Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.

Slides:



Advertisements
Similar presentations
Internet and Network Safety YKSD Policies. YKSD Board Policies 10 Pages of YKSD Board Policies exist for your protection. They are available from your.
Advertisements

The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Rockingham County Public Schools Technology Acceptable Use Policy
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Woodland Hills School District Computer Network Acceptable Use Policy.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Riverside Community School District
Introduction to Your Name Goes Here
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
Welcome to PCSC Summer School Student Handbook Review.
Acceptable Use Policy.  To promote educational excellence in our district by facilitating resource sharing, innovation, and communication for parents,
Using SWHS: The AUP [Acceptable Use Policy]
Electronic Use Policies.   Social Media  Internet.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
Clark County School District (CCSD)
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
ACPS Acceptable Use Policy Grades 3-5. A Good Technology User: Uses the computer and other technology with good intentions and for educational purposes.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.
Student Technology Code of Ethics
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Welcome to Computer Applications East High School
Introduction to Student Name Student Class.
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
TECHNOLOGY USE AGREEMENT FOR STUDENTS GRADES 3-8 This presentation was created to help students understand the district’s Technology Use Agreement before.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Squalicum High School Computer Network Student Use Guidelines.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
The goal of BYOD programs is to expand opportunities for 21st Century learning. However, using personally owned devices at school is a privilege, not.
What is it? Google Apps for Education is a suite of tools that allow you to produce documents, communicate, and collaborate with other people. Adams12.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Woodland Hills School District Computer Network Acceptable Use Policy.
EAGLE MOUNTAIN-SAGINAW INDEPENDENT SCHOOL DISTRICT.
Welcome to Computers Ms. Wyka 2015~2016 Year 1. Bring to Class EVERYDAY!  Pencil or Pen  Assignment notebook 2.
School Accounts Presented by: Mrs. Mazzola.
Keeping it safe on the internet
JOHN MARSHALL COMMUNITY SCHOOL Media Center Mrs. Shepard Updated 2/8/14.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Clark County School District
Technology Guidelines for Students
Introduction to Your Name Goes Here
LAUSD Responsible Use Policy (RUP)
Welcome to Scarlet Block
Introduction to Your Name Goes Here
Technology Guidelines for Students
Student User Agreement and Policy 2022
Welcome to Computer Applications!
Woodland Hills School District
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Technology in the Bellingham School District

Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use

Connectivity Insert network.gif here

Electronic Mail Use it as a primary tool for communication with others: teachers, group members, friends. 80/20 rule. ! Messages are not entirely secure

§Files and communications may be reviewed to maintain system integrity §Users should not expect that files stored on district servers will be private Cautionary Note

What is Ethical Use? §Know and model district rules concerning student use of and Internet §Know that you need a license for every kind of software on the computers. §Know and model the board policy on copyrighted materials. Responsible Use

Student Responsibilities §General school rules apply §Understand District and School rules l harassment, language l passwords, privacy l copyright l appropriate use of resources §Independent student use permitted upon submission of permission forms

The Following Behaviors are Not Permitted On the BSD Network

Using the network for: §Assisting a campaign for election §Commercial purposes §Promoting, supporting or celebrating religion or religious institutions

 Using obscene language  Sending or displaying offensive messages or pictures  Harassing, insulting or attacking others

Engaging in practices that threaten the network  Loading files that may introduce a virus.  Hacking into network files.  Circumventing network security.

Trespassing in others’ folders, documents or files  Using others’ passwords  Pretending to be someone other than yourself on the network.

Intentionally wasting limited resources:  Chain Letters  Greetings to large groups  Sending graphics and.exe files  Playing games from home or on the internet  Downloading or forwarding games

Violating copyright laws Installing software on any school computer. Copying information from someone else’s work without giving credit to the source.

Research RESEARCH CYCLE Questioning Planning Gathering Sorting Synthesizing Evaluating

The network is our means of communication and research. It is up to each one of us to help maintain and preserve the integrity and efficiency of the network.

The End  Always Log Off Properly  Select “Close all Files and logon as a new user” (fourth choice)  Clean up around your computer.