SlideShare a Scribd company logo
   An AUP is a written agreement, signed
    by students, their parents, and
    teachers, outlining the terms and
    conditions of Internet use.
Northeastern State University Acceptable
  Use Policy:
http://its.nsuok.edu/printableforms/accept
  ableusepolicy.aspx

Middle School Acceptable Use Policy:
http://www.ncsu.edu/ligon/au.policy.html
Components:
 School’s statement of philosophy
 Code of conduct
 Consequences of violating policy
 Student and Guardian signature
   · Educate parents about their children's use of the Internet.
   · Educate students about
                risks peculiar to computer communication.
               rules for efficient, ethical, legal computer/network use.
               safe and appropriate computer social behavior.
               use of available and unavailable services.
   · Protect vulnerable children from inappropriate approaches.
   · Discourage children from making inappropriate personal disclosures.
   · Encourage ethical behavior, and discourage criminal behavior.
   · Encourage accepted Netiquette from the very start.
   · Encourage polite and civil communication.
   · Encourage individual integrity and honesty.
   · Encourage respect for others and their private property.
   · Allow enforcement of necessary rules of behavior.
   · Protect the school networking equipment and software from danger.
   · Help improve network efficiency by influencing resource usage.
   · Share responsibility for the risks of using the Internet.
   · Reduce the risk of lawsuits against teachers, schools, and providers.
   · Discourage copyright infringement, software piracy, and plagiarism.
   · Discourage network game playing and/or anonymous messages.
   · Discourage use of computers and networks for profit or politics.
   · Assure Internet users that their online activities are monitored or assure Internet users that
         their e-mail privacy is (or is not) being respected.
 http://its.nsuok.edu/printableforms/acce
  ptableusepolicy.aspx
 http://www.ncsu.edu/ligon/au.policy.ht
  ml
 http://www.isafe.org/imgs/pdf/educatio
  n/AUPs.pdf
 http://en.wikipedia.org/wiki/Acceptable
  _use_policy
1.   Who uses Acceptable Use Policies?
     Schools, Universities
2.   What is an Acceptable Use Policy?
     Is a written agreement, signed by students, their
     parents, and teachers, outlining the terms and conditions
     of Internet use.
3.   What is one reason to have an AUP?
      Assure Internet users that their online activities are
     monitored or assure Internet users that their e-mail
     privacy is (or is not) being respected.

More Related Content

What's hot

Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 Journey
Julie Evans
 
Case study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian YouthsCase study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian YouthsRitika Kumari
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHS
MisterHobbs
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
Education Privacy
Education Privacy Education Privacy
Education Privacy emilyensign
 
1. iste, cones, ict
1. iste, cones, ict1. iste, cones, ict
1. iste, cones, ict
Maroo Supelana
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
collimic
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
ML, Copyright and Fair Use
ML, Copyright and Fair UseML, Copyright and Fair Use
ML, Copyright and Fair Use
Renee Hobbs
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issues
tuttitat
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 versionJohan Koren
 
Technology @ASIJ & Responsible Cyber Citizenship
Technology @ASIJ & Responsible Cyber CitizenshipTechnology @ASIJ & Responsible Cyber Citizenship
Technology @ASIJ & Responsible Cyber Citizenship
The American School in Japan
 
Copyright For Administrators
Copyright For AdministratorsCopyright For Administrators
Copyright For Administrators
Julie Putnam
 
E rate presentation
E rate presentationE rate presentation
E rate presentationbpgentry
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 versionJohan Koren
 
"Student Posts Phone Number on Internet!"
"Student Posts Phone Number on Internet!""Student Posts Phone Number on Internet!"
"Student Posts Phone Number on Internet!"Kya Range
 
Jennifer Reader Presentation 504
Jennifer Reader Presentation 504Jennifer Reader Presentation 504
Jennifer Reader Presentation 504jkdwb
 
Lt safety of student data
Lt safety of student dataLt safety of student data
Lt safety of student datagwens502
 

What's hot (20)

Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 Journey
 
Case study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian YouthsCase study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian Youths
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHS
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
1. iste, cones, ict
1. iste, cones, ict1. iste, cones, ict
1. iste, cones, ict
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
History of Technology
History of TechnologyHistory of Technology
History of Technology
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
ML, Copyright and Fair Use
ML, Copyright and Fair UseML, Copyright and Fair Use
ML, Copyright and Fair Use
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issues
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Technology @ASIJ & Responsible Cyber Citizenship
Technology @ASIJ & Responsible Cyber CitizenshipTechnology @ASIJ & Responsible Cyber Citizenship
Technology @ASIJ & Responsible Cyber Citizenship
 
Copyright For Administrators
Copyright For AdministratorsCopyright For Administrators
Copyright For Administrators
 
E rate presentation
E rate presentationE rate presentation
E rate presentation
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 
"Student Posts Phone Number on Internet!"
"Student Posts Phone Number on Internet!""Student Posts Phone Number on Internet!"
"Student Posts Phone Number on Internet!"
 
Jennifer Reader Presentation 504
Jennifer Reader Presentation 504Jennifer Reader Presentation 504
Jennifer Reader Presentation 504
 
Armenia2
Armenia2Armenia2
Armenia2
 
Lt safety of student data
Lt safety of student dataLt safety of student data
Lt safety of student data
 

Viewers also liked

Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet useBurkeV
 
Network acceptable policy
Network acceptable policyNetwork acceptable policy
Network acceptable policy
guest9139550
 
Power Point Presentations
Power Point PresentationsPower Point Presentations
Power Point Presentations
S.D. H.
 
