SlideShare a Scribd company logo
Diocese of Wilmington Catholic Schools
Acceptable Use of Technology Agreement
Access to technology is integral to the educational mission and purpose of our institution. These policies
address the appropriate use of technology provided by the school and personally owned technological
devices. This Technology Agreement is an abbreviation of full policies. For full policies, please refer to the
Catholic Schools Office Acceptable Use of Technology: Student Edition.

    •   We expect our students to act responsibly and thoughtfully when using technology.

    •   Students should not expect that what they write or publish online is private. The school reserves the
        right to monitor and track all behaviors and interactions that take place online or through the use
        of technology on our property or at our events.

    •   The use of all school-owned technologies including the school network and its Internet connection
        is limited to educational purposes.

    •   Commercial and recreational use of school technology resources is prohibited.

    •   Recreational use of the school technology is prohibited.

    •   All emails sent from school provided accounts are representative of the school.

    •   Connection to wireless Internet by students is prohibited unless otherwise directed/instructed.

    •   Students are responsible for any activity that occurs through their personal account.

    •   Students must respect the privacy of others.
            o Do not intentionally seek information on, obtain copies of, or modify files, other data, or
                passwords belonging to others.
            o Do not misrepresent or assume the identity of others.
            o Do not re-post information that was sent to you privately without the permission of the
                person who sent you the information.
            o Do not post private information about another person.
            o Do not post photos or videos of others without prior permission.
            o Do not use another person’s account. If you have been given an account with special
                privileges, do not use that account outside of the terms with which you were given access
                to that account.

    •   Do not voluntarily post private information about yourself online, including your name, your age,
        your school name, your address, your phone number, or other identifying information.

    •   Our institution prides itself on its reputation for excellence; therefore, you may not use the school’s
        name, logo, mascot or other likeness or representation on a non-school website without express
        permission from legitimate authority.

    •   Students may not initiate electronic communication with teachers, adult leaders in ministry, or
        administrators.

    •   Personal Technology Devices (PTDs) are for use only during an actual lock down and as instructed
        by emergency or parish/school personnel.

    •   Never use devices capable of capturing, transmitting, or storing images or recordings to record
        others without the expressed permission of the person(s) being recorded (including adult leaders
        and other young people). Such recording devices may never be accessed, turned on or operated
        in restrooms, sleeping areas, dressing rooms, or other areas where there is a reasonable
        expectation of privacy. Teachers or school personnel reserve the right to confiscate, collect, and
        inspect any PTD in accord with written policies.
•   Social networking websites, profiles, or accounts, may not be accessed through the school’s
        technology at any time. Students may not create social networking pages, accounts, sites, or
        groups that impersonate or misrepresent any individual.

    •   Students may not access material that is offensive, profane, or obscene including pornography
        and hate literature.

    •   Inappropriate communication is prohibited in any public messages, private messages, and
        material posted online by students.

    •   Students may not utilize any technology to harass, demean, humiliate, intimidate, embarrass, or
        annoy any individual.

    •   Unless explicit permission is granted by legitimate authority, students are not allowed to bring iPods,
        MP3 players, CD players, DVD players, or other similar data-accessing devices, or personal video
        game systems onto school property or to school events.

    •   International websites may only be accessed from school owned technology under the direction
        of legitimate authority.

    •   All students are expected to maintain academic honesty.

    •   All access to the Internet is filtered and monitored.

    •   Unless legitimate authority grants explicit permission, students are not allowed to alter, change,
        modify, repair, or reconfigure settings on school-owned computers. This includes downloading,
        adding, or installing new programs, software, or hardware.

    •   If you accidentally access inappropriate information or if someone sends you inappropriate
        information, you should immediately tell a staff member or teacher.

    •   If you witness someone else either deliberately or accidentally access inappropriate information or
        use technology in a way that violates this policy, you must report the incident as soon as possible.

    •   The school retains the right to suspend service, accounts, and access to data, including student
        files and any other stored data.

    •   The school is not responsible for any damages students may suffer, including but not limited to, loss
        of data or interruptions of service.

