SlideShare a Scribd company logo
Acceptable Use Policy
Rules Governing Use of
USD458 Computers

Basehor-Linwood Middle School
The User Shall Not…
• Erase, change, rename, or make
  unusable anyone else’s
  computer files or programs.
The User Shall Not…
• Let other persons use his or her
  name, logon, password, or files
  for any reason (unless
  authorized by a staff member or
  principal).
The User Shall Not…
• Use or attempt to discover
  another user’s password or in
  any way access another
  person’s records or files (unless
  authorized by a staff member or
  principal).
The User Shall Not…
• Use district computers or
  networks for any non-
  instructional or non-
  administrative purpose.
  – Example: Non-instructional games,
    random/non-instructional internet
    searches
The User Shall Not…
• Use a computer for unlawful
  purposes, such as illegal
  copying or installation of
  software.
The User Shall Not…
• Copy, change, or transfer any
  software or documentation
  provided by district schools,
  teachers, or other students
  without permission.
The User Shall Not…
• Write, produce, generate, copy,
  or attempt to introduce any
  computer code designed to
  damage or hinder performance
  of any computer, file system, or
  software.
  – Access to personal email is not
    permitted.
The User Shall Not…
• Deliberately use the computer
  to annoy or harass others with
  language, images, sounds,
  innuendoes, or threats.
• Deliberately access or create
  any obscene or objectionable
  information, language, or
  images.
The User Shall Not…
• Intentionally damage the
  system, damage information
  belonging to others, misuse
  system resources, or allow
  others to misuse system
  software.
 – (User will be held financially
   responsible for costs associated
   with intentional damages or those
   due to user’s negligence.)
The User Shall Not…
• Alter hardware setup of or
  software settings on computers,
  networks, printers, or other
  equipment (unless authorized by
  a staff member or principal).
The User Shall Not…
• Install software on district
  computers (unless authorized by
  a staff member or building
  principal).
The User Shall Not…
• Access any computer, computer
  software, or files without
  permission from a staff member
  or principal.
Violation of this policy…
• First offense: Results in the loss of
  all district-wide computer privileges
  for a minimum of two weeks.*
• Second offense: Results in the loss of
  all district-wide computer privileges
  for the remainder of the school year.*
    *All consequences are determined by building
     principal based on the nature of the offense
     and the discipline policy in place in that
     building.
Beware…
• Providing personal information about
  yourself is not permitted while
  accessing internet sites.
• Blogs, chat rooms, unsolicited email,
  and sites such as MySpace and
  Xanga can put you at risk! They are
  not permitted at BLMS!
Ignorance Is No
Excuse…
• If you are unsure of your teacher’s
  rules and expectations regarding
  computer usage, ask!
• Reading teachers have special rules
  and procedures relating to STAR and
  AR tests and file access…know
  them!
• If you see computer damage or
  misuse, report it immediately!
Please Remember…
• Computer use is a privilege
  – Don’t deny yourself the opportunity
    to use such a valuable, educational
    tool!
• BE RESPONSIBLE!

More Related Content

Similar to USD458 AUP Presentation

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
gfair3
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentation
Carl Hooker
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyKoolteechatechnology
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
Sarah Sutter
 
Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Agreement for Use of Technology for Families
Agreement for Use of Technology for Families
Matthew Rathbun
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditTamir Harper
 
Presentation computer ethics
Presentation computer ethicsPresentation computer ethics
Presentation computer ethicsYuyul Yieyien
 
Sample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper GradesSample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper Grades
cck008
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbookJG4191
 
It school policy
It school policyIt school policy
It school policyRach Stiell
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
Arti Parab Academics
 

Similar to USD458 AUP Presentation (20)

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentation
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
CMS Technology acceptable use policy
CMS Technology acceptable use policyCMS Technology acceptable use policy
CMS Technology acceptable use policy
 
Technology acceptable use policy gr 7 day 1
Technology acceptable use policy   gr 7 day 1Technology acceptable use policy   gr 7 day 1
Technology acceptable use policy gr 7 day 1
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Agreement for Use of Technology for Families
Agreement for Use of Technology for Families
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
bk
bkbk
bk
 
Presentation computer ethics
Presentation computer ethicsPresentation computer ethics
Presentation computer ethics
 
Sample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper GradesSample Acceptable Use Policy Upper Grades
Sample Acceptable Use Policy Upper Grades
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbook
 
It school policy
It school policyIt school policy
It school policy
 
Acceptable Use Agreement Students 2011
Acceptable Use Agreement Students 2011Acceptable Use Agreement Students 2011
Acceptable Use Agreement Students 2011
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 

Recently uploaded

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

USD458 AUP Presentation

  • 1. Acceptable Use Policy Rules Governing Use of USD458 Computers Basehor-Linwood Middle School
  • 2. The User Shall Not… • Erase, change, rename, or make unusable anyone else’s computer files or programs.
  • 3. The User Shall Not… • Let other persons use his or her name, logon, password, or files for any reason (unless authorized by a staff member or principal).
  • 4. The User Shall Not… • Use or attempt to discover another user’s password or in any way access another person’s records or files (unless authorized by a staff member or principal).
  • 5. The User Shall Not… • Use district computers or networks for any non- instructional or non- administrative purpose. – Example: Non-instructional games, random/non-instructional internet searches
  • 6. The User Shall Not… • Use a computer for unlawful purposes, such as illegal copying or installation of software.
  • 7. The User Shall Not… • Copy, change, or transfer any software or documentation provided by district schools, teachers, or other students without permission.
  • 8. The User Shall Not… • Write, produce, generate, copy, or attempt to introduce any computer code designed to damage or hinder performance of any computer, file system, or software. – Access to personal email is not permitted.
  • 9. The User Shall Not… • Deliberately use the computer to annoy or harass others with language, images, sounds, innuendoes, or threats. • Deliberately access or create any obscene or objectionable information, language, or images.
  • 10. The User Shall Not… • Intentionally damage the system, damage information belonging to others, misuse system resources, or allow others to misuse system software. – (User will be held financially responsible for costs associated with intentional damages or those due to user’s negligence.)
  • 11. The User Shall Not… • Alter hardware setup of or software settings on computers, networks, printers, or other equipment (unless authorized by a staff member or principal).
  • 12. The User Shall Not… • Install software on district computers (unless authorized by a staff member or building principal).
  • 13. The User Shall Not… • Access any computer, computer software, or files without permission from a staff member or principal.
  • 14. Violation of this policy… • First offense: Results in the loss of all district-wide computer privileges for a minimum of two weeks.* • Second offense: Results in the loss of all district-wide computer privileges for the remainder of the school year.* *All consequences are determined by building principal based on the nature of the offense and the discipline policy in place in that building.
  • 15. Beware… • Providing personal information about yourself is not permitted while accessing internet sites. • Blogs, chat rooms, unsolicited email, and sites such as MySpace and Xanga can put you at risk! They are not permitted at BLMS!
  • 16. Ignorance Is No Excuse… • If you are unsure of your teacher’s rules and expectations regarding computer usage, ask! • Reading teachers have special rules and procedures relating to STAR and AR tests and file access…know them! • If you see computer damage or misuse, report it immediately!
  • 17. Please Remember… • Computer use is a privilege – Don’t deny yourself the opportunity to use such a valuable, educational tool! • BE RESPONSIBLE!