SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Technology Acceptable Use
Policy
  Lockhart ISD
Technology Acceptable Use Policy

  Purpose
  StaffTechnology Acceptable Use Policy
  Student Technology Acceptable Use
   Policy
  User Agreements
Technology Acceptable Use Policy

PURPOSE
Purpose

  Enhance  quality of student learning
  Enhance staff & student efficiency
  Ensure protection of students and staff
  Protect hardware and software
  Sets standards for technology usage
Governances

  School
  Local,  state and federal law
  LISD has a duty to investigate suspected
   violations
Technology Resources

  Any electronic tool, device, program, or
   system that aids the educational and
   work environment
  Personal devices are included in the
   AUP
    Must  meet LISD minimum requirements—
     virus protection software
    Approved by technology department or
     campus administrator
Technology Acceptable Use Policy

STAFF TECHNOLOGY
ACCEPTABLE USE POLICY
Staff Technology Acceptable
Use Policy
  LISD  employees
   follow an acceptable
   use policy
Technology Acceptable Use Policy

STUDENT TECHNOLOGY
ACCEPTABLE USE POLICY
Student Technology Acceptable
Use Policy
  Established    for limited educational purposes
      Classroom activities, career development, limited
       high-quality self-discovery activities
  Not  a public access service or public forum
  Student has access unless a parent/guardian
   denies access
  All activity is monitored
  Follow same rules, good manners and
   common sense guidelines used with other
   daily school activities
General Unacceptable Behavior
  Posting  information that will cause damage or
   disruption of technology
  Engaging in personal attacks
  Harassing another person
  Posting false or defamatory information
  Using criminal speech
  Using speech inappropriate in an educational
   setting
General Unacceptable Behavior
  Abusing    network resources–chain letters
  Displaying, accessing or sending offensive
   messages or pictures
  Using for commercial purposes—garage
   sales, fundraisers, benefits
  Political lobbying
  Accessing unauthorized district systems—
   Skyward
General Unacceptable Behavior
  Using district resources to threaten employees
  Sending or posting messages that are
    Abusive
    Obscene

    Sexually oriented

    Threatening

    Harassing

    Damaging to another’s reputation

    Illegal

    Bullying
E-Mail
    Students will only use teacher or classroom accounts
    No private email is allowed
    Students cannot create private accounts at school
    Students will not repost a message that was sent to
     them privately without the permission of the person
     who sent them the message.
    Students will not post private information about
     another person.
World Wide Web
                    Online textbooks and
                     curriculum sites
                    Sites will be actively
                     monitored by teachers
                     and the technology
                     department
                    Annual Internet safety
                     training for students
Real-time, Interactive
Communication Areas
  Blogs,  Wikis, &
   Social Networking
   will only be used
   when directed by the
   teacher
  Use only to support
   educational activities
School Web Sites
    Class websites may have
       Group pictures without identification

       Individual students without identification

       Student work with first name only

    Materials on web must meet academic standards
    Graphics, text, sound, etc. must have copyright
     approval
    Must have link back to campus/district
Personal Safety
    Students will not share personal contact information
     about themselves or other people.
        Address
        Telephone
        School address
        Home address
    Do not give full name or any other personal contact
     information for any purpose.
    Do not agree to meet with someone you have met
     online.
    Tell an adult if any message received is inappropriate
     or makes you feel uncomfortable
System Security
    Students should secure user names and passwords
    Notify an adult if a security problem has been
     identified
    Do not attempt to gain unauthorized access to LISD
     network
    Do not attempt to disrupt the network or destroy data
    Do not attempt to access blocked sites
    Do not use sniffing or remote access technology to
     monitor network activity
    Do not create unauthorized networks
Software and Files
                        Software is for educational
                         use
                        Permission is needed to
                         install, upload or download
                         software
                        Intentional misuse may
                         result in disciplinary action
                        Electronic files are not
                         private
                        USB devices should be
                         used for storage only—not
                         software
Technology Hardware
                   Used for educational
                    purposes
                   Do not relocate
                    hardware
                   LISD regulates
                    hardware/software on
                    the network including
                    personal devices
                   LISD equipment may
                    only be used to support
                    educational goals
Vandalism
  Any   malicious
   attempt to harm or
   destroy data or the
   network will result in
   cancellation of
   network privileges
  Disciplinary measure
   will be enforced
Plagiarism and Copyright Infringement

