SlideShare a Scribd company logo
Please read & follow:

• You need a pen/pencil today – anything
  except red or Sharpie.
• Put all of your things away.
• Please sit quietly in your seat. 




                                           1
Use of
Telecommunications
         &
      Network




                     2
SCHOOL DISTRICT OF CLAY COUNTY
     (SDCC)TELECOMMUNICATIONS NETWORK
                 OVERVIEW
   1. SDCC provides opportunity for students to expand
      learning.
   2. Opportunity =
   3. Goal of school Internet
       a. Resource sharing
       b. Accessing outside information
       c. Research
       d. Encouraging technological innovation
       e. Worldwide communication


•Question: Compared to other schools around the country and
the world, what do you think our school would be like if we did
not have access to the Internet?



                                                                  3
INTERNET RESOURCES

4. Students will have access to:
   a. Worldwide electronic mail
      communication.
   b. Global information and news.
   c. Public domain and shareware computer
      software.
   d. Educational discussion groups.
   e. Access to many university libraries and
      other libraries.


                                                4
INTERNET WARNING
5.   Some materials on the Internet are not of educational value
     while at school.
6.   This material may not be suitable for students.
7.   The instructor or Virtual Learning Lab (VLL) Assistant will
     monitor student use of the Internet to prevent students from
     accessing unsuitable material.




                                                                    5
USER GUIDELINES
8.  Internet access is through an association of government,
    regional & state networks.
9. School district wants the network to be used in a             ,
    efficient, ethical and legal manner.
10. Operation of Internet relies on proper conduct of the users.




                                                                     6
USER GUIDELINES Continued
11. If you violate guidelines, your account will be terminated.
12. Serious violations may result in school disciplinary action or
    legal action.
13. A signature indicates that the user has read and understands.




                                                                     7
Acceptable Use
14. Internet use must support education and research.
15. Users are encouraged to take advantage of the network’s
    functions:
   a. electronic mail
   b. conferences
   c. bulletin boards
   d. databases
   e. access to the Internet




                                                              8
Privileges
16. Use of Internet = privilege
17. Inappropriate use = no privilege




   Question: Why do you think using the Internet at school is a
   privilege?




                                                                  9
“Netiquette”
18. Abide by the rules of network etiquette (known as
    “netiquette”).
19. Be polite.
20. Do not use vulgar or obscene language.
21. Do not reveal your address or phone number or those of
    others.
22. Electronic mail is not guaranteed to be private.
23. Do not disrupt the network, the data, or other users.




                                                             10
24. Unacceptable Uses of Network
a.   Violating student or staff rights to privacy.
b.   Using the Internet without application of common sense.
c.   Using profanity, obscenity, or other language which may be
     offensive to another user.
d.   Sending or accessing pornographic text and/or graphics.
e.   Unauthorized games.
f.   Sending or receiving copyrighted materials.
g.   Reporting personal communications without the author’s prior
     consent.




 Question: What could happen to a person, whose private
 information such as a name, address and phone number,              11
 given out over the Internet without their permission?
Unacceptable Uses of Network (Continued)
h.   Using for commercial activities, product advertisement, or
     financial gain.
i.   Knowingly transmitting viruses.
j.   Spam.
k.   Chain letters.
l.   Unauthorized solicitations for goods and services.
m.   Posting personal views .
n.   Unauthorized streaming of video or music – this ties up the
     bandwidth & slows down the network.




 Question: What would happen to the school Internet if a virus was sent
 in to infect the system?                                                 12
Warranties
25. SDCC makes no warranties.
26. SDCC will not be responsible for damages or loss of data.
27. SDCC will not be responsible for the accuracy or quality of
    information obtained on network.
28. Inappropriate Internet sites should be reported to teacher
    immediately.




                                                                  13
Security
29. Security is a high priority.
30. Do not show or identify the problem to others.
31. Do not use another individual’s account.
32. Attempts to log on as another user will result in cancellation of
    your privileges.
33. Security risk users will be denied network access.




