This document outlines standards of conduct for students including directives on uniforms, identification cards, attendance, and causes for disciplinary action. It details minor offenses like uniform violations and littering, as well as serious offenses like bullying, theft, and drug use. It provides penalties for offenses which range from reprimand to suspension to expulsion depending on the frequency and severity of the offense. The document also addresses examinations, cheating, and the election of HRPTA officers.
JahzjsjanznsbsnsnsbjsjsjzjznznznznznznznznzbaoabsizjsbzhxjzkNabz Alabamans sccbvdszkkzndnsjskakdjdjdjdjsjdndbdjsksjxnxjdjsjzjxjxjxnxn nzakosidjdjxjxskksjzjsjxjxnxnhxjdjdsjzkbjrsbhfgjyreadhjlkyfdvbmhgdvmgfdvcvccccahknbsksnhzinsbzksmsbzjdjsnbsbajksjshsbsnsuuatgjnwishsbskjsgsbskakshhzbsnsbsgxydjjjajznsjjamanzhzjsnsnznzbxhsjajznzbzhskakakMznznzbzbzjaksjdjndjsjjsnzbkamzmkznzkanxjshjahagjajahshsusjjshshshsjsisnjznaknzjakaoakanskskskkakajzjzjskakansjshuajsnsnzhjakaksnsjzjskaksnsnshzhsjsnamakoajsjxnaksjxnakkabsbsirijdikajsnzhxhzjsjsnannzjznxbjakamabjsjsnsjjsjsjsjsmsknznznsnsannsnzjzkzksnnzjfnxjsnkaznbxjjsnsnznzjajjajajsjsnansnjsnsnznsjsjsnanakknznznznznzjajjajsnsnananznxnnxnznznsnsnsnsnskkjnnjanajjsnsjsjzjsjskskksksksksksksksksjsjjsjskskskskskskskskksksksjzjzjzjjzjzjzjzjzjzkskksksksksiidididididudjxjzjaknznzjakkznznzjsjzjzjzjzjsjjsjsjsjzjsjsnanakskisjsxnnzkakznsjsjnzjzjzjjjzjzjzjsjzjzjjsjzjzjannzjzjdjejdjskajznxhxjsnznxhxjsjsnznxnsjjznzjakaksksjduudhdnxnzjskajshxbbznzkaksjsjznznznzbzbbzjajKanznzhdhsjzjjaksjsjznnxhsisnxhsbxnjskajznbzjsjskakznzhxhdjskajznzbxhxjznzjzkajsjduejdjdjnkKznnsjjamnzhsjjxjbxnnanznzjzjjeududjdjxnakkxhnsjznsnxjznzjznnznsnznjzjsjannJzjsjsjhdnxjznzkznznjskajznzjzjzjzjsjsjzjzjzjzjxjxjxjxjxjzjxjxjjzjznnznzbzbnjh Alaska hddgnxxbjgcvnjhfddcvhb hhdfjhddgh jajajsgkzhzbzjzjshagshzbzvzjakaisjshshshsbdjdjsjsjsksskkssjsjdjjddjjsdjjdjdjdjdjdjdjghjfjdfuufjdjxjcjchxjxjxhxduifjvugguycfzghdeauhihgcgxrdestdtfyguhojjhvgcyguggcgcugjbhvgcdyughfxdzhvgcfxhvhvjbmkakskksjznaoaosjsjsksksjznxjzjzjzjzjsoaoqueududhdhxjxkaisjsjizjsjzjjskalajzjzjsjzjjzjzjzjzjskakakznxhjjzjsnzjjKlajzhxjzjzjzjzjzjskaowishdhdhxnxjzkalajxnxnzhs slang Hi! We hope you're safe despite the rainfall brought about by Typhoon Goring. Here are some #AlagangGlobe tips so you and your loved ones stay safe and dry:
1) Store enough food and water.
2) Prepare an emergency bag with a flashlight, extra batteries, candles, and a first aid kit.
3) Be ready with extra clothes and a hygiene kit should there be a need to evacuate.
4) Charge your phones and power banks, and ensure communication lines remain open.
Take care and keep safe!
Hi! We hope you're safe despite the rainfall brought about by Typhoon Goring. Here are some #AlagangGlobe tips so you and your loved ones stay safe and dry:
1) Store enough food and water.
2) Prepare an emergency bag with a flashlight, extra batteries, candles, and a first aid kit.
