SlideShare a Scribd company logo
1 of 17
Responsible Use
  Guidelines
     Eanes ISD
• Text Messaging
•     Electronic Media
  Blogs
• Posts
• Tweets
• Instant Messaging
• email
• Video Sharing
• Comments posted
• Social Network sites
• Forums
BYOT
     (Bring Your Own Technology)
     (Bring Your Own Technology)
• Students can bring their own technology to
  connect.
• We don’t support their devices technically
• We are not responsible for their data plans
  as they can connect to our “Eanes Guest”
  network.
• Must comply with the Responsible Use
  Guidelines
Unacceptable and
     Irresponsible Use
Unauthorized use of copyrighted materials or
      software licensing agreements
Unacceptable and
 Irresponsible Use
Sending or posting of abusive content
Unacceptable and
  Irresponsible Use
Use of technology to encourage illegal
 behavior or threaten school safety
Unacceptable and
     Irresponsible Use
Personal and/or political use to advocate for
       a candidate or political issue.
Unacceptable and
    Irresponsible Use
 Attempting to destroy or disable district
technology equipment, district data, or the
     data of other users or networks
Unacceptable and
    Irresponsible Use
Posting personal information about yourself
   or others (such as phone numbers or
    addresses) for non-school business
Unacceptable and
     Irresponsible Use
Forgery of electronic messages (email, posts,
    etc) or transmission of junk email.
Unacceptable and
     Irresponsible Use
Use of systems for commercial activities or
             commercial gain.
Unacceptable and
    Irresponsible Use
Wasting school resources through improper
      use of the computer systems.
Unacceptable and
     Irresponsible Use
Any use that violates the employee handbook
                 or is illegal.
Social Media & Cloud
            Storage

• Notify parents prior to use if for a class
  project
• Use of Facebook through a fan
  page acceptable
• Use of all social media during work hours
  should be professional in nature.
Social Media & Cloud
            Storage
• Cannot use district logo without consent
• Keep confidential files off of 3rd party
  cloud storage sites
• Keep personal life and professional life
  separate on email, social media
• Follow the Code of Ethics and Standard
  Practices for Texas Educators
Code of Ethics and Standard
          Practices for Texas Educators
Personal or Professional electronic
communication which violates any of the
following:
  •Confidentiality of student records
  •Confidentiality of health or personnel information
  concerning colleagues
  •Confidentiality of district records including
  evaluations and private email addreses
  •Harming others by knowingly making false
  statements about a colleague or the school system.
Responsible Use
  Guidelines
     Eanes ISD

More Related Content

What's hot

Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
Technology Safety Practices
Technology Safety PracticesTechnology Safety Practices
Technology Safety PracticesShireen Mitchell
 
Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)MMHoward
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
Software Asset Management Power Point For Employers W Presentation Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  NotesSoftware  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software Asset Management Power Point For Employers W Presentation Notesguest78023a
 
Mohamed rashid salim
Mohamed rashid salimMohamed rashid salim
Mohamed rashid salimHAMOOD13
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPSJeanette Murphy
 
The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethicssalj_16
 
Orientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafetyOrientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafetymthomson
 

What's hot (20)

Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Presentation1
Presentation1Presentation1
Presentation1
 
Technology Safety Practices
Technology Safety PracticesTechnology Safety Practices
Technology Safety Practices
 
Cybersmart
CybersmartCybersmart
Cybersmart
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Ali abdullah
Ali abdullahAli abdullah
Ali abdullah
 
TimDavis
TimDavisTimDavis
TimDavis
 
Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical use
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Parent ed is_mh
Parent ed is_mhParent ed is_mh
Parent ed is_mh
 
Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
COmPuter
COmPuterCOmPuter
COmPuter
 
Software Asset Management Power Point For Employers W Presentation Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  NotesSoftware  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software Asset Management Power Point For Employers W Presentation Notes
 
Mohamme d hamed
Mohamme d hamedMohamme d hamed
Mohamme d hamed
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Mohamed rashid salim
Mohamed rashid salimMohamed rashid salim
Mohamed rashid salim
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPS
 
The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethics
 
Orientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafetyOrientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafety
 