                                                                    14
Vandalism
34. Vandalism = privileges cancelled and/or disciplinary action.
35. Vandalism is a malicious attempt to harm or destroy data of
    another user, Internet, or other networks.
36. Includes creating or uploading computer viruses on the
    Internet or host site.
37. Degrading or disrupting system performance is a crime under
    state and federal law.




                                                                   15
Sponsors
38. Teachers are to make sure students:
   a. Know how to use the Internet correctly &
   b. Know what happens if they don’t!




                                                 16
Let’s Review
What is the main purpose and goal of having a school
Internet?
Why are there so many rules and guidelines for using the
school Internet?

What are some benefits of having Internet and network rules?
Why do you have your own personal user account when you
log onto the school Internet?

What are some benefits of having your own user account for
logging onto the school Internet?

What happens to the school Internet when you down load
unauthorized streaming videos and music?


                                                               17

More Related Content

What's hot

Internet Publication
Internet PublicationInternet Publication
Internet PublicationDré Davis
 
Top Ten Internet Uses In Teaching And Learning 2
Top Ten Internet Uses In Teaching And Learning   2Top Ten Internet Uses In Teaching And Learning   2
Top Ten Internet Uses In Teaching And Learning 2
rogerja
 
Using the Internet for Learning
Using the Internet for LearningUsing the Internet for Learning
Using the Internet for Learning
Kengatharaiyer Sarveswaran
 
benefits of the internet on education
benefits of the internet on educationbenefits of the internet on education
benefits of the internet on educationlinda kerry
 
10 Best Uses Of The Internet Powerpoint
10 Best Uses Of The Internet Powerpoint10 Best Uses Of The Internet Powerpoint
10 Best Uses Of The Internet Powerpointadeising13
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomjlknight
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network ppt
Kristi DeRoche
 
Using the internet as a resource slideshare version
Using the internet as a resource slideshare versionUsing the internet as a resource slideshare version
Using the internet as a resource slideshare version
NUI Galway
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]ajdredla
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
uarkgradstudent
 
Why Web 20
Why Web 20Why Web 20
Why Web 20
Tim Dedeaux
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educatorsjessa_delingon
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technologypeav1n0
 
Orientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafetyOrientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafetymthomson
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
Sonal Bharal
 
Top ten internet uses in teaching and learning
Top ten internet uses in teaching and learningTop ten internet uses in teaching and learning
Top ten internet uses in teaching and learningjhender1428
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
The internet 2
The internet 2The internet 2
The internet 2
SMS
 

What's hot (20)

Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
Top Ten Internet Uses In Teaching And Learning 2
Top Ten Internet Uses In Teaching And Learning   2Top Ten Internet Uses In Teaching And Learning   2
Top Ten Internet Uses In Teaching And Learning 2
 
Using the Internet for Learning
Using the Internet for LearningUsing the Internet for Learning
Using the Internet for Learning
 
benefits of the internet on education
benefits of the internet on educationbenefits of the internet on education
benefits of the internet on education
 
10 Best Uses Of The Internet Powerpoint
10 Best Uses Of The Internet Powerpoint10 Best Uses Of The Internet Powerpoint
10 Best Uses Of The Internet Powerpoint
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network ppt
 
Using the internet as a resource slideshare version
Using the internet as a resource slideshare versionUsing the internet as a resource slideshare version
Using the internet as a resource slideshare version
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Why Web 20
Why Web 20Why Web 20
Why Web 20
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
 
Orientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafetyOrientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafety
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Top ten internet uses in teaching and learning
Top ten internet uses in teaching and learningTop ten internet uses in teaching and learning
Top ten internet uses in teaching and learning
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
The internet 2
The internet 2The internet 2
The internet 2
 

Viewers also liked

Cbs syllabus revised second semester 12-5-12
Cbs syllabus   revised second semester 12-5-12Cbs syllabus   revised second semester 12-5-12
Cbs syllabus revised second semester 12-5-12Kathy Sheridan
 
Design presentation [autosaved]
Design presentation [autosaved]Design presentation [autosaved]
Design presentation [autosaved]Kathy Sheridan
 

Viewers also liked (7)