3) Be ready with extra clothes and a hygiene kit should there be a need to evacuate.
4) Charge your phones and power banks, and ensure communication lines remain open.
Take care and keep safe!
Hi! We hope you're safe despite the rainfall brought about by Typhoon Goring. Here are some #AlagangGlobe tips so you and your loved ones stay safe and dry:
1) Store enough food and water.
2) Prepare an emergency bag with a flashlight, extra batteries, candles, and a first aid kit.
3) Be ready with extra clothes and a hygiene kit should there be a need to evacuate.
4) Charge your ph
JahzjsjanznsbsnsnsbjsjsjzjznznznznznznznznzbaoabsizjsbzhxjzkNabz Alabamans sccbvdszkkzndnsjskakdjdjdjdjsjdndbdjsksjxnxjdjsjzjxjxjxnxn nzakosidjdjxjxskksjzjsjxjxnxnhxjdjdsjzkbjrsbhfgjyreadhjlkyfdvbmhgdvmgfdvcvccccahknbsksnhzinsbzksmsbzjdjsnbsbajksjshsbsnsuuatgjnwishsbskjsgsbskakshhzbsnsbsgxydjjjajznsjjamanzhzjsnsnznzbxhsjajznzbzhskakakMznznzbzbzjaksjdjndjsjjsnzbkamzmkznzkanxjshjahagjajahshsusjjshshshsjsisnjznaknzjakaoakanskskskkakajzjzjskakansjshuajsnsnzhjakaksnsjzjskaksnsnshzhsjsnamakoajsjxnaksjxnakkabsbsirijdikajsnzhxhzjsjsnannzjznxbjakamabjsjsnsjjsjsjsjsmsknznznsnsannsnzjzkzksnnzjfnxjsnkaznbxjjsnsnznzjajjajajsjsnansnjsnsnznsjsjsnanakknznznznznzjajjajsnsnananznxnnxnznznsnsnsnsnskkjnnjanajjsnsjsjzjsjskskksksksksksksksksjsjjsjskskskskskskskskksksksjzjzjzjjzjzjzjzjzjzkskksksksksiidididididudjxjzjaknznzjakkznznzjsjzjzjzjzjsjjsjsjsjzjsjsnanakskisjsxnnzkakznsjsjnzjzjzjjjzjzjzjsjzjzjjsjzjzjannzjzjdjejdjskajznxhxjsnznxhxjsjsnznxnsjjznzjakaksksjduudhdnxnzjskajshxbbznzkaksjsjznznznzbzbbzjajKanznzhdhsjzjjaksjsjznnxhsisnxhsbxnjskajznbzjsjskakznzhxhdjskajznzbxhxjznzjzkajsjduejdjdjnkKznnsjjamnzhsjjxjbxnnanznzjzjjeududjdjxnakkxhnsjznsnxjznzjznnznsnznjzjsjannJzjsjsjhdnxjznzkznznjskajznzjzjzjzjsjsjzjzjzjzjxjxjxjxjxjzjxjxjjzjznnznzbzbnjh Alaska hddgnxxbjgcvnjhfddcvhb hhdfjhddgh jajajsgkzhzbzjzjshagshzbzvzjakaisjshshshsbdjdjsjsjsksskkssjsjdjjddjjsdjjdjdjdjdjdjdjghjfjdfuufjdjxjcjchxjxjxhxduifjvugguycfzghdeauhihgcgxrdestdtfyguhojjhvgcyguggcgcugjbhvgcdyughfxdzhvgcfxhvhvjbmkakskksjznaoaosjsjsksksjznxjzjzjzjzjsoaoqueududhdhxjxkaisjsjizjsjzjjskalajzjzjsjzjjzjzjzjzjskakakznxhjjzjsnzjjKlajzhxjzjzjzjzjzjskaowishdhdhxnxjzkalajxnxnzhs slang Hi! We hope you're safe despite the rainfall brought about by Typhoon Goring. Here are some #AlagangGlobe tips so you and your loved ones stay safe and dry:
1) Store enough food and water.
2) Prepare an emergency bag with a flashlight, extra batteries, candles, and a first aid kit.
3) Be ready with extra clothes and a hygiene kit should there be a need to evacuate.
4) Charge your phones and power banks, and ensure communication lines remain open.
Take care and keep safe!
Hi! We hope you're safe despite the rainfall brought about by Typhoon Goring. Here are some #AlagangGlobe tips so you and your loved ones stay safe and dry:
1) Store enough food and water.
