Presentation is loading. Please wait.

Presentation is loading. Please wait.

Technology’s Acceptable Use Policies (AUP)

Similar presentations


Presentation on theme: "Technology’s Acceptable Use Policies (AUP)"— Presentation transcript:

1 Technology’s Acceptable Use Policies (AUP)
Laredo Independent School District Laredo Independent School District On-line Training

2 Welcome The purpose of this training is have you review:
LISD Technology Acceptable Use Policies which set forth the District’s acceptable use of the system (computers, Internet, Sage, DDA, workflow,…) and the ethical, legal and safe use of this resource for all employees.

3 Laredo ISD’s Goal It is our goal to instruct all employees concerning the ethical, legal and safe use of: Technology equipment (computers, laptops, printers, scanners, …) Network (Internet, , …) and the limitations as prescribed in LISD’s CQ administrative regulation.

4 LISD’s expectations All LISD’s employees who use technology will have to ….. review and understand this training register on ERO before or after this training take a quiz on this training pass the quiz (get credit on ERO if registered) sign agreement form and continue to use technology in an ethical, legal and safe way

5 A score of 100 is required to pass this training’s quiz
At the end of this training, you will be required to take a on-line quiz and must get a score of 100. If you do not score 100, you have the opportunity to take quiz over until you pass it. If you do not take test again and pass it, your login for the use of computer and Internet will be de-activated by the end of September 2008.

6 In the future, You may need to take a training similar to this as we have new updates. You will need to annually sign a new “Employee Agreement for Acceptable Use of the Electronic Communication System” form to continue to use your username/password.

7 Anyone with access to our equipment, Internet and other software
Who is the USER? Anyone with access to our equipment, Internet and other software Laredo ISD students LISD employees LISD volunteers Community members guests including: vendors, consultants, service providers, and employees of subcontracted companies

8 Acceptable Conduct Users must follow:
all the requirements and expectations of LISD Employee Code of Ethics and Standards of Conduct and the LISD’s Technology Acceptable Use Policies (AUP)

9 District’s Technology Equipment
Includes desktop computers, laptops, scanners, printers, pendrives, digital cameras, video conference and any other equipment

10 Other technology equipment is not allowed
No personal equipment is allowed in our network unless the equipment has been certified by I.T. department as meeting requirements and standards set by the district. Laptops that were sold to teachers need to meet requirements and district standards and be certified by I.T. department before they may be allowed in our network. To get these requirements and standards contact help desk at

11 Other technology equipment is not allowed
Equipment that has not been certified by I.T. department as meeting requirements and standards set by the district. Access points purchased with personal or district funds that do not meet district requirements and standards will not be allowed in LISD’s network.

12 Use of LISD’s technology equipment
LISD’s technology equipment is to be used primarily for school-business instructional purposes administrative purposes

13 Instructional purposes include:
Academic research Communication Publishing Technology integration Technology proficiencies Software training Any activities supporting the District’s instructional goals and objectives

14 It is a privilege and not a right to:
Use the District’s technology equipment and/or Participate in any online communication service: Internet and Sage Workflow DDA Distance Learning (Video Conference) Web Pages Student Information System

15 Laredo I.S.D. computers require …
a windows login and password to access computer/network resources, and for user to log-out at the end of his/her use of equipment. Inactivity for a predetermined time, may automatically log-out user from computer.

16 Avoid problems You should “lock” your computer when stepping away from your computer by pressing Ctrl + Alt + Delete, and click on “lock computer”. This will prevent someone from accessing files and programs while you are away. Your password is needed to unlock it. Try it!

17 Appropriate conduct for using LISD equipment
The individual in whose name a system account is issued will be responsible at all times for its proper use. If you know or suspect someone who has committed a violation/crime using your login, you need let your campus or department administrator know as soon as you know of the offense, so an investigation can be conducted and so you may be cleared of the offense. You may also to report violation or crime.

18 Gaining unauthorized access
Users should not attempt to or gain unauthorized access to resources or information he/she does not have authorized access to. This is considered “hacking” and is a violation of the AUPs.