  Plagiarism   is not
   allowed
  Copyright laws
   govern use of
   material
  Copyrighted material
   used in the district
   must have author’s
   permission
Videoconference

  Videoconferencing   is allowed
  May be videotaped by district personnel
  School acceptable use and behavior
   rules apply during conferences
Student Rights

  Electronic  network is a
   limited forum for valid
   educational purposes
  Searches will be
   conducted if there is
   reasonable suspicion
   of a violation
Due Process

  LISD  will cooperate with local, state or
   federal officials if illegal activities occur
  Student will be provided with notice and
   an opportunity to be heard in the manner
   set forth in the disciplinary code
Violations of this Acceptable Use
Policy
  Violations of this policy may result in loss
   of access as well as other disciplinary or
   legal action.
  Examples:
    Use of district network only under direct supervision
    Suspension of network privileges
    Revocation of network privileges
    Suspension of computer privileges
    Suspension from school
    Expulsion from school and/or
    Legal action and prosecution by the authorities
Student User Agreement
 Student Name ___________________________________
 Grade ________ School ________________________________________

 I have read the Lockhart ISD Student Technology Acceptable Use Policy
     Rules and Procedures document. I agree to follow the rules contained in
     this policy. I understand that if I violate the rules my access can be
     terminated and I may face other disciplinary measures.

 Student Signature _____________________________________________
 Date ________________

Weitere ähnliche Inhalte

Was ist angesagt?

Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs studentsvlbrown
 
Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conductsupunls
 
Et 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training sessionEt 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training sessionMichelle Abee
 
Williamsburg school internet policy
Williamsburg school internet policyWilliamsburg school internet policy
Williamsburg school internet policydsansford
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Paula Naugle
 
ICT Acceptable Use POLICY
ICT Acceptable Use POLICYICT Acceptable Use POLICY
ICT Acceptable Use POLICYDebbie Oliver
 
Student RUP Agreement explained
Student RUP Agreement explainedStudent RUP Agreement explained
Student RUP Agreement explainedShawn Wyble
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPSJeanette Murphy
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreementPaula Naugle
 
Safety Presentation
Safety PresentationSafety Presentation
Safety PresentationSarah Sutter
 
Aup lesson for vll students
Aup lesson for vll studentsAup lesson for vll students
Aup lesson for vll studentsdlwadsworth
 
BYOD presentation- Young Women's Leadership Academy
BYOD presentation- Young Women's Leadership AcademyBYOD presentation- Young Women's Leadership Academy
BYOD presentation- Young Women's Leadership Academyshthornt
 
R B S C P
R B S  C PR B S  C P
R B S C PMICDS
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 

Was ist angesagt? (18)

Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Technology acceptable use policy gr 7 day 1
Technology acceptable use policy   gr 7 day 1Technology acceptable use policy   gr 7 day 1
Technology acceptable use policy gr 7 day 1
 
Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conduct
 
Et 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training sessionEt 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training session
 
Williamsburg school internet policy
Williamsburg school internet policyWilliamsburg school internet policy
Williamsburg school internet policy
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630
 
ICT Acceptable Use POLICY
ICT Acceptable Use POLICYICT Acceptable Use POLICY
ICT Acceptable Use POLICY
 
Student RUP Agreement explained
Student RUP Agreement explainedStudent RUP Agreement explained
Student RUP Agreement explained
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPS
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
Studying online
Studying onlineStudying online
Studying online
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Aup lesson for vll students
Aup lesson for vll studentsAup lesson for vll students
Aup lesson for vll students
 
BYOD presentation- Young Women's Leadership Academy
BYOD presentation- Young Women's Leadership AcademyBYOD presentation- Young Women's Leadership Academy
BYOD presentation- Young Women's Leadership Academy
 
R B S C P
R B S  C PR B S  C P
R B S C P
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 

Andere mochten auch

How hr can get a seat at the CEo's table
How hr can get a seat at the CEo's tableHow hr can get a seat at the CEo's table
How hr can get a seat at the CEo's tableRashmi Rawat
 
Technology internet rules 08202011[1]
Technology internet rules 08202011[1]Technology internet rules 08202011[1]
Technology internet rules 08202011[1]ajdredla
 