2) Prepare an emergency bag with a flashlight, extra batteries, candles, and a first aid kit.
3) Be ready with extra clothes and a hygiene kit should there be a need to evacuate.
4) Charge your phones and power banks, and ensure communication lines remain open.
Take care and keep safe!
Hi! We hope you're safe despite the rainfall brought about by Typhoon Goring. Here are some #AlagangGlobe tips so you and your loved ones stay safe and dry:
1) Store enough food and water.
2) Prepare an emergency bag with a flashlight, extra batteries, candles, and a first aid kit.
3) Be ready with extra clothes and a hygiene kit should there be a need to evacuate.
4) Charge your ph
School of Computer & Information SciencesCOURSE.docxpoulterbarbara
School of Computer & Information Sciences
COURSE SYLLABUS
Course and Instructor Information
Course Name
ISOL/MSDF 633 – Legal, Regulations, Investigations, and Compliance
Section – 21
Summer 2020 – Full Term
Course Format: Hybrid Course with Required Residency
Residency Session Date: May 29, 2020 – May 31, 2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Northern Kentucky Campus – ONLINE FORMAT
Professor
Melissa S. Gruner, J.D. – Adjunct Professor
Contact Information
Email: [email protected]
Office Location: Remote
Office Hours: By appointment
Nature of Course Content and Goals
Course Description
The course examines computer crimes, laws and regulations. It includes techniques for investigating a
crime, gathering evidence, and communicating results.
Course Objectives/
Learner Outcomes/ Assessments
Upon completion of this course, the student will:
· Recognize the legal aspects of information security systems.
· Examine the concept of privacy and its legal protections.
· Identify the basic components of the American legal system.
· Describe legal compliance laws addressing how public and private institutions protect the security and privacy of consumer financial information.
· Analyze intellectual property laws.
· Describe the role of contracts in online transactions and cyberspace.
· Identify cybercrime and tort law issues in cyberspace.
· Examine the principles requiring governance of information within organizations.
· Identify risk analysis and incident response procedures.
· Explain the importance of forensic examination in legal proceedings.
Course Website
Access to the course website is required via the iLearn portal on the University of the Cumberlands website: http://www.ucumberlands.edu/ilearn/
Books and Resources
Grama, Joanna Lyn. Legal Issues in Information Security, 2nd ed. Burlington, MA: Jones & Bartlett Learning, 2015
Student Lab Manual and Lab Access Key (also known as supplemental Lessons)
· YOU MUST HAVE THIS TO TAKE THE QUIZZES!
Other articles and readings may be assigned by course professor. Requirements and Policies
Academic Integrity/ Plagiarism
At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:
· Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities.
· Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations.
· Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation
Plagiarism includes copyin.
School of Computer & Information SciencesCOURSE.docxgertrudebellgrove
School of Computer & Information Sciences
COURSE SYLLABUS
Course and Instructor Information
Course Name
ISOL/MSDF 633 – Legal, Regulations, Investigations, and Compliance
Section – 21
Summer 2020 – Full Term
Course Format: Hybrid Course with Required Residency
Residency Session Date: May 29, 2020 – May 31, 2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Northern Kentucky Campus – ONLINE FORMAT
Professor
Melissa S. Gruner, J.D. – Adjunct Professor
Contact Information
Email: [email protected]
Office Location: Remote
Office Hours: By appointment
Nature of Course Content and Goals
Course Description
The course examines computer crimes, laws and regulations. It includes techniques for investigating a
crime, gathering evidence, and communicating results.
Course Objectives/
Learner Outcomes/ Assessments
Upon completion of this course, the student will:
· Recognize the legal aspects of information security systems.
· Examine the concept of privacy and its legal protections.
· Identify the basic components of the American legal system.
· Describe legal compliance laws addressing how public and private institutions protect the security and privacy of consumer financial information.
· Analyze intellectual property laws.
· Describe the role of contracts in online transactions and cyberspace.
· Identify cybercrime and tort law issues in cyberspace.
· Examine the principles requiring governance of information within organizations.
· Identify risk analysis and incident response procedures.
· Explain the importance of forensic examination in legal proceedings.
Course Website
Access to the course website is required via the iLearn portal on the University of the Cumberlands website: http://www.ucumberlands.edu/ilearn/
Books and Resources
Grama, Joanna Lyn. Legal Issues in Information Security, 2nd ed. Burlington, MA: Jones & Bartlett Learning, 2015
Student Lab Manual and Lab Access Key (also known as supplemental Lessons)
· YOU MUST HAVE THIS TO TAKE THE QUIZZES!