19 Passwords – must be kept private
Avoid problems Do NOT share your password with anyone. Do NOT use someone else’s login and password. The individual, in whose name a system account is issued, will be responsible at all times for its proper use.

20 Usernames and Passwords – must be kept private
Avoid problems Teachers and staff who have access to usernames and passwords are prohibited to share usernames and passwords to anyone, who does not have a username assigned. Teachers and staff with access to student usernames and passwords are prohibited to use a student username and password to use a student computer.

21 Passwords – must be kept private
Keep your password confidential. passwords are the keys you use to access personal information that you've stored on your computer and in your online accounts. Do not keep your passwords on a paper in your desk or by your computer. Someone can use it and get into your computer. Change your password frequently.

22 Creating a strong password
Use these steps to develop a strong password: Think of a sentence that you can remember. Example: "My son, Gabriel, is three years old.” Convert it to a password: "msgityo".

23 creating a password con’t.
Add complexity: mix letters and numbers, caps. This might yield a password like "MsGi3y0". Or add special characters. "M$Gi3y0".

24 User must understand that Laredo ISD…
will periodically audit, inspect, and/or monitor all use of LISD’s technology - inclusive of remote and/or online resources and storage media as deemed appropriate. will take disciplinary action if any violations to LISD Technology AUP are found. Mrs. Sandoval will check on the “all”.

25 Acceptable Conduct – Using Technology Equipment
User shall treat equipment with care at all times. Keep equipment clean. Do not eat by the equipment. User shall protect the security and privacy of Laredo ISD’s systems and network. LISD prohibits the use of unauthorized access points or satellite software which can access LISD’s network. (Only standardized access points purchased and installed by LISD I.T. department are allowed).

26 Limitations on District Technology Equipment
Users shall NOT waste district resources (paper, ink, disk space, etc.) including the storing of music selections at any computer. Users shall NOT remove any district technology equipment from U. S. boundaries. (Equipment cannot go into Mexico, this includes district laptops! Due to Microsoft products being subject to export restrictions under U.S. law because they include encryption technology, and the district’s equipment insurance coverage, LISD does not permit their equipment to leave the United States.) District technology staff has the right to and will remove any unauthorized software on any district/campus computer. Screen savers or desktop themes Software without license or documentation Unauthorized downloaded software

27 Infected files and viruses
LISD’s computers are programmed to delete most infected files. LISD will NOT be responsible for the loss of data or files. Users should avoid actions that are likely to increase the risk of introducing viruses to the system such as opening messages from unknown senders and loading data from unprotected computers. Will check with Lalo or Joe. (mrs. Sandoval)

28 Software

29 Software Installation/Usage Policy
All instructional software must first be approved by the Curriculum and Instruction department for content then by Technology department for compatibility with hardware and/or network. LISD prohibits the use/or listening of Internet radio stations and the use of non-authorized online video. LISD prohibits the use of games for staff and students with the exception of educational software that has been approved by the District.

30 Limitations for Users Users are prohibited to install any software on district equipment. Users are prohibited to use/or download any peer-to-peer (PTP) software such as Napster, Imesh, Webshots, Morpheus, Kazaa, etc. because of network/security issues. Users are prohibited to make any changes to computer/equipment configurations (i.e., network settings, display settings including backgrounds and screen savers.)

31 Computer piracy…is illegal
If you make unauthorized copies (burning CDs or DVDs) of copyrighted music recording or of movies, you are breaking the law. Unauthorized reproduction and distribution of copyrighted material including music/movies is JUST AS ILLEGAL AS SHOPLIFTING. The rules are very simple. Unless you own the copyright, it’s not yours to distribute.

32 Hacking…is illegal and unethical
Hacking is the action of illegally accessing, modifying or deleting information in a computer system. Unauthorized accessing of files you do not have permission to view is just as bad as hacking or stealing.

33 Intentional Virus Distribution …is illegal and unethical
Viruses are the colds and flu of computer security. Users shall not write, produce, generate copy, propagate, or attempt to introduce any bug, virus, worm, Trojan Horse, or similar computer code designed to self-replicate, damage, or otherwise hinder the performance of any computer’s memory, file system, or software.