My child and I have read, understand, and he/she will follow all rules, regulations, and policies as outlined
in the Acceptable Use of Technology Policy. I/my child further understands that any violation of the policies
is unethical and may constitute a criminal offense. Should I/my child commit any violation of the policy, we
understand and agree that his/her access privileges may be revoked and discipline action and/or legal
action may be taken.

Signature of Parent/Guardian                                          Date




Signature of Student                                                  Date

More Related Content

Viewers also liked

Math requirements2012
Math requirements2012Math requirements2012
Math requirements2012
St. Mary Magdalen School
 
О факультете внебюджетной подготовки СЮИ ФСИН России
О факультете внебюджетной подготовки СЮИ ФСИН РоссииО факультете внебюджетной подготовки СЮИ ФСИН России
О факультете внебюджетной подготовки СЮИ ФСИН РоссииМихаил Мысин
 
Civil warsoldierletter8th
Civil warsoldierletter8thCivil warsoldierletter8th
Civil warsoldierletter8th
St. Mary Magdalen School
 
Guidelines for Holocaust Paper
Guidelines for Holocaust PaperGuidelines for Holocaust Paper
Guidelines for Holocaust Paper
St. Mary Magdalen School
 
Adding and subtracting matrices
Adding and subtracting matricesAdding and subtracting matrices
Adding and subtracting matrices
St. Mary Magdalen School
 
AUP Student Edition 2011
AUP Student Edition 2011AUP Student Edition 2011
AUP Student Edition 2011
St. Mary Magdalen School
 
Milk difference
Milk differenceMilk difference
Milk difference
St. Mary Magdalen School
 
Library curricula 2011 arranged by grade
Library curricula 2011 arranged by gradeLibrary curricula 2011 arranged by grade
Library curricula 2011 arranged by grade
St. Mary Magdalen School
 

Viewers also liked (8)

Math requirements2012
Math requirements2012Math requirements2012
Math requirements2012
 
О факультете внебюджетной подготовки СЮИ ФСИН России
О факультете внебюджетной подготовки СЮИ ФСИН РоссииО факультете внебюджетной подготовки СЮИ ФСИН России
О факультете внебюджетной подготовки СЮИ ФСИН России
 
Civil warsoldierletter8th
Civil warsoldierletter8thCivil warsoldierletter8th
Civil warsoldierletter8th
 
Guidelines for Holocaust Paper
Guidelines for Holocaust PaperGuidelines for Holocaust Paper
Guidelines for Holocaust Paper
 
Adding and subtracting matrices
Adding and subtracting matricesAdding and subtracting matrices
Adding and subtracting matrices
 
AUP Student Edition 2011
AUP Student Edition 2011AUP Student Edition 2011
AUP Student Edition 2011
 
Milk difference
Milk differenceMilk difference
Milk difference
 
Library curricula 2011 arranged by grade
Library curricula 2011 arranged by gradeLibrary curricula 2011 arranged by grade
Library curricula 2011 arranged by grade
 

Similar to Acceptable Use Agreement Students 2011

Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Agreement for Use of Technology for Families
Agreement for Use of Technology for Families
Matthew Rathbun
 
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptxSocial Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
JPAballe
 
Social media policy
Social media policySocial media policy
Social media policy
Har1982
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
Koolteechatechnology
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
jsmarr11
 
CES BYOT Agreement
CES BYOT AgreementCES BYOT Agreement
CES BYOT Agreement
scottgaglione
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
jsmarr11
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentation
Carl Hooker
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
Barb Jansen
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
collimic
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
iamprosperous
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
Carlos Fernandez
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010
Barb Jansen
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
Paula Naugle
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
Lenva Shearing
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
Diana Benner
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
Tamir Harper
 
ICT Acceptable Use POLICY
ICT Acceptable Use POLICYICT Acceptable Use POLICY
ICT Acceptable Use POLICY
Debbie Oliver
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
Paula Naugle
 

Similar to Acceptable Use Agreement Students 2011 (20)

Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Agreement for Use of Technology for Families
Agreement for Use of Technology for Families
 
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptxSocial Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
 
Social media policy
Social media policySocial media policy
Social media policy
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
CES BYOT Agreement
CES BYOT AgreementCES BYOT Agreement
CES BYOT Agreement
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentation
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
ICT Acceptable Use POLICY
ICT Acceptable Use POLICYICT Acceptable Use POLICY
ICT Acceptable Use POLICY
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 

