This document summarizes regulations regarding the use of emergency safety interventions (ESI) in schools. It outlines four key standards around communication, documentation, training, and appropriateness. It describes requirements for immediate implementation of some policies, with a good faith effort for full implementation by the 2013-14 school year. Conditions for use of ESI include only using it as a last resort in an emergency when there is an imminent risk of harm. Schools must notify parents within two days of using ESI on a student and provide annual notice of ESI policies. All instances of ESI must be documented and data collected and reviewed biannually.
1 THE CONSOLIDATED SCHOOL DISTRICT OF AIKEN COUNTY .docxgertrudebellgrove
1
THE CONSOLIDATED SCHOOL DISTRICT OF AIKEN COUNTY
2018-2019
CODE OF STUDENT CONDUCT FOR HIGH SCHOOL GRADES (9 – 12)
IMPORTANT: PARENTS AND STUDENTS SHOULD READ THIS DOCUMENT CAREFULLY AND
PROVIDE THE REQUIRED SIGNATURES ON PAGE 30. PLEASE TEAR OUT PAGE 30 AND RETURN IT
TO THE SCHOOL.
The policies set forth in the following Code, as adopted by the Aiken County Board of Education, apply to all High
School students of The Consolidated School District of Aiken County. (High School Principals have broad
discretion in the application of this Code due to the early developmental nature of many of their students.)
This Code applies to summer school students, students who have an Individual Education Plan (IEP) or 504 Plan.
* * * * * * * * * * *
TABLE OF CONTENTS
Introductory Matters .................................................................................................................................................2
Disciplinary Procedures – Process For Hearing And Appeals ........................................................................... 2-10
Administrative Action (Investigation) In The Discipline Process – Basic Due Process ........................................10
Dress Code Secondary School ................................................................................................................................11
Categories of Offenses and Disciplinary Procedures High School Behavior Consequences ........................... 12-17
Definitions ........................................................................................................................................................ 18-21
High School Attendance Policy ..............................................................................................................................22
Tardiness ................................................................................................................................................................23
School Bus Transportation Discipline Code Secondary ................................................................................... 24-25
Appendix (A) ..........................................................................................................................................................26
Appendix (B) Policy IJNDB Use of Technology Resources ..................................................................................27
Administrative Rule IJNDB-R Use of Technology Resources ........................................................................ 28-29
Appendix (C) Policy JICFAA Harassment, Intimidation or Bullying ............................................................. 30-31
Parent and Student Acknowledgement (Important Notice to Parents and Guardians) ..................................... 32-33
2
INTRODUCTO.
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docxdickonsondorris
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY
Acceptable Use Agreement and Code of Conduct
Policy
It is the policy of the College of Technology to provide outstanding education in information
security and to teach students how to provide excellent service to their employers and clients in
an honorable and lawful manner. In accordance with MAPP 10.03.06, following the guidelines
set forth in this code of conduct and the application of sound judgment will ensure the success of
our mission and the continuing prosperity of the University and its programs. Students will read
this Code of Conduct and sign the attached Student Certification and Agreement.
Code of Conduct
This code of conduct sets forth basic standards to guide the behavior of students enrolled in
classes and programs offered by the College of Technology at the University of Houston. It
attempts to provide comprehensive guidance with regard to dealings under the law with the
University, on behalf of the University, with fellow students and on the student’s own behalf.
Each student is expected to assume a sense of personal responsibility for assuring the compliance
of his or her own behavior and those of their fellow students. The Code of Conduct represents a
“zero tolerance” policy. Failure to behave in accordance with this policy will result in
consequences, up to and including dismissal from the university and referral to appropriate law
enforcement officials when indicated. No second chances are allowed. In recognition of the
sensitive nature of the subject matter with which students are entrusted, this policy is stricter than
the usual standards of academic integrity to which all students are subject.
Both degree-seeking and certificate students are trusted with access to the practices, procedures
and technologies used to attack and protect valuable information assets and systems. This trust
requires an uncompromising commitment to satisfying the highest moral and ethical standards.
Adherence to all laws, rules and regulations applicable to the field and practice of information
security is critical. Maintaining the university’s unique position in the field of information
security education, as well as one’s personal professionalism, requires more than simple
obedience to the law. Our faculty and staff, as well as those who employ our graduates, expect
that professionals trained by UH will demonstrate sound ethics, honesty and fairness in their
actions when providing security products and services.