Viewers also liked

Welcome to the world of irresponsible intelligence!
Welcome to the world of irresponsible intelligence!Welcome to the world of irresponsible intelligence!
Welcome to the world of irresponsible intelligence!Krishna Kishore Bhavaraju
 
Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?
Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?
Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?Horizons RG
 
Following instructions
Following instructionsFollowing instructions
Following instructionsJohnPickar
 
Following and writing instructions (Continued)
Following and writing instructions (Continued)Following and writing instructions (Continued)
Following and writing instructions (Continued)Javier Cárdenas
 
Drug & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...
Drug  & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...Drug  & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...
Drug & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...OrnellaRN
 
13 Personality Traits Of A Horrible Employee
13 Personality Traits Of A Horrible Employee13 Personality Traits Of A Horrible Employee
13 Personality Traits Of A Horrible EmployeeD B
 
Following and writing instructions
Following and writing instructionsFollowing and writing instructions
Following and writing instructionsJavier Cárdenas
 

Viewers also liked (8)

Reducing irresponsible use of alcohol
Reducing irresponsible use of alcoholReducing irresponsible use of alcohol
Reducing irresponsible use of alcohol
 
Welcome to the world of irresponsible intelligence!
Welcome to the world of irresponsible intelligence!Welcome to the world of irresponsible intelligence!
Welcome to the world of irresponsible intelligence!
 
Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?
Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?
Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?
 
Following instructions
Following instructionsFollowing instructions
Following instructions
 
Following and writing instructions (Continued)
Following and writing instructions (Continued)Following and writing instructions (Continued)
Following and writing instructions (Continued)
 
Drug & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...
Drug  & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...Drug  & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...
Drug & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...
 
13 Personality Traits Of A Horrible Employee
13 Personality Traits Of A Horrible Employee13 Personality Traits Of A Horrible Employee
13 Personality Traits Of A Horrible Employee
 
Following and writing instructions
Following and writing instructionsFollowing and writing instructions
Following and writing instructions
 

Similar to Responsible use presentation

Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]ajdredla
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]ajdredla
 
Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conductsupunls
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]Debbie Oliver
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyKoolteechatechnology
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policyiamprosperous
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbookJG4191
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ssLenva Shearing
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kittrtkaren
 

Similar to Responsible use presentation (20)

Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]
 
Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conduct
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
Social media policy
Social media policySocial media policy
Social media policy
 
CMS Technology acceptable use policy
CMS Technology acceptable use policyCMS Technology acceptable use policy
CMS Technology acceptable use policy
 
Technology acceptable use policy gr 7 day 1
Technology acceptable use policy   gr 7 day 1Technology acceptable use policy   gr 7 day 1
Technology acceptable use policy gr 7 day 1
 
Acceptable Use Agreement Students 2011
Acceptable Use Agreement Students 2011Acceptable Use Agreement Students 2011
Acceptable Use Agreement Students 2011
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Computer safety
Computer safetyComputer safety
Computer safety
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
educ 103
educ 103educ 103
educ 103
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbook
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kit
 

More from Carl Hooker

Digital parent night
Digital parent nightDigital parent night
Digital parent nightCarl Hooker
 
Space…The Final Learning Frontier - TCEA 2014
Space…The Final Learning Frontier - TCEA 2014Space…The Final Learning Frontier - TCEA 2014
Space…The Final Learning Frontier - TCEA 2014Carl Hooker
 
10 Things Not to Do in a 1:1 iPad Classroom
10 Things Not to Do in a 1:1 iPad Classroom10 Things Not to Do in a 1:1 iPad Classroom
10 Things Not to Do in a 1:1 iPad ClassroomCarl Hooker
 
LEAP and Digital Learning at EanesISD
LEAP and Digital Learning at EanesISDLEAP and Digital Learning at EanesISD
LEAP and Digital Learning at EanesISDCarl Hooker
 
Middle School iPad Parent Night
Middle School iPad Parent NightMiddle School iPad Parent Night
Middle School iPad Parent NightCarl Hooker
 
Leap presentation
Leap presentationLeap presentation
Leap presentationCarl Hooker
 
April 17th Westlake High School Visit
April 17th Westlake High School VisitApril 17th Westlake High School Visit
April 17th Westlake High School VisitCarl Hooker
 