Chapter 3 review
Chapter 3 reviewChapter 3 review
Chapter 3 review
 
Cbs syllabus revised second semester 12-5-12
Cbs syllabus   revised second semester 12-5-12Cbs syllabus   revised second semester 12-5-12
Cbs syllabus revised second semester 12-5-12
 
Using bb collaborate
Using bb collaborateUsing bb collaborate
Using bb collaborate
 
E E Activity
E E ActivityE E Activity
E E Activity
 
Cva destiny and AR
Cva destiny and ARCva destiny and AR
Cva destiny and AR
 
Cbs week 1 13 14
Cbs  week 1 13 14Cbs  week 1 13 14
Cbs week 1 13 14
 
Design presentation [autosaved]
Design presentation [autosaved]Design presentation [autosaved]
Design presentation [autosaved]
 

Similar to Acceptable Use Policy

Aup lesson for vll students
Aup lesson for vll studentsAup lesson for vll students
Aup lesson for vll studentsdlwadsworth
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
Fatin Izzaty
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
ibrahimtbl3147
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
HanelynDZAmudio
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
egschool
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
INTERNET.pptx
 INTERNET.pptx INTERNET.pptx
INTERNET.pptx
MalappaAchmatti
 
SM INTERNET.pptx
SM INTERNET.pptxSM INTERNET.pptx
SM INTERNET.pptx
MadhumatiPujar
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
Olga Morozan
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2opiedog1
 
Security
SecuritySecurity
Security
Nabatah
 
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptxem-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
NonSy1
 
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxreport_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
princesskatemannag14
 
Concept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptxConcept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptx
MDNAFAYAFZAL
 
Concept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptxConcept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptx
MDNAFAYAFZAL
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
Param Nanavati
 

Similar to Acceptable Use Policy (20)

Aup lesson for vll students
Aup lesson for vll studentsAup lesson for vll students
Aup lesson for vll students
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
INTERNET.pptx
 INTERNET.pptx INTERNET.pptx
INTERNET.pptx
 
SM INTERNET.pptx
SM INTERNET.pptxSM INTERNET.pptx
SM INTERNET.pptx
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
 
Security
SecuritySecurity
Security
 
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptxem-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
 
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxreport_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
 
Concept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptxConcept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptx
 
Concept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptxConcept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptx
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 

More from Kathy Sheridan

Acbsi syllabus _-_sheridan_(2)-1
Acbsi syllabus _-_sheridan_(2)-1Acbsi syllabus _-_sheridan_(2)-1
Acbsi syllabus _-_sheridan_(2)-1
Kathy Sheridan
 
Applied computer and business skills pacing chart sem 1 15 16
Applied computer and business skills pacing chart sem 1 15 16Applied computer and business skills pacing chart sem 1 15 16
Applied computer and business skills pacing chart sem 1 15 16
Kathy Sheridan
 
Pace chart user interface segment 15 16
Pace chart user interface segment 15 16Pace chart user interface segment 15 16
Pace chart user interface segment 15 16Kathy Sheridan
 
Pace chart foundations segment 1 15 16
Pace chart foundations segment 1 15 16Pace chart foundations segment 1 15 16
Pace chart foundations segment 1 15 16Kathy Sheridan
 
Searches for clipart to modify
Searches for clipart to modifySearches for clipart to modify
Searches for clipart to modifyKathy Sheridan
 
Pacing guides segment 2
Pacing guides segment 2Pacing guides segment 2
Pacing guides segment 2Kathy Sheridan
 
Pacing guides segment 1
Pacing guides segment 1Pacing guides segment 1
Pacing guides segment 1Kathy Sheridan
 
Welcome to week 1 acbs1
Welcome to week 1 acbs1Welcome to week 1 acbs1
Welcome to week 1 acbs1Kathy Sheridan
 
Project simulation creating a presentation
Project simulation creating a presentationProject simulation creating a presentation
Project simulation creating a presentation
Kathy Sheridan
 
Evaluating career options chart
Evaluating career options chartEvaluating career options chart
Evaluating career options chartKathy Sheridan
 
Workaround for disappearing short answer questions
Workaround for disappearing short answer questionsWorkaround for disappearing short answer questions
Workaround for disappearing short answer questionsKathy Sheridan
 
