Presentation is loading. Please wait.

Presentation is loading. Please wait.

Arp Acceptable Use Policy for Junior High School Students Approved by the Board Sept 1998 Updated: August, 2011.

Similar presentations


Presentation on theme: "Arp Acceptable Use Policy for Junior High School Students Approved by the Board Sept 1998 Updated: August, 2011."— Presentation transcript:

1 Arp Acceptable Use Policy for Junior High School Students Approved by the Board Sept 1998 Updated: August, 2011

2 AUP Documentation (1)FIRST READ: http://www.arpisd.org/admin/AUP/Aup_Arp_Student.doc http://www.arpisd.org/admin/AUP/Aup_Arp_Student.doc (2) REVIEW: complete this PowerPoint (3) Take Test & Provide Paperwork: http://www.arp.sprnet.org/default/admin/AUP/aup_ test.htm http://www.arp.sprnet.org/default/admin/AUP/aup_ test.htm

3 Vocabulary and Basic Explanations

4 Vandalism  Any malicious attempt to harm or destroy equipment or data of the district or any other of the agencies or other networks that we are connected.

5 Forgery – Federal & State Laws  Presenting yourself as another person  Using another person’s username or password  An attempt to gain access to another person’s electronic mail messages or online resources.

6 Netiquette  Pleasant e-mail  Using proper communication skills while online  Being polite  A word in all CAPS is considered shouting  No harassing, hate mail, cyber bullying, or racial slurs (illegal)

7 Intellectual Property Rights  All copyright laws will be followed by teachers and students for every assignment or posting.  Watch (cute!): http://www.youtube.com/watch?v=CJn_jC4FNDo http://www.youtube.com/watch?v=CJn_jC4FNDo Remember: An idea, graphic, composition, or product created by someone -- the ownership of that idea remains with the creator. Use intellectual property only with permission and correct citation All graphics from the Internet MUST be accompanied with a citation.

8 Noncompliance  A failure to follow the AUP, Posting Policies, and/or Internet Safety Policy will result in termination of network use.  May result in SAC  May result in formal legal charges

9  The user’s account will be terminated when there is continued inapproprate use after a warning has been issued. Revocation of privileges

10  You, as a user, have a monetary obligation to reimburse for harm done to technology tools, computers, or to the network. Liability

11 Public domain  Information that can legally be copied and used from the Internet.  This information has been shared with everyone and can be used at will.  Citation of the information is still required.

12 Filters – restrict objectionable URL sites due to CIPA*  All URLs (Internet sites), EMAIL, and online communications are filtered by BESS or Barracuda.  The district WILL NOT respond to a request from a student to unblocked access to an objectionable site.  ONLY faculty members can request that a site be unblocked (either permanently or temporarily)  Attempting to go around the filter is a major violation of CIPA & the AUP *Child Internet Protection Act

13 Filter  It is NOT the intention of the district to restrict students from valuable sites.  Teachers please plan ahead to contact the system administrator about sites that your students might require for any online project.  If you are issued a firewall exemption, each time you use it, the system administrator is sent a message as to the site, the content, and the time spent at that site.  Please be aware that online shopping for personal items during school hours is not appropriate use of the network. Shopping may take place before or after school hours.  Gambling online is illegal use of the school network.

14 Logging Program  A program that tracks all use.  Electronic mail transmissions (EMAIL) and other electronic communications (CHATS), district electronic resources (NETWORK FOLDERS) or online data used by students and employees are not private and may be monitored at any time by designated District staff to ensure appropriate use.

15 Firewall  A security device that restricts access into a network. Firewalls can be configured in many different ways but are primarily used to let a company's computers go out to the Internet without letting people on the Internet come into the company computers.

16 Internet vs. Intranet  Internet documents and information are available to anyone in the world, unless there is a security system. Intranet documents and information are available only to computers within a specific network. Intranets are closed and secure; the Internet is open.

17 Browser, browsing  The program that runs on your computer and lets you navigate the World Wide Web.  Safari, Google Chrome, and Internet Explorer are the most common browsers. These programs display the files that are on web servers.

18

19 The following slides contain information over the things you can and should do and the things that you cannot and should not do.

20  allowed to utilize the digital or Internet resources of the district without signing the AUP agreement  All students will be taught the AUP

21  All students will be monitored during their use of these technologies by faculty members

22  A media release form is necessary to publish student work.  Personal information about a student can not be published without consent from their parent/guardian.

23  You may not use another person’s account. You may not pretend to be another person.  Do not attempt to read, delete, copy, or modify the electronic mail or data of other system user,  Deliberate interference with the ability of other system users to send/receive electronic mail is prohibited.

24  It is the teacher’s responsibility to monitor network activity in the classroom.  It is the student’s responsibility to cite all non-original work that is posted on a Website or used in a project or product.

25  The system may not be used for illegal purposes. This includes downloading viruses, games, or going to websites that are not school related.  Do not send messages or access material that would be considered objectionable material.( abusive, obscene, threatening, harassing, etc.)

26  Do not give out personal information about yourself, or anyone else, on the Internet/e-mail.  Students cannot use outside email resources like Yahoo mail or AOL mail because these are not under the district filtering system.

27  A password is your personal identification for access to the network. It needs to be changed every six weeks. You should never give it out to anyone.  If you suspect someone has your password, it is your responsibility to change it. (Ctrl+Alt+Del)

28 ETHICAL USE POLICY:  DO NO HARM,  DO GOOD,  PREVENT HARM, and  UNDO HARM.

29 Games Not Allowed  Technology tools are provided by the district for appropriate educational objectives (i.e. games such as Solitaire, will not be played during school hours). Students utilizing technology for unauthorized purposes will be restricted from or lose privileges to district technologies.

30 Chats, ITV, Skype, Messaging  Participating in chat rooms and other synchronous communication on the Internet is only permissible for students under the appropriate supervision of a sponsoring teacher.  The sponsoring teacher must gain written permission for such activities from the technology director.

31 SPAMMING  “Spamming” is illegal. It involves sending email to more than just a FEW acquaintances.  Research the new “spam” laws. They deal with unsolicited email. “Spamming” is sending out email to folks who do not request it.  You spam the network when you send email to more than one or two of your associates.

32 Spamming  Do not send email to large groups like HS Faculty, unless it is for educational purposes  DO NOT FORWARD “CHAIN MAIL” MESSAGES TO ALL YOUR FRIENDS!  DO NOT download large files like movies, or music.  DO NOT participate in illegal file sharing (MP3)

33 NETWORK Netiquette System users are expected to observe the following network etiquette:  1. Be polite; messages typed in capital letters on the computer are equivalent to shouting and are considered rude.  2. Use appropriate language; swearing, vulgarity, lewdness, ethnic or racial slurs, and any other inflammatory language are prohibited.

34  3. Pretending to be someone else when sending/receiving messages is inappropriate.  4. Transmitting or creating obscene messages or pictures is prohibited.  5. Using the network in such a way that would disrupt the use of the network by other users is prohibited. NETWORK Netiquette

35 Posting Policies  All students MUST read and adhere to the Arp ISD Posting Policies

36 BYOT Policy  http://www.arpisd.org/admin/BYOT.h tm READ! http://www.arpisd.org/admin/BYOT.h tm  All BYOT must be examined & receive a TAG from the Technology Department


Download ppt "Arp Acceptable Use Policy for Junior High School Students Approved by the Board Sept 1998 Updated: August, 2011."

Similar presentations


Ads by Google