Securing HR's Seat at the Table: Developing and Selling Strategic Strategic "...
Securing HR's Seat at the Table: Developing and Selling Strategic Strategic "...Securing HR's Seat at the Table: Developing and Selling Strategic Strategic "...
Securing HR's Seat at the Table: Developing and Selling Strategic Strategic "...Integrated Healthcare Strategies
 
SharedCanvas: Dealing with Uncertainty in Digital Facsimiles
SharedCanvas: Dealing with Uncertainty in Digital FacsimilesSharedCanvas: Dealing with Uncertainty in Digital Facsimiles
SharedCanvas: Dealing with Uncertainty in Digital FacsimilesRobert Sanderson
 
DEALING WITH UNCERTAINITY
DEALING WITH UNCERTAINITYDEALING WITH UNCERTAINITY
DEALING WITH UNCERTAINITYVJIMPGDM
 
Challenges of dealing with uncertainty
Challenges of dealing with uncertaintyChallenges of dealing with uncertainty
Challenges of dealing with uncertaintyBob Prieto
 

Andere mochten auch (7)

How hr can get a seat at the CEo's table
How hr can get a seat at the CEo's tableHow hr can get a seat at the CEo's table
How hr can get a seat at the CEo's table
 
Technology internet rules 08202011[1]
Technology internet rules 08202011[1]Technology internet rules 08202011[1]
Technology internet rules 08202011[1]
 
Securing HR's Seat at the Table: Developing and Selling Strategic Strategic "...
Securing HR's Seat at the Table: Developing and Selling Strategic Strategic "...Securing HR's Seat at the Table: Developing and Selling Strategic Strategic "...
Securing HR's Seat at the Table: Developing and Selling Strategic Strategic "...
 
SharedCanvas: Dealing with Uncertainty in Digital Facsimiles
SharedCanvas: Dealing with Uncertainty in Digital FacsimilesSharedCanvas: Dealing with Uncertainty in Digital Facsimiles
SharedCanvas: Dealing with Uncertainty in Digital Facsimiles
 
DEALING WITH UNCERTAINITY
DEALING WITH UNCERTAINITYDEALING WITH UNCERTAINITY
DEALING WITH UNCERTAINITY
 
Dealing With Uncertainty
Dealing With UncertaintyDealing With Uncertainty
Dealing With Uncertainty
 
Challenges of dealing with uncertainty
Challenges of dealing with uncertaintyChallenges of dealing with uncertainty
Challenges of dealing with uncertainty
 

Ähnlich wie Technology acceptable use policy for students 08202011[1]

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educatorsjessa_delingon
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ssLenva Shearing
 
Privacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalPrivacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalthsieh
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3bweinert
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2MGSD
 
Security
SecuritySecurity
SecurityNabatah
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kittrtkaren
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]Debbie Oliver
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policyiamprosperous
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 

Ähnlich wie Technology acceptable use policy for students 08202011[1] (20)

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
CMS Technology acceptable use policy
CMS Technology acceptable use policyCMS Technology acceptable use policy
CMS Technology acceptable use policy
 
Social media policy
Social media policySocial media policy
Social media policy
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Privacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalPrivacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation final
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2
 
Security
SecuritySecurity
Security
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kit
 
Week 15 ppt eme2040
Week 15 ppt eme2040Week 15 ppt eme2040
Week 15 ppt eme2040
 
Responsible Use Presentation
Responsible Use PresentationResponsible Use Presentation
Responsible Use Presentation
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 

Mehr von ajdredla

Liturgist training
Liturgist trainingLiturgist training
Liturgist trainingajdredla
 
Economics unit 3 2
Economics unit 3 2Economics unit 3 2
Economics unit 3 2ajdredla
 
Persuasive writing
Persuasive writingPersuasive writing
Persuasive writingajdredla
 
Persuasive Writing
Persuasive WritingPersuasive Writing
Persuasive Writingajdredla
 
W geo unit 2b canada
W geo unit 2b canadaW geo unit 2b canada
W geo unit 2b canadaajdredla
 
W geo unit 2 landforms and resources us, canada
W geo unit 2 landforms and resources us, canadaW geo unit 2 landforms and resources us, canada
W geo unit 2 landforms and resources us, canadaajdredla
 
The lady and the spider p point
The lady and the spider p pointThe lady and the spider p point
The lady and the spider p pointajdredla
 
World history rome’s decline 3
World history rome’s decline 3World history rome’s decline 3
World history rome’s decline 3ajdredla
 