Other articles and readings may be assigned by course professor. Requirements and Policies
Academic Integrity/ Plagiarism
At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:
· Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities.
· Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations.
· Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation
Plagiarism includes copyin.
Students guide in school. This contains rules and regulations of the school as well as the the rights and privileges of the students. Given also are the roles of the school in providing quality education. Included also are the roles of the parents in the education of their children.
School of Computer & Information SciencesCOURSE.docxpoulterbarbara
School of Computer & Information Sciences
COURSE SYLLABUS
Course and Instructor Information
Course Name
ISOL/MSDF 633 – Legal, Regulations, Investigations, and Compliance
Section – 21
Summer 2020 – Full Term
Course Format: Hybrid Course with Required Residency
Residency Session Date: May 29, 2020 – May 31, 2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Northern Kentucky Campus – ONLINE FORMAT
Professor
Melissa S. Gruner, J.D. – Adjunct Professor
Contact Information
Email: [email protected]
Office Location: Remote
Office Hours: By appointment
Nature of Course Content and Goals
Course Description
The course examines computer crimes, laws and regulations. It includes techniques for investigating a
crime, gathering evidence, and communicating results.
Course Objectives/
Learner Outcomes/ Assessments
Upon completion of this course, the student will:
· Recognize the legal aspects of information security systems.
· Examine the concept of privacy and its legal protections.
· Identify the basic components of the American legal system.
· Describe legal compliance laws addressing how public and private institutions protect the security and privacy of consumer financial information.
· Analyze intellectual property laws.
· Describe the role of contracts in online transactions and cyberspace.
· Identify cybercrime and tort law issues in cyberspace.
· Examine the principles requiring governance of information within organizations.
· Identify risk analysis and incident response procedures.
· Explain the importance of forensic examination in legal proceedings.
Course Website
Access to the course website is required via the iLearn portal on the University of the Cumberlands website: http://www.ucumberlands.edu/ilearn/
Books and Resources
Grama, Joanna Lyn. Legal Issues in Information Security, 2nd ed. Burlington, MA: Jones & Bartlett Learning, 2015
Student Lab Manual and Lab Access Key (also known as supplemental Lessons)
· YOU MUST HAVE THIS TO TAKE THE QUIZZES!
Other articles and readings may be assigned by course professor. Requirements and Policies
Academic Integrity/ Plagiarism
At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:
· Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities.
· Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations.
· Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation
Plagiarism includes copyin.
School of Computer & Information SciencesCOURSE.docxgertrudebellgrove
School of Computer & Information Sciences
COURSE SYLLABUS
Course and Instructor Information
Course Name
ISOL/MSDF 633 – Legal, Regulations, Investigations, and Compliance
Section – 21
Summer 2020 – Full Term
Course Format: Hybrid Course with Required Residency
Residency Session Date: May 29, 2020 – May 31, 2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Northern Kentucky Campus – ONLINE FORMAT
Professor
Melissa S. Gruner, J.D. – Adjunct Professor
Contact Information
Email: [email protected]
Office Location: Remote
Office Hours: By appointment
Nature of Course Content and Goals
Course Description
The course examines computer crimes, laws and regulations. It includes techniques for investigating a
crime, gathering evidence, and communicating results.
Course Objectives/
Learner Outcomes/ Assessments
Upon completion of this course, the student will:
· Recognize the legal aspects of information security systems.
· Examine the concept of privacy and its legal protections.
· Identify the basic components of the American legal system.
· Describe legal compliance laws addressing how public and private institutions protect the security and privacy of consumer financial information.
· Analyze intellectual property laws.
· Describe the role of contracts in online transactions and cyberspace.
· Identify cybercrime and tort law issues in cyberspace.
· Examine the principles requiring governance of information within organizations.
· Identify risk analysis and incident response procedures.
· Explain the importance of forensic examination in legal proceedings.
Course Website
Access to the course website is required via the iLearn portal on the University of the Cumberlands website: http://www.ucumberlands.edu/ilearn/
Books and Resources
Grama, Joanna Lyn. Legal Issues in Information Security, 2nd ed. Burlington, MA: Jones & Bartlett Learning, 2015
Student Lab Manual and Lab Access Key (also known as supplemental Lessons)
· YOU MUST HAVE THIS TO TAKE THE QUIZZES!