UH understands that this code must be flexible enough to deal with hundreds of different daily
activities in addition to future academic and business issues. Toward that end, it is expected of
each student to use sound judgment in the performance of his/her studies. Sound judgment
means, among other things, that the student should consider whether his/her conduct would be
viewed with approval by family, friends, co ...
1 THE CONSOLIDATED SCHOOL DISTRICT OF AIKEN COUNTY .docxgertrudebellgrove
1
THE CONSOLIDATED SCHOOL DISTRICT OF AIKEN COUNTY
2018-2019
CODE OF STUDENT CONDUCT FOR HIGH SCHOOL GRADES (9 – 12)
IMPORTANT: PARENTS AND STUDENTS SHOULD READ THIS DOCUMENT CAREFULLY AND
PROVIDE THE REQUIRED SIGNATURES ON PAGE 30. PLEASE TEAR OUT PAGE 30 AND RETURN IT
TO THE SCHOOL.
The policies set forth in the following Code, as adopted by the Aiken County Board of Education, apply to all High
School students of The Consolidated School District of Aiken County. (High School Principals have broad
discretion in the application of this Code due to the early developmental nature of many of their students.)
This Code applies to summer school students, students who have an Individual Education Plan (IEP) or 504 Plan.
* * * * * * * * * * *
TABLE OF CONTENTS
Introductory Matters .................................................................................................................................................2
Disciplinary Procedures – Process For Hearing And Appeals ........................................................................... 2-10
Administrative Action (Investigation) In The Discipline Process – Basic Due Process ........................................10
Dress Code Secondary School ................................................................................................................................11
Categories of Offenses and Disciplinary Procedures High School Behavior Consequences ........................... 12-17
Definitions ........................................................................................................................................................ 18-21
High School Attendance Policy ..............................................................................................................................22
Tardiness ................................................................................................................................................................23
School Bus Transportation Discipline Code Secondary ................................................................................... 24-25
Appendix (A) ..........................................................................................................................................................26
Appendix (B) Policy IJNDB Use of Technology Resources ..................................................................................27
Administrative Rule IJNDB-R Use of Technology Resources ........................................................................ 28-29
Appendix (C) Policy JICFAA Harassment, Intimidation or Bullying ............................................................. 30-31
Parent and Student Acknowledgement (Important Notice to Parents and Guardians) ..................................... 32-33
2
INTRODUCTO.
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docxdickonsondorris
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY
Acceptable Use Agreement and Code of Conduct
Policy
It is the policy of the College of Technology to provide outstanding education in information
security and to teach students how to provide excellent service to their employers and clients in
an honorable and lawful manner. In accordance with MAPP 10.03.06, following the guidelines
set forth in this code of conduct and the application of sound judgment will ensure the success of
our mission and the continuing prosperity of the University and its programs. Students will read
this Code of Conduct and sign the attached Student Certification and Agreement.
Code of Conduct
This code of conduct sets forth basic standards to guide the behavior of students enrolled in
classes and programs offered by the College of Technology at the University of Houston. It
attempts to provide comprehensive guidance with regard to dealings under the law with the
University, on behalf of the University, with fellow students and on the student’s own behalf.
Each student is expected to assume a sense of personal responsibility for assuring the compliance
of his or her own behavior and those of their fellow students. The Code of Conduct represents a
“zero tolerance” policy. Failure to behave in accordance with this policy will result in
consequences, up to and including dismissal from the university and referral to appropriate law
enforcement officials when indicated. No second chances are allowed. In recognition of the
sensitive nature of the subject matter with which students are entrusted, this policy is stricter than
the usual standards of academic integrity to which all students are subject.
Both degree-seeking and certificate students are trusted with access to the practices, procedures
and technologies used to attack and protect valuable information assets and systems. This trust
requires an uncompromising commitment to satisfying the highest moral and ethical standards.
Adherence to all laws, rules and regulations applicable to the field and practice of information
security is critical. Maintaining the university’s unique position in the field of information
security education, as well as one’s personal professionalism, requires more than simple
obedience to the law. Our faculty and staff, as well as those who employ our graduates, expect
that professionals trained by UH will demonstrate sound ethics, honesty and fairness in their
actions when providing security products and services.
UH understands that this code must be flexible enough to deal with hundreds of different daily
activities in addition to future academic and business issues. Toward that end, it is expected of
each student to use sound judgment in the performance of his/her studies. Sound judgment
means, among other things, that the student should consider whether his/her conduct would be
viewed with approval by family, friends, co ...
