sent to me privately without the permission of the person who sent the message.
• I will not post private or false information about another person.
Inappropriate Language and Harassment
• I will not use obscene, profane, lewd, vulgar, rude, inflammatory, threatening, or disrespectful language on
any and all uses of computers at ACA, whether in public or private messages.
• I will not post information that could cause danger or disruption or engage in personal attacks, including
prejudicial or discriminatory attacks.
I understand the following:
• I continuously represent ACA whenever and wherever I use school computing resources, even if I am using
these resources away from or outside of the School’s network.
• I may be held responsible for any on-line behavior or content that connects me to the School or implicates the
School in that behavior.
• If I knowingly enable others to violate these rules, I may lose my School network, email, or World Wide
Web access.
• ACA has software and systems in place that monitors and records all activities and traffic on the School
computing resources. I should expect only limited privacy in the contents of my personal files on the School
network.
• Tampering with ACA technology tools or another person’s work is unacceptable, and I could lose all rights
to use computers at the School, including my user account and network access.
• Violations of the ACA policy including social media policy and AUP are subject to disciplinary action
ranging from loss of computing privileges up to and including suspension and/or expulsion (or termination for
employees).
• ACA makes no guarantee that the services provided will be error-free or without defect. The School will not
be responsible for any damage suffered including, but not limited to, loss of data or disruption of service.
Parent Permission Form and User Agreement
I have read, understood, explained, and discussed the Acceptable Use Policy to my student.
Student’s Name ________________________________________________________________
Date________________
Name of Parent/Guardian
_____________________________________________________________________________
I have read the Acceptable Use Policy and discussed it with my parent(s)/guardian(s).
Student’s Full Name ____________________________________________________________
Date________________

More Related Content

What's hot

Security
SecuritySecurity
SecurityNabatah
 
Williamsburg school internet policy
Williamsburg school internet policyWilliamsburg school internet policy
Williamsburg school internet policydsansford
 
Bs rua
Bs ruaBs rua
Bs ruaRoss
 
Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6RochelleStansfield
 
Privacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalPrivacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalthsieh
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet SafetyCharina Mostierra
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2Ira Sagu
 
Staff training session
Staff training sessionStaff training session
Staff training sessionmander5208
 
E behaviour code brochure english
E behaviour code brochure englishE behaviour code brochure english
E behaviour code brochure englishThinkB4UClick
 
Internet safety pd boot camp 13 14
Internet safety pd boot camp 13 14Internet safety pd boot camp 13 14
Internet safety pd boot camp 13 14Marsha Harris
 
Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyRica Young
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPSJeanette Murphy
 

What's hot (19)

Technology acceptable use policy gr 7 day 1
Technology acceptable use policy   gr 7 day 1Technology acceptable use policy   gr 7 day 1
Technology acceptable use policy gr 7 day 1
 
Security
SecuritySecurity
Security
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
Williamsburg school internet policy
Williamsburg school internet policyWilliamsburg school internet policy
Williamsburg school internet policy
 
Bs rua
Bs ruaBs rua
Bs rua
 
Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6
 
Privacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalPrivacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation final
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Laptop Training Revised
Laptop Training RevisedLaptop Training Revised
Laptop Training Revised
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
E behaviour code brochure english
E behaviour code brochure englishE behaviour code brochure english
E behaviour code brochure english
 
AUP Student Edition 2011
AUP Student Edition 2011AUP Student Edition 2011
AUP Student Edition 2011
 
Internet safety pd boot camp 13 14
Internet safety pd boot camp 13 14Internet safety pd boot camp 13 14
Internet safety pd boot camp 13 14
 
Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational Technology
 
Computer Rules
Computer RulesComputer Rules
Computer Rules
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPS
 

Viewers also liked

0724 從業人員衛生觀念之建立-prezi
0724 從業人員衛生觀念之建立-prezi0724 從業人員衛生觀念之建立-prezi
0724 從業人員衛生觀念之建立-prezijaijaan
 
Gestion basica (1) pao
Gestion basica (1) paoGestion basica (1) pao
Gestion basica (1) paopaosolro
 
Gestion basica (1) pao
Gestion basica (1) paoGestion basica (1) pao
Gestion basica (1) paopaosolro
 
Pair of the year concept presentation
Pair of the year concept presentationPair of the year concept presentation
Pair of the year concept presentationMrunmayi15
 
Hair by yasminho
Hair by yasminhoHair by yasminho
Hair by yasminhoyasminho
 
Inner-Outer Circle Discussion - Literary Analysis
Inner-Outer Circle Discussion - Literary AnalysisInner-Outer Circle Discussion - Literary Analysis
Inner-Outer Circle Discussion - Literary AnalysisKoolteechatechnology
 
Summer Internship Report
Summer Internship ReportSummer Internship Report
Summer Internship ReportHardik Shah
 