World history roman republic
World history roman republicWorld history roman republic
World history roman republicajdredla
 
Economics unit 3 2
Economics unit 3 2Economics unit 3 2
Economics unit 3 2ajdredla
 
Crossover short answer
Crossover short answerCrossover short answer
Crossover short answerajdredla
 
Greek Mythology Connections to Modern Times
Greek Mythology Connections to Modern TimesGreek Mythology Connections to Modern Times
Greek Mythology Connections to Modern Timesajdredla
 
Reading fair samples from pinterest
Reading fair samples from pinterestReading fair samples from pinterest
Reading fair samples from pinterestajdredla
 
Expository Writing
Expository WritingExpository Writing
Expository Writingajdredla
 
R&j act iii notes
R&j act iii notesR&j act iii notes
R&j act iii notesajdredla
 
Open-Ended Response rubric
Open-Ended Response rubricOpen-Ended Response rubric
Open-Ended Response rubricajdredla
 
Redeemed ministries austin
Redeemed ministries austinRedeemed ministries austin
Redeemed ministries austinajdredla
 
Ayn Rand Bio for class
Ayn Rand Bio for classAyn Rand Bio for class
Ayn Rand Bio for classajdredla
 
Genre terms
Genre termsGenre terms
Genre termsajdredla
 

Mehr von ajdredla (20)

Liturgist training
Liturgist trainingLiturgist training
Liturgist training
 
Economics unit 3 2
Economics unit 3 2Economics unit 3 2
Economics unit 3 2
 
Persuasive writing
Persuasive writingPersuasive writing
Persuasive writing
 
Persuasive Writing
Persuasive WritingPersuasive Writing
Persuasive Writing
 
W geo unit 2b canada
W geo unit 2b canadaW geo unit 2b canada
W geo unit 2b canada
 
W geo unit 2 landforms and resources us, canada
W geo unit 2 landforms and resources us, canadaW geo unit 2 landforms and resources us, canada
W geo unit 2 landforms and resources us, canada
 
The lady and the spider p point
The lady and the spider p pointThe lady and the spider p point
The lady and the spider p point
 
World history rome’s decline 3
World history rome’s decline 3World history rome’s decline 3
World history rome’s decline 3
 
World history roman republic
World history roman republicWorld history roman republic
World history roman republic
 
Economics unit 3 2
Economics unit 3 2Economics unit 3 2
Economics unit 3 2
 
Crossover short answer
Crossover short answerCrossover short answer
Crossover short answer
 
Greek Mythology Connections to Modern Times
Greek Mythology Connections to Modern TimesGreek Mythology Connections to Modern Times
Greek Mythology Connections to Modern Times
 
Roots
RootsRoots
Roots
 
Reading fair samples from pinterest
Reading fair samples from pinterestReading fair samples from pinterest
Reading fair samples from pinterest
 
Expository Writing
Expository WritingExpository Writing
Expository Writing
 
R&j act iii notes
R&j act iii notesR&j act iii notes
R&j act iii notes
 
Open-Ended Response rubric
Open-Ended Response rubricOpen-Ended Response rubric
Open-Ended Response rubric
 
Redeemed ministries austin
Redeemed ministries austinRedeemed ministries austin
Redeemed ministries austin
 
Ayn Rand Bio for class
Ayn Rand Bio for classAyn Rand Bio for class
Ayn Rand Bio for class
 
Genre terms
Genre termsGenre terms
Genre terms
 

Kürzlich hochgeladen

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Kürzlich hochgeladen (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Technology acceptable use policy for students 08202011[1]