More from St. Mary Magdalen School

Adding and subtracting matrices
Adding and subtracting matricesAdding and subtracting matrices
Adding and subtracting matrices
St. Mary Magdalen School
 
Adding and subtracting matrices
Adding and subtracting matricesAdding and subtracting matrices
Adding and subtracting matrices
St. Mary Magdalen School
 
Wikispaces for the classroom 2
Wikispaces for the classroom 2Wikispaces for the classroom 2
Wikispaces for the classroom 2
St. Mary Magdalen School
 
Collaborative documents
Collaborative documentsCollaborative documents
Collaborative documents
St. Mary Magdalen School
 
Flipping the classroom
Flipping the classroomFlipping the classroom
Flipping the classroom
St. Mary Magdalen School
 
Dickens and alcott webquest
Dickens and alcott webquestDickens and alcott webquest
Dickens and alcott webquest
St. Mary Magdalen School
 
Invisible web
Invisible webInvisible web
Wikispaces for the classroom
Wikispaces for the classroomWikispaces for the classroom
Wikispaces for the classroom
St. Mary Magdalen School
 
Banned books2010
Banned books2010Banned books2010
Banned books2010
St. Mary Magdalen School
 
Library intro8th
Library intro8thLibrary intro8th
Library intro8th
St. Mary Magdalen School
 
Library intro7th
Library intro7thLibrary intro7th
Library intro7th
St. Mary Magdalen School
 
Library intro8th
Library intro8thLibrary intro8th
Library intro8th
St. Mary Magdalen School
 
Dickens And Alcott Webquest
Dickens And Alcott WebquestDickens And Alcott Webquest
Dickens And Alcott Webquest
St. Mary Magdalen School
 
Directions For Performing Linear Regression
Directions For  Performing  Linear  RegressionDirections For  Performing  Linear  Regression
Directions For Performing Linear Regression
St. Mary Magdalen School
 
Directions For Performing Linear Regression
Directions For Performing Linear RegressionDirections For Performing Linear Regression
Directions For Performing Linear Regression
St. Mary Magdalen School
 
History Questions[1]
History Questions[1]History Questions[1]
History Questions[1]
St. Mary Magdalen School
 
Plagiarism
PlagiarismPlagiarism

More from St. Mary Magdalen School (18)

Adding and subtracting matrices
Adding and subtracting matricesAdding and subtracting matrices
Adding and subtracting matrices
 
Adding and subtracting matrices
Adding and subtracting matricesAdding and subtracting matrices
Adding and subtracting matrices
 
Wikispaces for the classroom 2
Wikispaces for the classroom 2Wikispaces for the classroom 2
Wikispaces for the classroom 2
 
Collaborative documents
Collaborative documentsCollaborative documents
Collaborative documents
 
Flipping the classroom
Flipping the classroomFlipping the classroom
Flipping the classroom
 
Dickens and alcott webquest
Dickens and alcott webquestDickens and alcott webquest
Dickens and alcott webquest
 
Invisible web
Invisible webInvisible web
Invisible web
 
Wikispaces for the classroom
Wikispaces for the classroomWikispaces for the classroom
Wikispaces for the classroom
 
Banned books2010
Banned books2010Banned books2010
Banned books2010
 
Library intro8th
Library intro8thLibrary intro8th
Library intro8th
 
Library intro7th
Library intro7thLibrary intro7th
Library intro7th
 
Library intro8th
Library intro8thLibrary intro8th
Library intro8th
 
8th Gr. Holocaust Paper Rubric
8th Gr. Holocaust Paper Rubric8th Gr. Holocaust Paper Rubric
8th Gr. Holocaust Paper Rubric
 
Dickens And Alcott Webquest
Dickens And Alcott WebquestDickens And Alcott Webquest
Dickens And Alcott Webquest
 
Directions For Performing Linear Regression
Directions For  Performing  Linear  RegressionDirections For  Performing  Linear  Regression
Directions For Performing Linear Regression
 
Directions For Performing Linear Regression
Directions For Performing Linear RegressionDirections For Performing Linear Regression
Directions For Performing Linear Regression
 