Navigating foundations of web design
Navigating foundations of web designNavigating foundations of web design
Navigating foundations of web designKathy Sheridan
 
Textbook accountability destiny 13-14
Textbook accountability   destiny 13-14Textbook accountability   destiny 13-14
Textbook accountability destiny 13-14Kathy Sheridan
 
Media festival workshop
Media festival workshopMedia festival workshop
Media festival workshopKathy Sheridan
 
Welcome to week 1 second semester
Welcome to week 1 second semesterWelcome to week 1 second semester
Welcome to week 1 second semesterKathy Sheridan
 
Cbs syllabus revised second semester 12-5-12
Cbs syllabus   revised second semester 12-5-12Cbs syllabus   revised second semester 12-5-12
Cbs syllabus revised second semester 12-5-12Kathy Sheridan
 
BP Orientation Revised
BP Orientation RevisedBP Orientation Revised
BP Orientation RevisedKathy Sheridan
 

More from Kathy Sheridan (20)

Acbsi syllabus _-_sheridan_(2)-1
Acbsi syllabus _-_sheridan_(2)-1Acbsi syllabus _-_sheridan_(2)-1
Acbsi syllabus _-_sheridan_(2)-1
 
Applied computer and business skills pacing chart sem 1 15 16
Applied computer and business skills pacing chart sem 1 15 16Applied computer and business skills pacing chart sem 1 15 16
Applied computer and business skills pacing chart sem 1 15 16
 
Pace chart user interface segment 15 16
Pace chart user interface segment 15 16Pace chart user interface segment 15 16
Pace chart user interface segment 15 16
 
Pace chart foundations segment 1 15 16
Pace chart foundations segment 1 15 16Pace chart foundations segment 1 15 16
Pace chart foundations segment 1 15 16
 
Searches for clipart to modify
Searches for clipart to modifySearches for clipart to modify
Searches for clipart to modify
 
Resources
ResourcesResources
Resources
 
Pacing guides segment 2
Pacing guides segment 2Pacing guides segment 2
Pacing guides segment 2
 
Pacing guides segment 1
Pacing guides segment 1Pacing guides segment 1
Pacing guides segment 1
 
Welcome to week 1 acbs1
Welcome to week 1 acbs1Welcome to week 1 acbs1
Welcome to week 1 acbs1
 
Project simulation creating a presentation
Project simulation creating a presentationProject simulation creating a presentation
Project simulation creating a presentation
 
Evaluating career options chart
Evaluating career options chartEvaluating career options chart
Evaluating career options chart
 
Workaround for disappearing short answer questions
Workaround for disappearing short answer questionsWorkaround for disappearing short answer questions
Workaround for disappearing short answer questions
 
Navigating foundations of web design
Navigating foundations of web designNavigating foundations of web design
Navigating foundations of web design
 
Textbook accountability destiny 13-14
Textbook accountability   destiny 13-14Textbook accountability   destiny 13-14
Textbook accountability destiny 13-14
 
BP orientation 13 14
BP orientation 13 14BP orientation 13 14
BP orientation 13 14
 
Media festival workshop
Media festival workshopMedia festival workshop
Media festival workshop
 
Welcome to week 1 second semester
Welcome to week 1 second semesterWelcome to week 1 second semester
Welcome to week 1 second semester
 
Cbs syllabus revised second semester 12-5-12
Cbs syllabus   revised second semester 12-5-12Cbs syllabus   revised second semester 12-5-12
Cbs syllabus revised second semester 12-5-12
 
BP Orientation Revised
BP Orientation RevisedBP Orientation Revised
BP Orientation Revised
 