  • 2. Technology Acceptable Use Policy  Purpose  StaffTechnology Acceptable Use Policy  Student Technology Acceptable Use Policy  User Agreements
  • 3. Technology Acceptable Use Policy PURPOSE
  • 4. Purpose  Enhance quality of student learning  Enhance staff & student efficiency  Ensure protection of students and staff  Protect hardware and software  Sets standards for technology usage
  • 5. Governances  School  Local, state and federal law  LISD has a duty to investigate suspected violations
  • 6. Technology Resources  Any electronic tool, device, program, or system that aids the educational and work environment  Personal devices are included in the AUP  Must meet LISD minimum requirements— virus protection software  Approved by technology department or campus administrator
  • 7. Technology Acceptable Use Policy STAFF TECHNOLOGY ACCEPTABLE USE POLICY
  • 8. Staff Technology Acceptable Use Policy  LISD employees follow an acceptable use policy
  • 9. Technology Acceptable Use Policy STUDENT TECHNOLOGY ACCEPTABLE USE POLICY
  • 10. Student Technology Acceptable Use Policy  Established for limited educational purposes  Classroom activities, career development, limited high-quality self-discovery activities  Not a public access service or public forum  Student has access unless a parent/guardian denies access  All activity is monitored  Follow same rules, good manners and common sense guidelines used with other daily school activities
  • 11. General Unacceptable Behavior  Posting information that will cause damage or disruption of technology  Engaging in personal attacks  Harassing another person  Posting false or defamatory information  Using criminal speech  Using speech inappropriate in an educational setting
  • 12. General Unacceptable Behavior  Abusing network resources–chain letters  Displaying, accessing or sending offensive messages or pictures  Using for commercial purposes—garage sales, fundraisers, benefits  Political lobbying  Accessing unauthorized district systems— Skyward
  • 13. General Unacceptable Behavior  Using district resources to threaten employees  Sending or posting messages that are  Abusive  Obscene  Sexually oriented  Threatening  Harassing  Damaging to another’s reputation  Illegal  Bullying
  • 14. E-Mail  Students will only use teacher or classroom accounts  No private email is allowed  Students cannot create private accounts at school  Students will not repost a message that was sent to them privately without the permission of the person who sent them the message.  Students will not post private information about another person.
  • 15. World Wide Web  Online textbooks and curriculum sites  Sites will be actively monitored by teachers and the technology department  Annual Internet safety training for students
  • 16. Real-time, Interactive Communication Areas  Blogs, Wikis, & Social Networking will only be used when directed by the teacher  Use only to support educational activities
  • 17. School Web Sites  Class websites may have  Group pictures without identification  Individual students without identification  Student work with first name only  Materials on web must meet academic standards  Graphics, text, sound, etc. must have copyright approval  Must have link back to campus/district
  • 18. Personal Safety  Students will not share personal contact information about themselves or other people.  Address  Telephone  School address  Home address  Do not give full name or any other personal contact information for any purpose.  Do not agree to meet with someone you have met online.  Tell an adult if any message received is inappropriate or makes you feel uncomfortable
  • 19. System Security  Students should secure user names and passwords  Notify an adult if a security problem has been identified  Do not attempt to gain unauthorized access to LISD network  Do not attempt to disrupt the network or destroy data  Do not attempt to access blocked sites  Do not use sniffing or remote access technology to monitor network activity  Do not create unauthorized networks
  • 20. Software and Files  Software is for educational use  Permission is needed to install, upload or download software  Intentional misuse may result in disciplinary action  Electronic files are not private  USB devices should be used for storage only—not software
  • 21. Technology Hardware  Used for educational purposes  Do not relocate hardware  LISD regulates hardware/software on the network including personal devices  LISD equipment may only be used to support educational goals
  • 22. Vandalism  Any malicious attempt to harm or destroy data or the network will result in cancellation of network privileges  Disciplinary measure will be enforced
  • 23. Plagiarism and Copyright Infringement  Plagiarism is not allowed  Copyright laws govern use of material  Copyrighted material used in the district must have author’s permission
  • 24. Videoconference  Videoconferencing is allowed  May be videotaped by district personnel  School acceptable use and behavior rules apply during conferences
  • 25. Student Rights  Electronic network is a limited forum for valid educational purposes  Searches will be conducted if there is reasonable suspicion of a violation
  • 26. Due Process  LISD will cooperate with local, state or federal officials if illegal activities occur  Student will be provided with notice and an opportunity to be heard in the manner set forth in the disciplinary code
  • 27. Violations of this Acceptable Use Policy  Violations of this policy may result in loss of access as well as other disciplinary or legal action.  Examples:  Use of district network only under direct supervision  Suspension of network privileges  Revocation of network privileges  Suspension of computer privileges  Suspension from school  Expulsion from school and/or  Legal action and prosecution by the authorities
  • 28. Student User Agreement Student Name ___________________________________ Grade ________ School ________________________________________ I have read the Lockhart ISD Student Technology Acceptable Use Policy Rules and Procedures document. I agree to follow the rules contained in this policy. I understand that if I violate the rules my access can be terminated and I may face other disciplinary measures. Student Signature _____________________________________________ Date ________________