SXSWedu - March 7, 2012
SXSWedu - March 7, 2012SXSWedu - March 7, 2012
SXSWedu - March 7, 2012Carl Hooker
 
Wifi presentation tampa final
Wifi presentation tampa finalWifi presentation tampa final
Wifi presentation tampa finalCarl Hooker
 
iOS webinar on management
iOS webinar on managementiOS webinar on management
iOS webinar on managementCarl Hooker
 

More from Carl Hooker (10)

Digital parent night
Digital parent nightDigital parent night
Digital parent night
 
Space…The Final Learning Frontier - TCEA 2014
Space…The Final Learning Frontier - TCEA 2014Space…The Final Learning Frontier - TCEA 2014
Space…The Final Learning Frontier - TCEA 2014
 
10 Things Not to Do in a 1:1 iPad Classroom
10 Things Not to Do in a 1:1 iPad Classroom10 Things Not to Do in a 1:1 iPad Classroom
10 Things Not to Do in a 1:1 iPad Classroom
 
LEAP and Digital Learning at EanesISD
LEAP and Digital Learning at EanesISDLEAP and Digital Learning at EanesISD
LEAP and Digital Learning at EanesISD
 
Middle School iPad Parent Night
Middle School iPad Parent NightMiddle School iPad Parent Night
Middle School iPad Parent Night
 
Leap presentation
Leap presentationLeap presentation
Leap presentation
 
April 17th Westlake High School Visit
April 17th Westlake High School VisitApril 17th Westlake High School Visit
April 17th Westlake High School Visit
 
SXSWedu - March 7, 2012
SXSWedu - March 7, 2012SXSWedu - March 7, 2012
SXSWedu - March 7, 2012
 
Wifi presentation tampa final
Wifi presentation tampa finalWifi presentation tampa final
Wifi presentation tampa final
 
iOS webinar on management
iOS webinar on managementiOS webinar on management
iOS webinar on management
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 

Responsible use presentation

  • 1. Responsible Use Guidelines Eanes ISD
  • 2. • Text Messaging • Electronic Media Blogs • Posts • Tweets • Instant Messaging • email • Video Sharing • Comments posted • Social Network sites • Forums
  • 3. BYOT (Bring Your Own Technology) (Bring Your Own Technology) • Students can bring their own technology to connect. • We don’t support their devices technically • We are not responsible for their data plans as they can connect to our “Eanes Guest” network. • Must comply with the Responsible Use Guidelines
  • 4. Unacceptable and Irresponsible Use Unauthorized use of copyrighted materials or software licensing agreements
  • 5. Unacceptable and Irresponsible Use Sending or posting of abusive content
  • 6. Unacceptable and Irresponsible Use Use of technology to encourage illegal behavior or threaten school safety
  • 7. Unacceptable and Irresponsible Use Personal and/or political use to advocate for a candidate or political issue.
  • 8. Unacceptable and Irresponsible Use Attempting to destroy or disable district technology equipment, district data, or the data of other users or networks
  • 9. Unacceptable and Irresponsible Use Posting personal information about yourself or others (such as phone numbers or addresses) for non-school business
  • 10. Unacceptable and Irresponsible Use Forgery of electronic messages (email, posts, etc) or transmission of junk email.
  • 11. Unacceptable and Irresponsible Use Use of systems for commercial activities or commercial gain.
  • 12. Unacceptable and Irresponsible Use Wasting school resources through improper use of the computer systems.
  • 13. Unacceptable and Irresponsible Use Any use that violates the employee handbook or is illegal.
  • 14. Social Media & Cloud Storage • Notify parents prior to use if for a class project • Use of Facebook through a fan page acceptable • Use of all social media during work hours should be professional in nature.
  • 15. Social Media & Cloud Storage • Cannot use district logo without consent • Keep confidential files off of 3rd party cloud storage sites • Keep personal life and professional life separate on email, social media • Follow the Code of Ethics and Standard Practices for Texas Educators
  • 16. Code of Ethics and Standard Practices for Texas Educators Personal or Professional electronic communication which violates any of the following: •Confidentiality of student records •Confidentiality of health or personnel information concerning colleagues •Confidentiality of district records including evaluations and private email addreses •Harming others by knowingly making false statements about a colleague or the school system.
  • 17. Responsible Use Guidelines Eanes ISD