34 Sharing confidential information is illegal and unethical
As an employee, you may need to access confidential student information (education records) for planning instruction. Under Federal guidelines Family Educational Rights and Privacy Act (FERPA) you are legally and ethically obligated to safeguard the confidentiality of any information records may contain.

35 Sharing confidential information is illegal and unethical
Education records is defined as all records, files, documents, and other materials containing information directly related to a student. This includes records that are hand written, print, in electronic form or audiotape or video tape form.

36 Internet

37 Acceptable Uses of the Internet
Users shall use the Internet for educational and administrative purposes and as a tool to enhance teaching and learning in the classroom. Users will be required to change all passwords at least once every semester. All passwords must remain confidential and must not be shared. Users will get updates online on the Guidelines and be required to sign a user agreement annually for renewal of their computer/ account.

38 Acceptable Uses of the Internet (con’t.)
Users shall use Internet resources in accordance with copyright law. Copyright is applicable in ALL cases whether or not explicit reference to copyright is mentioned. Users shall use the Internet in accordance with civic and federal laws. Users, who gain access to inappropriate material, are expected to and required to discontinue the access as quickly as possible and to report the unblocked site to district technology staff or .

39 Acceptable Uses of the Internet (con’t.)
Teachers and staff are responsible to monitor students’ use of computer/laptop. Students should only use their own username and password. If a student does not have a username it may mean his/her parents did not or have not signed an agreement form to allow district to give student access to a computer or Internet. Students should not play games or music on the computers/laptops. Check the minimized programs a student has on a computer to know what student is viewing or working on.

40 Limitations on the Uses of the Internet
Users may only redistribute copyright data: for educational purposes or with the written permission of the copyright holder or designee. Users shall not use District Internet access to conduct buying, selling, or promotion of commercial items. Users shall not use Internet for any purposes that may present a tangible cost to the school or interfere with the operations of the computer network or with the performance of the students or employees. Ask Doc 2nd bullet sub info.

41 Limitations on the Uses of the Internet
Users shall not purposefully access or post materials that are illegal abusive, obscene, sexually oriented, threatening, harassing, or damaging to another’s image. These items include but are not limited to the following categories: Adult Sites Entertainment Sites Crime Sites Gambling Sites Violence Sites Drugs Sites Sites which promote activities which are illegal for minors Intolerance Sites

42 Limitations on the Uses of the Internet
If an educational website or a website that is appropriate is blocked and needed for instruction, a teacher may request that it be unblocked temporary. To get a website unblocked, a teacher may send an to and send the website address, when the website should be unblocked and for how long. Request must be made at least 3 days before it is needed. A response will be ed.

43 Chat Rooms and Newsgroups Usage
Acceptable Conduct Users shall use educational chat rooms, network chat, discussion groups or newsgroup accessed on the Internet for educational purposes only with prior written permission from the Director of Technology.

44 Electronic Mail (E-mail)

45 Purpose of Electronic Mail (E-mail) Usage
The purpose of the school district’s is to facilitate communications district-wide. Utilization of the district’s system is a privilege, not a right. transmissions sent and received by students and employees are not private and may be monitored.

46 Acceptable Conduct for Using E-Mail
Users shall use for administrative or educational purposes and must be consistent with the educational mission of the Laredo Independent School District. Users shall not use for any purposes that may present a tangible cost to the school or interfere with the operations of the computer network or with the performance of the student or employee.

47 Limitation on the Use of E-mail
Users are prohibited to use the system for any illegal activity, including but not limited to violation of copyright laws. Users are prohibited to attempt to read, delete, copy, or modify the of any other user. Users are prohibited to access private accounts such as HOTMAIL, YAHOO MAIL, GMAIL etc…. when using the district's Internet system. Users are prohibited to use for the purpose of sending unnecessary, junk mail or chain letters.

48 Definition of a Chain Letter
Merriam-Webster Dictionary defines a chain letter as a letter sent to several persons with a request that each send copies of the letter to an equal number of persons. User shall not use for the purpose of sending chain letters.