Smart Google Searching - Lesson One: Picking the Right Search Terms
Smart Google Searching - Lesson One: Picking the Right Search TermsSmart Google Searching - Lesson One: Picking the Right Search Terms
Smart Google Searching - Lesson One: Picking the Right Search TermsKoolteechatechnology
 
Financial analysis of Adani Enterprises
Financial analysis of Adani EnterprisesFinancial analysis of Adani Enterprises
Financial analysis of Adani EnterprisesHardik Shah
 
Accounting standard 23
Accounting standard 23Accounting standard 23
Accounting standard 23Hardik Shah
 
THE MAIN DIFFERENCE BETWEEN JOB COSTING AND PROCESS COSTING IS THAT IN JOB CO...
THE MAIN DIFFERENCE BETWEEN JOB COSTING AND PROCESS COSTING IS THAT IN JOB CO...THE MAIN DIFFERENCE BETWEEN JOB COSTING AND PROCESS COSTING IS THAT IN JOB CO...
THE MAIN DIFFERENCE BETWEEN JOB COSTING AND PROCESS COSTING IS THAT IN JOB CO...Hardik Shah
 
A Research on Impact of Television Commercial on the Youth upon purchasing be...
A Research on Impact of Television Commercial on the Youth upon purchasing be...A Research on Impact of Television Commercial on the Youth upon purchasing be...
A Research on Impact of Television Commercial on the Youth upon purchasing be...Hardik Shah
 

Viewers also liked (14)

0724 從業人員衛生觀念之建立-prezi
0724 從業人員衛生觀念之建立-prezi0724 從業人員衛生觀念之建立-prezi
0724 從業人員衛生觀念之建立-prezi
 
Gestion basica (1) pao
Gestion basica (1) paoGestion basica (1) pao
Gestion basica (1) pao
 
Gestion basica (1) pao
Gestion basica (1) paoGestion basica (1) pao
Gestion basica (1) pao
 
Tableclinic
TableclinicTableclinic
Tableclinic
 
Pair of the year concept presentation
Pair of the year concept presentationPair of the year concept presentation
Pair of the year concept presentation
 
Hair by yasminho
Hair by yasminhoHair by yasminho
Hair by yasminho
 
Inner-Outer Circle Discussion - Literary Analysis
Inner-Outer Circle Discussion - Literary AnalysisInner-Outer Circle Discussion - Literary Analysis
Inner-Outer Circle Discussion - Literary Analysis
 
Summer Internship Report
Summer Internship ReportSummer Internship Report
Summer Internship Report
 
Smart Google Searching - Lesson One: Picking the Right Search Terms
Smart Google Searching - Lesson One: Picking the Right Search TermsSmart Google Searching - Lesson One: Picking the Right Search Terms
Smart Google Searching - Lesson One: Picking the Right Search Terms
 
Financial analysis of Adani Enterprises
Financial analysis of Adani EnterprisesFinancial analysis of Adani Enterprises
Financial analysis of Adani Enterprises
 
Linux
LinuxLinux
Linux
 
Accounting standard 23
Accounting standard 23Accounting standard 23
Accounting standard 23
 
THE MAIN DIFFERENCE BETWEEN JOB COSTING AND PROCESS COSTING IS THAT IN JOB CO...
THE MAIN DIFFERENCE BETWEEN JOB COSTING AND PROCESS COSTING IS THAT IN JOB CO...THE MAIN DIFFERENCE BETWEEN JOB COSTING AND PROCESS COSTING IS THAT IN JOB CO...
THE MAIN DIFFERENCE BETWEEN JOB COSTING AND PROCESS COSTING IS THAT IN JOB CO...
 
A Research on Impact of Television Commercial on the Youth upon purchasing be...
A Research on Impact of Television Commercial on the Youth upon purchasing be...A Research on Impact of Television Commercial on the Youth upon purchasing be...
A Research on Impact of Television Commercial on the Youth upon purchasing be...
 

Similar to Arlington Classics Academy - Acceptable Use Policy

Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conductsupunls
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]Debbie Oliver
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentationCarl Hooker
 
Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Matthew Rathbun
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policyiamprosperous
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreementPaula Naugle
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kittrtkaren
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyangelabulloch
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use PolicyBarb Jansen
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Paula Naugle
 
Et5083 module 3 application ppt
Et5083 module 3 application pptEt5083 module 3 application ppt
Et5083 module 3 application pptswahl123
 
Ethics and Computer Responsibilities
Ethics and Computer ResponsibilitiesEthics and Computer Responsibilities
Ethics and Computer Responsibilitiesburnsc62
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureThe Pathway Group
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educatorsjessa_delingon
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETYSairam
 

Similar to Arlington Classics Academy - Acceptable Use Policy (20)

Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conduct
 
Acceptable Use Agreement Students 2011
Acceptable Use Agreement Students 2011Acceptable Use Agreement Students 2011
Acceptable Use Agreement Students 2011
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentation
 
Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Agreement for Use of Technology for Families
Agreement for Use of Technology for Families
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kit
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
Et5083 module 3 application ppt
Et5083 module 3 application pptEt5083 module 3 application ppt
Et5083 module 3 application ppt
 
Ethics and Computer Responsibilities
Ethics and Computer ResponsibilitiesEthics and Computer Responsibilities
Ethics and Computer Responsibilities
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETY
 

Recently uploaded

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

Arlington Classics Academy - Acceptable Use Policy

  • 1. Acceptable Use Policy ACA provides students and employees with extensive technology resources, including computing facilities, local area networks, Internet access, and e-mail addresses. Our goal is to promote educational excellence by facilitating resource sharing, innovation and communication within our own community and around the world. As a member of the ACA community, I agree to follow School rules and commit to the School’s values. To maintain these values as related to technology, we must all agree to support the needs of the School community even if they may conflict with one’s personal desires. ACA Technology Ownership • ACA owns all systems, software, and e-mail addresses. Content created with the School’s technology tools and saved on the School network is the property of the School. • Computer resources at ACA are a limited resource and are reserved for educational and school-related business. • If I leave the School community, I may take copies of anything I have created. However, this content can continue to be used by the School for educational purposes. My Use of School Computing Resources • I will help to create a positive atmosphere by allowing those engaged in academic work priority use of the computers. • I will respect the work and privacy of others throughout the ACA network. • I will use my applications, e-mail accounts, and ACA network space appropriately for school-related activities. • I will not save or install files and/or software on School equipment without the authorization of a teacher or the network administrators. • I will not use ACA technology resources for commercial activity, for seeking monetary gain, or for political purposes. System Security
  • 2. • I will log on to the network only as myself. • I am responsible for my individual account and will take all reasonable precautions to prevent others from being able to use my account. • I will immediately notify a faculty or staff member if I have identified a possible security problem. • I will not intentionally introduce a virus or other harmful code anywhere on the ACA network, and I will make an effort to keep my home computer free from viruses and other destructive materials. If my files are accidentally infected, I will seek help from a member of the technology staff. • I know that any electronic devices brought on this campus are subject to search without notice or warning. I will refrain from using any device or software that masks my use of the school resources. This includes but is not limited to anonymizers and any application or hardware device that circumvents network security, logging, or tracking procedures. Use of ACA Content or School Information on Non-ACA Websites • Content about ACA anywhere on the World Wide Web should observe all aspects of the School’s Acceptable Use Policy. • Official School files or documents are not to be posted on non-ACA sites. • Individuals who post content on World Wide Web sites away from ACA should not present content as if it represents any official views of ACA. • The official ACA website represents the School. No representation of ACA should be made on any other website. Intellectual Property and Privacy • I will not copy or transfer any copyrighted software to or from computers on the ACA School network without the permission of the technology staff in my building. This includes but is not limited to web browsers, MP3 players, and games.STUDENT HANDBOOK • I will not plagiarize words or phrases that I find in books, on the Internet, on CD ROMs, or on other online resources. • I will respect the rights of copyright owners, including those who have created music, images, video, software, etc. • I should have no expectation of privacy when I use on-line resources since materials are owned by the site and can be redistributed without an author’s permission. I should check each site’s privacy and security policies carefully before posting or adding content I may not wished viewed by others presently or in the future. • I will not repost a message sent to me privately without the permission of the person who sent the message.
  • 3. • I will not post private or false information about another person. Inappropriate Language and Harassment • I will not use obscene, profane, lewd, vulgar, rude, inflammatory, threatening, or disrespectful language on any and all uses of computers at ACA, whether in public or private messages. • I will not post information that could cause danger or disruption or engage in personal attacks, including prejudicial or discriminatory attacks. I understand the following: • I continuously represent ACA whenever and wherever I use school computing resources, even if I am using these resources away from or outside of the School’s network. • I may be held responsible for any on-line behavior or content that connects me to the School or implicates the School in that behavior. • If I knowingly enable others to violate these rules, I may lose my School network, email, or World Wide Web access. • ACA has software and systems in place that monitors and records all activities and traffic on the School computing resources. I should expect only limited privacy in the contents of my personal files on the School network. • Tampering with ACA technology tools or another person’s work is unacceptable, and I could lose all rights to use computers at the School, including my user account and network access. • Violations of the ACA policy including social media policy and AUP are subject to disciplinary action ranging from loss of computing privileges up to and including suspension and/or expulsion (or termination for employees). • ACA makes no guarantee that the services provided will be error-free or without defect. The School will not be responsible for any damage suffered including, but not limited to, loss of data or disruption of service. Parent Permission Form and User Agreement I have read, understood, explained, and discussed the Acceptable Use Policy to my student. Student’s Name ________________________________________________________________ Date________________ Name of Parent/Guardian _____________________________________________________________________________ I have read the Acceptable Use Policy and discussed it with my parent(s)/guardian(s). Student’s Full Name ____________________________________________________________ Date________________