History Questions[1]
History Questions[1]History Questions[1]
History Questions[1]
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 

Acceptable Use Agreement Students 2011

  • 1. Diocese of Wilmington Catholic Schools Acceptable Use of Technology Agreement Access to technology is integral to the educational mission and purpose of our institution. These policies address the appropriate use of technology provided by the school and personally owned technological devices. This Technology Agreement is an abbreviation of full policies. For full policies, please refer to the Catholic Schools Office Acceptable Use of Technology: Student Edition. • We expect our students to act responsibly and thoughtfully when using technology. • Students should not expect that what they write or publish online is private. The school reserves the right to monitor and track all behaviors and interactions that take place online or through the use of technology on our property or at our events. • The use of all school-owned technologies including the school network and its Internet connection is limited to educational purposes. • Commercial and recreational use of school technology resources is prohibited. • Recreational use of the school technology is prohibited. • All emails sent from school provided accounts are representative of the school. • Connection to wireless Internet by students is prohibited unless otherwise directed/instructed. • Students are responsible for any activity that occurs through their personal account. • Students must respect the privacy of others. o Do not intentionally seek information on, obtain copies of, or modify files, other data, or passwords belonging to others. o Do not misrepresent or assume the identity of others. o Do not re-post information that was sent to you privately without the permission of the person who sent you the information. o Do not post private information about another person. o Do not post photos or videos of others without prior permission. o Do not use another person’s account. If you have been given an account with special privileges, do not use that account outside of the terms with which you were given access to that account. • Do not voluntarily post private information about yourself online, including your name, your age, your school name, your address, your phone number, or other identifying information. • Our institution prides itself on its reputation for excellence; therefore, you may not use the school’s name, logo, mascot or other likeness or representation on a non-school website without express permission from legitimate authority. • Students may not initiate electronic communication with teachers, adult leaders in ministry, or administrators. • Personal Technology Devices (PTDs) are for use only during an actual lock down and as instructed by emergency or parish/school personnel. • Never use devices capable of capturing, transmitting, or storing images or recordings to record others without the expressed permission of the person(s) being recorded (including adult leaders and other young people). Such recording devices may never be accessed, turned on or operated in restrooms, sleeping areas, dressing rooms, or other areas where there is a reasonable expectation of privacy. Teachers or school personnel reserve the right to confiscate, collect, and inspect any PTD in accord with written policies.
  • 2. Social networking websites, profiles, or accounts, may not be accessed through the school’s technology at any time. Students may not create social networking pages, accounts, sites, or groups that impersonate or misrepresent any individual. • Students may not access material that is offensive, profane, or obscene including pornography and hate literature. • Inappropriate communication is prohibited in any public messages, private messages, and material posted online by students. • Students may not utilize any technology to harass, demean, humiliate, intimidate, embarrass, or annoy any individual. • Unless explicit permission is granted by legitimate authority, students are not allowed to bring iPods, MP3 players, CD players, DVD players, or other similar data-accessing devices, or personal video game systems onto school property or to school events. • International websites may only be accessed from school owned technology under the direction of legitimate authority. • All students are expected to maintain academic honesty. • All access to the Internet is filtered and monitored. • Unless legitimate authority grants explicit permission, students are not allowed to alter, change, modify, repair, or reconfigure settings on school-owned computers. This includes downloading, adding, or installing new programs, software, or hardware. • If you accidentally access inappropriate information or if someone sends you inappropriate information, you should immediately tell a staff member or teacher. • If you witness someone else either deliberately or accidentally access inappropriate information or use technology in a way that violates this policy, you must report the incident as soon as possible. • The school retains the right to suspend service, accounts, and access to data, including student files and any other stored data. • The school is not responsible for any damages students may suffer, including but not limited to, loss of data or interruptions of service. My child and I have read, understand, and he/she will follow all rules, regulations, and policies as outlined in the Acceptable Use of Technology Policy. I/my child further understands that any violation of the policies is unethical and may constitute a criminal offense. Should I/my child commit any violation of the policy, we understand and agree that his/her access privileges may be revoked and discipline action and/or legal action may be taken. Signature of Parent/Guardian Date Signature of Student Date