49 Chain Letters…are prohibited
A chain letter contains a request to forward the message to multiple addressees. It also generally has one or more of these characteristics: a hook to catch the reader’s interest a warning to maintain the chain or suffer negative consequences (e.g., bad luck) a request for money or other items of value

50 What you should do if you receive a chain letter
1. report it by forwarding it to LISD’s Technology Department at Warning notices will be sent to accounts belonging to LISD’s community users to remind them of our policies. Please do not delete the message from your account until after you have reported it to LISD Technology Department. 2. delete it Under no circumstances should you reply to the chain letter. You should not forward the chain letter to anyone other than to report it to the Technology Department.

51 Etiquette Users are expected to observe the following network etiquette (called netiquette): Be polite; messages typed in capital letters are the computer’s equivalent of shouting Use appropriate language; swearing, vulgarity, ethnic or racial slurs, and any other inflammatory language is prohibited Do not pretend to be someone else when sending/receiving messages Do not transmit inappropriate messages or pictures CAPS

52 More Etiquette Do not leave the Subject field blank. Always fill in the Subject field with a brief and concise description of the content of your . Do not use colored text and background colors or images in your day to day communications. Your color and formatting choices can make your s impossible to read to some who have limitations on their computer. Do not give out phone numbers or personal information without confirming you are communicating with a reputable party. Never give out personal contact information of others without their specific permission to do so.

53 Security Beware of persons who are up to no good. There is a lot of phishing (pronounced like the word “fishing”). Phishing is use of lures to "fish" for users' financial information and passwords.

54 Security Phishers will pretend to be someone like a bank or credit card company and ask for your personal information. They can charge on your credit card, apply for loans in your name from info they get from you. Phishers can ruin your credit.

55 What can I do to protect myself?
Be careful who you send information about yourself. Look for secure websites; they have a small padlock icon displayed in the right-hand corner on the bottom of the screen.

56 What can I do to protect myself?
The best way to avoid becoming a phishing scam victim is to use your best judgment. No financial institution will you and ask you for your sensitive information.

57 Video Conferencing

58 Video Conferencing Etiquette
Keep “eye contact” with people on remote site; do not work on other tasks while you are listening. Speak only when part of group conversation; do not have side conversations even if mic is in mute. If materials will be discussed, have copies for all sites. Minimize distractions

59 Disciplinary Actions

60 Disciplinary Action Employees and non employees must follow all Laredo I.S.D’s Electronic Communication and Data Management Guidelines when using district computers/technology equipment. Violation of the District’s Guidelines with the use of district’s computers and networks will result in disciplinary action as stated in the District’s Electronic Communication and Data Management Guidelines. The severity of the violation committed using technology will determine the degree of disciplinary action. Ask Doc

61 Disciplinary Action (Progressive employee discipline system)
First Offense Written warning by Director of Technology or administrator Second Offense Written reprimand Third Offense Treated on a case by case basis. NOTE: If the violation is severe, the employee may be suspended and dismissed without resorting to progressive discipline. Ask CSS

62 Local, State and Federal law offenses
The District will cooperate fully with local, state, or federal law enforcement agencies in any investigation concerning or relating the misuse of any LISD’s equipment and/or District’s electronic communication system.

63 It is your responsibility to:
Review all of the ECDM Guidelines found in LISD’s website. Report any improper use of a computer you see to your administrator and/or Interim Director of Technology, Elizabeth Garcia at or to . Report any missing or modified files from your computer to I.T. department at

64 For Complete Guidelines go to:
LISD Home Page ~ Click on Webmail Select first bullet ~ Electronic Communication and Data Management Guidelines You may print a copy of the Guidelines or you may request a copy at the Technology Department

65 Now… you need to take a quiz
…to get credit for this review of Guidelines …to meet requirement listed in the local administrative regulation and …in order to keep your logins active.

66 You will need your employee ID# and PIN#
Before you start with the quiz…print this page to have the instructions. To print go to >File, >Print, Click on button for Current Slide, >OK. Register in ERO by going to the following site: go to LISD homepage > esystems > ero You will need your employee ID# and PIN# This training is Session # Once registered on ERO, you can click on the following link to login with your employee number and take the quiz:

67 The End For any questions regarding this quiz please call and ask for Noemi or Irma


Download ppt "Technology’s Acceptable Use Policies (AUP)"

Similar presentations


Ads by Google