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
4. Implementation of Regulations
Red = Immediate
Implementation
Yellow= Good Faith Effort with
Full
Implementation by Beginning of
2013–14 School Year
Prohibition of certain types of
restraint
Development of district policies
Written parental notification of
the use of an ESI with a student
within two school
days
School personnel training
Procedure for documentation of
the use of an ESI
Provide parents with annual
notice of the
district’s ESI policies
Procedure for data collection of
all
instances of ESI
Review of all instances of ESI
Districts report all incidents of Local dispute resolution process
5. Application
Applies to both special education and
regular education students.
Applies to public schools, including charter
schools.
Applies to school staff, including independent
contractors and their employees, and student
teachers.
Does not apply to law enforcement officers
working in the school.
6. Conditions on the use of ESI
May not be used for the purpose of managing behavior
May be used only in an emergency and when there is an imminent risk of
harm or danger.
Imminent risk of harm or danger: The immediate and impending threat of a
person causing serious bodily injury to self or others.
Serious bodily injury involves:
A substantial risk of death;
Extreme physical pain;
Protracted and obvious disfigurement; or
Protracted lost or impairment of the function of a bodily member, organ or
mental faculty.
May be used only as a last resort
7. Will I Get Into Trouble for Using an ESI?
There is no prohibition on the use of seclusion and
physical restraint.
The intention of the regulation is to educate
school personnel about the dangers of using an
ESI with a student.
The use of an ESI should never be taken lightly
and always be the last step taken. If an ESI is
used with a student, school personnel must follow
the process set out in the regulation and in their
district’s policies and procedures.
8. Emergency Safety Intervention (ESI)
Emergency
Immediate danger
Safety
Immediate danger of student harming self or others
Intervention
Restraint or seclusion should only be used for limited periods of time
and should cease immediately when the immediate danger of
harm to self or others has dissipated.
9. Technical Definition - Seclusion
Seclusion is not a place, it is a process.
Seclusion is identified by meeting three criteria:
The student is…
(1) Placed in an enclosed area by school personnel.
(2) Purposefully isolated from adults and peers.
(3) Prevented from leaving, or reasonably believes
that the student will be prevented from leaving,
the enclosed area.
11. ESI is not discipline
Restraint or seclusion should never be used as
punishment or discipline (e.g., placing in seclusion
for out-of-seat behavior), as a means of coercion
or retaliation, or as a convenience.
12. How to determine if it is
‘reasonable’?
Grandma Test
YouTube Test
OCR Test
13. ESI and Behavior Plans
ESI should not be a planned intervention for
a specific student under foreseeable
circumstances.
ESI is not an acceptable alternative to
prevention.
If you are planning for it, it means you can
see it coming. If you can see it coming, every
effort should be made for prevention.
15. Training & Prevention
Teachers and other personnel should be trained
regularly on the appropriate use of effective
alternatives to physical restraint and seclusion,
such as positive behavioral interventions and
supports and, only for cases involving imminent
danger of serious physical harm, on the safe use
of physical restraint and seclusion.
16. Types of restraint prohibited by the
regulations:
Prone (face-down)
Supine (face-up)
Physical restraint that obstructs the airway of a student
Physical restraint that impacts a student’s primary mode
of communication
Chemical restraint, except as prescribed treatments for
a student’s medical or psychiatric condition by a person
appropriately licensed to issue these treatments
Mechanical restraint, except those protective or
stabilizing devices ordered by a person appropriately
licensed to issue the order for the device or devices
required by law.
17. Parental Notification
When an ESI is used with a student, the
parent must be notified within two school
days.
Parents will annually be provided with
the district’s written policies on the use of
ESI.
School’s website; and School code of
conduct, school safety plan, or student
handbook
18. Documentation of the Use of an ESI
Any time an ESI is used with a student it must be
documented.
Documentation must include:
Date and time of the intervention
Type of intervention (seclusion or restraint)
Length of time (in minutes) the intervention was
used
Names of school personnel who participated in or
supervised the intervention
19. Data Collection and Review of All
Instances of ESI
Districts must establish a procedure for the
collection, maintenance, and periodic review
of the use of ESI at each school.
Districts must develop a system to collect
and maintain documentation for each use of
an ESI.
Information maintained by the school on the
use of ESI must be compiled and submitted,
at least biannually, to the district
superintendent or district designee.
20. Do Schools Still Report to KSDE?
Districts shall report all incidents of ESI
to KSDE by the date and in the form
specified by KSDE.
2012-2013 Reporting – No changes,
current practice
2013-2014 Reporting – Changes
(definitions)