Welcome to my DP Again!
Read below on some guidelines on the acceptable use of this workplace.
Read below on some guidelines on the acceptable use of this workplace.
I will be utilizing the AUP from the school charter - High Tech High - http://support.hightechhigh.org/node/34
Purpose
Access to email and internet will allow students to explore thosands of libraries, databases, and bulltentin boards while exchanging messages with internet users throughout the world. Families should be warned that some material accessbial via the internet may contain items that are illegal, defamatory, inaccurate, or potentially offensive to some people. While our intent is to make internet access available to further educational goals and objectives, students may find ways to access other material via the internet. We believe that the benefits to students from access to the internet, in the form of information resources and opportunities for collaboration, exceed any disadvantages. But ultimately, parents and guardians of minors are responsible for setting and conveying the standards that their children should follow when using media and information resources. To that end, HTH supports and respects each family's right to decide if their child should not have internet access, and relies on the family to inform us on that choice.
Authority
1). Students are responsible for good behavior on school computer networks just as they are everywhere in the school environment. Communications on the network are often public in nature. General school rules for behaviro and commuications apply.
2). The network is provided for students to conduct research and communicate with others. Access to network services is given to students who agree to act in a considerate and responsible manner. Access is a privilege - not a right. Access entails responsiblity.
3). Individual users of the computer networks are responsible for their behavior and communications over these networks. It is presumed that users will comply with school standards. Beyoncd the clarification of such standards. HTH is not responsible for restricting, monitoring, or controlling, the communications of individuals utilizing the network.
4). Network storage areas may be accessed by network adminstratiors to review files and communications, maintain system integrity and ensure that users are using the system responsibily. Students should have no expectation of personal privacy in any matters stored in, created, received, or sent over the school computer networks, computers, email system, the intranet, internet, or any other school equipment. These are subject to review by the schools at any time, with or without notice, with or without cause, and without the permission of any student or parent/guardian. The schools reserves the right to monitor access, retrieve, download, copy, listen to, or delete anything stored in, created, received or sent over school computer networks, computers, email system or any school equipment, without notice, and without the permission of any user. Moreover, to protect the integrity our I.T. systems and the users thereof against unauthorized or improper use of these systems, the schools reserve the right, without notice, to limit or restrict an individual's use, and to inspect, copy, remove, or delete any unauthorized use of this technology upon authroization of the school director or his/her designee.
5). Students are prohibited from using I.T. for any unauthroized or unlawful purpose. Using I.T. to send, save, view, foward or create hararrasing or offensive content or mesage is strictly prohibited. Offensive amterials include, but not limited to pronographic, obsence, or sexually explicit material, sexual comments, jokes, or images that would violate the school policies. The schools policies against harassment and discrimation apply to the use of I.T
6). Students must respect all the copyrights and liscense to software and other online information, and may not upload, download, or copy software or other material thorugh I.T. without the prior authroization of the director of I.T. or his or her designee.
Within reason, freedom of speech and access the information will be honored.
Guidelines
The following are some actions that are not permitted, and violations may result in a lost of access as well as other disciplinary or legal action, including explulsion:
Purpose
Access to email and internet will allow students to explore thosands of libraries, databases, and bulltentin boards while exchanging messages with internet users throughout the world. Families should be warned that some material accessbial via the internet may contain items that are illegal, defamatory, inaccurate, or potentially offensive to some people. While our intent is to make internet access available to further educational goals and objectives, students may find ways to access other material via the internet. We believe that the benefits to students from access to the internet, in the form of information resources and opportunities for collaboration, exceed any disadvantages. But ultimately, parents and guardians of minors are responsible for setting and conveying the standards that their children should follow when using media and information resources. To that end, HTH supports and respects each family's right to decide if their child should not have internet access, and relies on the family to inform us on that choice.
Authority
1). Students are responsible for good behavior on school computer networks just as they are everywhere in the school environment. Communications on the network are often public in nature. General school rules for behaviro and commuications apply.
2). The network is provided for students to conduct research and communicate with others. Access to network services is given to students who agree to act in a considerate and responsible manner. Access is a privilege - not a right. Access entails responsiblity.
3). Individual users of the computer networks are responsible for their behavior and communications over these networks. It is presumed that users will comply with school standards. Beyoncd the clarification of such standards. HTH is not responsible for restricting, monitoring, or controlling, the communications of individuals utilizing the network.
4). Network storage areas may be accessed by network adminstratiors to review files and communications, maintain system integrity and ensure that users are using the system responsibily. Students should have no expectation of personal privacy in any matters stored in, created, received, or sent over the school computer networks, computers, email system, the intranet, internet, or any other school equipment. These are subject to review by the schools at any time, with or without notice, with or without cause, and without the permission of any student or parent/guardian. The schools reserves the right to monitor access, retrieve, download, copy, listen to, or delete anything stored in, created, received or sent over school computer networks, computers, email system or any school equipment, without notice, and without the permission of any user. Moreover, to protect the integrity our I.T. systems and the users thereof against unauthorized or improper use of these systems, the schools reserve the right, without notice, to limit or restrict an individual's use, and to inspect, copy, remove, or delete any unauthorized use of this technology upon authroization of the school director or his/her designee.
5). Students are prohibited from using I.T. for any unauthroized or unlawful purpose. Using I.T. to send, save, view, foward or create hararrasing or offensive content or mesage is strictly prohibited. Offensive amterials include, but not limited to pronographic, obsence, or sexually explicit material, sexual comments, jokes, or images that would violate the school policies. The schools policies against harassment and discrimation apply to the use of I.T
6). Students must respect all the copyrights and liscense to software and other online information, and may not upload, download, or copy software or other material thorugh I.T. without the prior authroization of the director of I.T. or his or her designee.
Within reason, freedom of speech and access the information will be honored.
Guidelines
The following are some actions that are not permitted, and violations may result in a lost of access as well as other disciplinary or legal action, including explulsion:
- Any attempt to guess passwords, break in other accounts, or gain unauthroized access to administration accounts.
- Sending or displaying offensive messages or pictures.
- Using obscene language
- Harrassing, insulting, or attacking others.
- Damaging computers, computer systesms, or computer networks
- Violating copyright laws
- Using another's password
- Trepassing in another's folders, work, or files
- Intentionally wasting limited resources
- Employing the the network for commercial purposes