Aavikkoesitelmä sara taru
Aavikkoesitelmä sara taruAavikkoesitelmä sara taru
Aavikkoesitelmä sara taru
Parkanon kaupunki
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
joshuathompson21
 
Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher Education
Anne Arendt
 
Assessment - Ethical use of ICT
Assessment - Ethical use of ICTAssessment - Ethical use of ICT
Assessment - Ethical use of ICT
Erkkie Haipinge
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]ajdredla
 
Acceptable Use Policy - CTAP Training
Acceptable Use Policy - CTAP TrainingAcceptable Use Policy - CTAP Training
Acceptable Use Policy - CTAP Training
Glenn Hervieux
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy projectRachel Nachman
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomjlknight
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
Rachel Farnese
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomMrs.Faust
 
Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generation
dlevin
 

Viewers also liked (17)

Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
 
Network acceptable policy
Network acceptable policyNetwork acceptable policy
Network acceptable policy
 
Power Point Presentations
Power Point PresentationsPower Point Presentations
Power Point Presentations
 
Aavikkoesitelmä sara taru
Aavikkoesitelmä sara taruAavikkoesitelmä sara taru
Aavikkoesitelmä sara taru
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher Education
 
Assessment - Ethical use of ICT
Assessment - Ethical use of ICTAssessment - Ethical use of ICT
Assessment - Ethical use of ICT
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]
 
Acceptable Use Policy - CTAP Training
Acceptable Use Policy - CTAP TrainingAcceptable Use Policy - CTAP Training
Acceptable Use Policy - CTAP Training
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy project
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generation
 

Similar to Acceptable use policy

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
School policies, procedures and contracts
School policies, procedures and contractsSchool policies, procedures and contracts
School policies, procedures and contractsHarleen Singh
 
Staff training session
Staff training sessionStaff training session
Staff training sessionmander5208
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
bwcelearning
 
Telecommunications policy 2010 2011
Telecommunications policy 2010 2011Telecommunications policy 2010 2011
Telecommunications policy 2010 2011
Tedd Wilson
 
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
moeenali5423
 
Acceptable Internet Use In Schools
Acceptable Internet Use In SchoolsAcceptable Internet Use In Schools
Acceptable Internet Use In Schoolsvlferrari
 
Ferrari v policy
Ferrari v policyFerrari v policy
Ferrari v policyvlferrari
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
Angie Simmons
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educatorsjessa_delingon
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]Debbie Oliver
 
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docxUNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
dickonsondorris
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
Andy Jeter
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813jennifer_lawrence
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Acceptable Use Policy - CTAP training
Acceptable Use Policy - CTAP trainingAcceptable Use Policy - CTAP training
Acceptable Use Policy - CTAP training
Glenn Hervieux
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Mi Ra Lavandelo
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policy
BadaiaEnglish
 

Similar to Acceptable use policy (20)

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Social media policy
Social media policySocial media policy
Social media policy
 
School policies, procedures and contracts
School policies, procedures and contractsSchool policies, procedures and contracts
School policies, procedures and contracts
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Telecommunications policy 2010 2011
Telecommunications policy 2010 2011Telecommunications policy 2010 2011
Telecommunications policy 2010 2011
 
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
 
Acceptable Internet Use In Schools
Acceptable Internet Use In SchoolsAcceptable Internet Use In Schools
Acceptable Internet Use In Schools
 
Ferrari v policy
Ferrari v policyFerrari v policy
Ferrari v policy
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docxUNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
E safety for governors & carers
E safety for governors & carersE safety for governors & carers
E safety for governors & carers
 
Acceptable Use Policy - CTAP training
Acceptable Use Policy - CTAP trainingAcceptable Use Policy - CTAP training
Acceptable Use Policy - CTAP training
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policy
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Acceptable use policy

  • 1.
  • 2. An AUP is a written agreement, signed by students, their parents, and teachers, outlining the terms and conditions of Internet use.
  • 3. Northeastern State University Acceptable Use Policy: http://its.nsuok.edu/printableforms/accept ableusepolicy.aspx Middle School Acceptable Use Policy: http://www.ncsu.edu/ligon/au.policy.html
  • 4. Components:  School’s statement of philosophy  Code of conduct  Consequences of violating policy  Student and Guardian signature
  • 5. · Educate parents about their children's use of the Internet.  · Educate students about risks peculiar to computer communication. rules for efficient, ethical, legal computer/network use. safe and appropriate computer social behavior. use of available and unavailable services.  · Protect vulnerable children from inappropriate approaches.  · Discourage children from making inappropriate personal disclosures.  · Encourage ethical behavior, and discourage criminal behavior.  · Encourage accepted Netiquette from the very start.  · Encourage polite and civil communication.  · Encourage individual integrity and honesty.  · Encourage respect for others and their private property.  · Allow enforcement of necessary rules of behavior.  · Protect the school networking equipment and software from danger.  · Help improve network efficiency by influencing resource usage.  · Share responsibility for the risks of using the Internet.  · Reduce the risk of lawsuits against teachers, schools, and providers.  · Discourage copyright infringement, software piracy, and plagiarism.  · Discourage network game playing and/or anonymous messages.  · Discourage use of computers and networks for profit or politics.  · Assure Internet users that their online activities are monitored or assure Internet users that their e-mail privacy is (or is not) being respected.
  • 6.  http://its.nsuok.edu/printableforms/acce ptableusepolicy.aspx  http://www.ncsu.edu/ligon/au.policy.ht ml  http://www.isafe.org/imgs/pdf/educatio n/AUPs.pdf  http://en.wikipedia.org/wiki/Acceptable _use_policy
  • 7. 1. Who uses Acceptable Use Policies? Schools, Universities 2. What is an Acceptable Use Policy? Is a written agreement, signed by students, their parents, and teachers, outlining the terms and conditions of Internet use. 3. What is one reason to have an AUP? Assure Internet users that their online activities are monitored or assure Internet users that their e-mail privacy is (or is not) being respected.