Orientation - BP
Orientation - BPOrientation - BP
Orientation - BP
 

Recently uploaded

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Acceptable Use Policy

  • 1. Please read & follow: • You need a pen/pencil today – anything except red or Sharpie. • Put all of your things away. • Please sit quietly in your seat.  1
  • 3. SCHOOL DISTRICT OF CLAY COUNTY (SDCC)TELECOMMUNICATIONS NETWORK OVERVIEW 1. SDCC provides opportunity for students to expand learning. 2. Opportunity = 3. Goal of school Internet a. Resource sharing b. Accessing outside information c. Research d. Encouraging technological innovation e. Worldwide communication •Question: Compared to other schools around the country and the world, what do you think our school would be like if we did not have access to the Internet? 3
  • 4. INTERNET RESOURCES 4. Students will have access to: a. Worldwide electronic mail communication. b. Global information and news. c. Public domain and shareware computer software. d. Educational discussion groups. e. Access to many university libraries and other libraries. 4
  • 5. INTERNET WARNING 5. Some materials on the Internet are not of educational value while at school. 6. This material may not be suitable for students. 7. The instructor or Virtual Learning Lab (VLL) Assistant will monitor student use of the Internet to prevent students from accessing unsuitable material. 5
  • 6. USER GUIDELINES 8. Internet access is through an association of government, regional & state networks. 9. School district wants the network to be used in a , efficient, ethical and legal manner. 10. Operation of Internet relies on proper conduct of the users. 6
  • 7. USER GUIDELINES Continued 11. If you violate guidelines, your account will be terminated. 12. Serious violations may result in school disciplinary action or legal action. 13. A signature indicates that the user has read and understands. 7
  • 8. Acceptable Use 14. Internet use must support education and research. 15. Users are encouraged to take advantage of the network’s functions: a. electronic mail b. conferences c. bulletin boards d. databases e. access to the Internet 8
  • 9. Privileges 16. Use of Internet = privilege 17. Inappropriate use = no privilege Question: Why do you think using the Internet at school is a privilege? 9
  • 10. “Netiquette” 18. Abide by the rules of network etiquette (known as “netiquette”). 19. Be polite. 20. Do not use vulgar or obscene language. 21. Do not reveal your address or phone number or those of others. 22. Electronic mail is not guaranteed to be private. 23. Do not disrupt the network, the data, or other users. 10
  • 11. 24. Unacceptable Uses of Network a. Violating student or staff rights to privacy. b. Using the Internet without application of common sense. c. Using profanity, obscenity, or other language which may be offensive to another user. d. Sending or accessing pornographic text and/or graphics. e. Unauthorized games. f. Sending or receiving copyrighted materials. g. Reporting personal communications without the author’s prior consent. Question: What could happen to a person, whose private information such as a name, address and phone number, 11 given out over the Internet without their permission?
  • 12. Unacceptable Uses of Network (Continued) h. Using for commercial activities, product advertisement, or financial gain. i. Knowingly transmitting viruses. j. Spam. k. Chain letters. l. Unauthorized solicitations for goods and services. m. Posting personal views . n. Unauthorized streaming of video or music – this ties up the bandwidth & slows down the network. Question: What would happen to the school Internet if a virus was sent in to infect the system? 12
  • 13. Warranties 25. SDCC makes no warranties. 26. SDCC will not be responsible for damages or loss of data. 27. SDCC will not be responsible for the accuracy or quality of information obtained on network. 28. Inappropriate Internet sites should be reported to teacher immediately. 13
  • 14. Security 29. Security is a high priority. 30. Do not show or identify the problem to others. 31. Do not use another individual’s account. 32. Attempts to log on as another user will result in cancellation of your privileges. 33. Security risk users will be denied network access. 14
  • 15. Vandalism 34. Vandalism = privileges cancelled and/or disciplinary action. 35. Vandalism is a malicious attempt to harm or destroy data of another user, Internet, or other networks. 36. Includes creating or uploading computer viruses on the Internet or host site. 37. Degrading or disrupting system performance is a crime under state and federal law. 15
  • 16. Sponsors 38. Teachers are to make sure students: a. Know how to use the Internet correctly & b. Know what happens if they don’t! 16
  • 17. Let’s Review What is the main purpose and goal of having a school Internet? Why are there so many rules and guidelines for using the school Internet? What are some benefits of having Internet and network rules? Why do you have your own personal user account when you log onto the school Internet? What are some benefits of having your own user account for logging onto the school Internet? What happens to the school Internet when you down load unauthorized streaming videos and music? 17