Other articles and readings may be assigned by course professor. Requirements and Policies
Academic Integrity/ Plagiarism
At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:
· Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities.
· Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations.
· Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation
Plagiarism includes copyin.
Students guide in school. This contains rules and regulations of the school as well as the the rights and privileges of the students. Given also are the roles of the school in providing quality education. Included also are the roles of the parents in the education of their children.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
2. DEPED VISION
We dream of Filipinos
who passionately love their country
and whose values and competencies
enable them to realize their full potential
and contribute meaningfully to building the nation.
As a learner-centered public institution,
the Department of Education
continuously improves itself
to better serve its stakeholders.
3. DEPED MISSION
To protect and promote the right of every
Filipino to quality, equitable, culture-based, and
complete basic education
where:
Students learn in a child-friendly, gender-
sensitive, safe, and motivating environment.
Teachers facilitate learning and constantly nurture
every learner.
4.
5. Directives on Discipline
Uniforms –
The school requires the students to attend classes
and other official functions of the school in their
prescribed school uniform
Identification Card
Every Student shall be required to wear the
official school I.D. card while inside the school
premises. The same ID shall be presented for
entry and for the use of the school facilities
and/or services.
The loss of an I.D. card shall be reported
immediately by the student to the Discipline
Board, which shall determine if the student
should be issued a new I.D.
6. Attendance and Absences
The school requires regular and punctual
attendance in all classes. Absence for any
cause whatsoever does not exempt a
student from written work (tests) and any
matters required during the period of his/her
absence. The responsibility for making up
for such work depends upon the students.
In all cases of absences, an admission
and /or excuse slip must be secured from
the Guidance Office upon the presentation
satisfactory to said school officials. The
excuse slip has to be certified by the class
adviser or in his/her absence by the
guidance counselors.
7. Three instances of tardiness without valid reasons are
equivalent to one absence. All cases of tardiness are
considered unjustified unless a letter signed by the
parent/guardian is presented to the advisers.
Absences due to illness must be certified by a doctor. The
implementation or appreciation of the rules on attendance
may be modified at the discretion of the principal.
A student who incurs ten (10) consecutive absences or
twenty (20) days inconsecutive absences in any subject area
shall be notified by the member of the Discipline Board.
Failure on the part of the parents to appear shall be ground
for the school principal to drop him/her from the school roll of
students.
A student who cuts classes shall not be admitted in all
8. Code of Discipline:
The legal basis of the school’s authority to
discipline the student is provided the manual of regulation of
the Dep Ed, which says on:
“Rule 145…
Schools shall have the authority and prerogative to
promulgate such rules and regulations as they may deem
necessary from time to time effective as of the date of their
promulgation unless otherwise specified.
No penalty shall be imposed upon the student, except
for cause as defined in this Manual and/or in the school’s
rules and regulation duly promulgated and only after due
investigation shall have been conducted
9. Causes for Disciplinary
Action
The following are whereby
disciplinary administrative sanctions
shall be meted out after due
investigation by the Discipline Board.
10. MINOR OFFENSES
Violation of uniform and/or haircut regulation.
Not wearing/borrowing or lending and /or
tampering of I.D.
Bringing to school, without permission of the
principal, recorders, transistor radio, game
and watch, cell phones and other items that
tend to disrupt classes.
Littering and spitting Sitting on the tables and
arms of chairs.
Wasteful use of chalk and / or writing on the
blackboard without the teacher’s permission.
11. Loitering along the corridors or hallways when
classes are going on.
Disturbance, obstruction or interference with
the normal functioning of classes, school
offices, and recognized school activities such
as borrowing of pen books, etc. during class
hours
Roaming around the room during class
sessions and or occupying the seat assigned
to someone else
Entering the faculty room without valid reason.
Fighting, quarrelling within the school
premises, and/or on its immediate vicinity.
12. Violation of City Ordinance no. 2002-090 on Anti
Smoking
Violation of City Ordinance no. 03 on Anti
Littering
Violation of City Ordinance no. 2001-074 on
renting out explicitly and overtly violent computer
games and softwares.
Violation of City Ordinance no. 2002-122 on
entering and hanging out in billiard halls,
video/computer arcades/shops, movie houses or
malls during school hours.
13. Violation of City Ordinance no.
2001-098 on buying rugby and
other solvents
Violation of City Ordinance no.
2001-092 Curfew hours for minors
from 10:00 pm to 4:00 am.
Using cell phone during class
hours.
14. SERIOUS OFFENSES
Extortion
Drunkenness and/or drinking liquor within
the school premises.
Theft or damage to property of the school
or its constituents
Dishonesty such as cheating during
examination
Forgery, alteration or misuse of school
documents, records or credentials.
15. Vandalism which includes tearing or
defacing any library books or
periodicals, drawing or posting
unauthorized notices on the walls,
fences, post and other parts of the
school building, breakage of glass
windows, school cases, doors. Electrical
devices, unauthorized removal of official
notices poster, from the Bulletin Boards
and other similar acts.
16. Bullying - Any severe or repeated use by
one or more students of a written, verbal
or electronic expression, or a physical
act or gesture, or any combination
thereof, directed at another student that
has the effect of actually causing or
placing the latter in reasonable fear of
physical or emotional harm or damage
to his property; creating a hostile
environment at school for the other
student; infringing on the rights of the
other student at school; or materially
and substantially disrupting the
17. Any unwanted physical contact
between the bully and the victim;
Any act that causes damage to a
victim’s psyche and/or emotional
well-being;
Any slanderous statement or
accusation that causes the victim
undue emotional distress; and
Cyber-bullying or any bullying done
through the use of technology or
any electronic means.
18. “Cyber- bullying” or any bullying done through the
use of technology or any electronic means. The
term shall also include any conduct resulting to
harassment, intimidation, or humiliation, through
the use of other forms of technology, such as, but
not limited to texting, email, instant messaging,
chatting, internet, social media, online games, or
other platforms or formats as defined in DepED
Order No. 40, s. 2012; and
Any other form of bullying as may be provided in
the school’s child protection or anti-bullying policy,
consistent with the Act and this IRR.
19. “Social bullying” - any
deliberate, repetitive and
aggressive social behavior
intended to hurt others or to
belittle another individual or
group.
“Gender-based bullying” - any
act that humiliates or excludes a
person on the basis of
20. Possession, illegal use or distribution of
narcotic drugs such as LSD, marijuana,
barbiturates or operate in any form within
the school premises.
Illegal possession or use of explosive,
incendiary devices or other deadly
weapons.
Engaging in any form of gambling within
the school compound Engaging in lewd,
indecent or immoral conduct within the
premises.
Participating in fraternities
21. PENALTIES
The school reserves the
right, after due investigation, to
subject a student found violating
the rules on discipline to the
following penalties depending
upon the nature and gravity of
the offense committed
22. MINOR OFFENSES
1st Offense
Reprimand-parents to see the Principal
2nd Offense
Suspension-and-failing grade in conduct
3rd Offense
Drop student from the school roll
23. SERIOUS OFFENSES
1st Offense
Parents see the Principal. Suspension
2nd Offense
Submit an affidavit that a repetition of the same
offense or any serious offense committed is subject
for expulsion. Give failing grade in conduct
3rd Offense
Drop student from the school roll.
24. Chapter VI School Discipline –B.
Suspension/ Expulsion (Sec. 145-
151, Part VI, Chapter III, Service
Manual 1960).
“ For a persistent offender or one guilty of a
serious offense, a suspension for not more
than one year may be imposed subject to the
approval of the Division Superintendent.”
26. EXAMINATIONS:
A. A student shall take the prescribed
periodical examinations scheduled
during the year. However, a
student who, because of justifiable
reasons, fails to take the
examination, may be given a
special examination upon the
discretion of the Discipline Board
27. B. The term cheating during examination
means not only actual copying from
someone but also the possession of
the examinee either in his/her person
or within his/her reach any material
related to the subject matter under
examination. Giving another answer is
also a form of cheating, as well as
providing another opportunity to cheat,
like talking to, looking or holding
another paper.
28. NOTE: Cheating in any examination
makes one an undesirable
student
1st OFFENSE – The student fails in the test
concerned and shall be given 60 in
the conduct grade of the subject
2nd OFFENSE - The student fails in the subject
concerned and conduct grade in all
subjects will be 60.
3rd OFFENSE – The student is dropped from
the roll. (An investigation of the
case shall be conducted
by the Discipline Board and the
29. Election of HRPTA Officers
PRESIDENT:
VICE-PRESIDENT:
SECRETARY:
TREASURER:
AUDITOR:
30. elected PTA President will attend the
Grade Level Representative Election
HRPTA Officers - Accomplish the