SlideShare a Scribd company logo
1 of 22
ACCEPTABLE USE POLICY



                   Geneva Crumel Fair

EDU 352 Foundation of Educational Technology (CVS 1312A)
                      Scott Shepard
Introduction
• It is the districts objective and goal to make the internet
  an intermediate education experience for the students.
  Harnessing the internet access for the students will
  assist the district in complying with the ADA, and being
  effective and safe for student use daily. For every great
  educational site, there are several more that features
  unacceptable content for children. Keeping the internet
  safe is to teach responsible use, which is why
  developing and implementing. Appropriate Use Policy
  (AUP) is so imperative. Please read and understand the
  Acceptable Use Policy.
Rules for Password Management
• Individual or individuals will be held responsible at “ALL”
  times for the proper use of District technology resources,
  and the district may suspend or revoke individual acess
  if he or she “Violate” the rules of expectation.
• This account ONLY be used primarily for education
  purposes, will be LIMITED e.g. checking email
  yahoo.com Only.
• Password-restricted areas of the Site and in our are in
  the Frequently asked questions. With the exception of
  the Sample Images, you may not manipulate or alter in
  any way images or other Content on the Site.
Use of the Web
• Accessing and using the site, you are agree to the terms
  and conditions set forth herein (Term in use of the Web).
• There may be more terms and conditions applicable to
  specific areas of this Site or to particular content or
  transactions are also posted in particular areas of the Site
  and, together with these Terms of Use.
• Applicable additional terms and conditions, are referred to
  as this "Agreement".
• Violation of this policy may constitute cause for
  revocation of access privileges suspension of access to
  the district’s computers, other discplinary actions, and/or
  appropriate legal action.
•   Retrieved April 13, 2013 from http://www.wcpss.net/employees/emp-handbk.pdf
Use of School E-mail Accounts
• The district’s use of the email account is limited in size of
  storage on the server and in file size of attachments.
• Should the account over the limited amount of space
  (45%) the system will send a "warning" message and
  then e-mail will be deleted from the server.
• Frequently check email to avoid reaching the storage
  limit of your account.
• Email will began to be return to sender in the event that
  the individuals are unable to do so for a period of time.
FERPA and Protecting Private Data
• When applicable, individual must comply with the
  Districts record manage program, the Open Meeting Act,
  the Family Educational Rights and Privacy Act (FERPA),
  including retention and confidentiality of student and
  district records, and campaign.
Junk-Drives/Tranfering file/Computers
• It is the responsibility of each user to use the computer
  resources provided by the district in an efficient, ethical,
  and legal manner.
• By accepting of this policy shows the users computer of
  access their email or other network resources.
Antivirus Software/Sign infected System
• Implementing the tools that have be provided by the
  district will assist with any virus that may or may not be
  apparent.
• The district provides up to date antivirus software that
  will protect the computer against most viruses, worms,
  Trojans, and other unwanted software that can infiltrate a
  PC.
• It is critical to have antivirus software installed on your
  computer and configure it to check for updates
  automatically.
Opening Document/Received E-mail
• When using accounts, internet, email systems, it is
  important to know/be familiar with the laws and
  regulations governing the use of email and other
  messages.
• Information Resources Management Commission Policy
  and Guidelines for Developing Filtering and Monitoring
  Policies for State Employee, students, and Third Party
  Using State information.
• Accessing computers NCGS 14-454.
Spam and Phishing
• Web users should be wary of suspicious email. Signs
  that an email may be a phishing attempt include: the
  email contains obvious spelling errors. Phishers do this
  intentionally in order to avoid spam filters that many
  Internet providers use, and spam marketing techniques
  in connection with Internet Marketing.
• Violations of our Terms of Service or this Spam and
  Phishing Policy may result in legal action against you
  and the termination, without notice, of your Service
  enrollment and/or anything associated with it, including,
  but not limited to, encryption keys, access logs and
  profiles.
Shutting Down System
• It is important to never just switch off the computer it may
  lose unsaved information and damage the computer's
  hard disk drive thereby losing saved information too.
• Click the Start button
• Click Shutdown
• Select the Shut down the computer option click on it.
• Click the yes button to confirm the selection.
• Some computers can switch themselves off automatically.
  On others, you need to press the on/off button after you
  see the message: 'It is now safe to turn off the computer”.

Retrieved April, 13, 2013 from
   http://www.pearsoned.co.uk/bookshop/article.asp?item=547
Installing Software on School Computer
• Any software available for download via the Site is the
  copyrighted work of the district and/or its licensors.
• The software will be governed by the terms of the end
  user license agreement that accompanies or is included
  with the software.
• If one choose to download, installing, and/or using any
  such software indicates your acceptance of the terms of
  the end user license agreement.
Implementing School-owned software
• Content Filtering. User access, both adult and minor, shall
  be filtered to block profane or obscene (pornography)
  material or any other material inappropriate for minors.
  User activity and the operation of filtering protection
  measures will be monitored to ensure compliance with the
  Acceptable Use Policy. A system administrator may
  disable filtering to enable adult access for bona fide
  research or other lawful purposes.
• Personal contact information about themselves or other
  people “shall NOT” be posted on the internet.
• This includes but not limited to: address, telephone, school
  address, work address, or a student's full name.
Copyrights Rules
• The copyrights belongs to its partners, affiliates,
  contributors or third parties.
• The copyrights in the Content are owned by the district or
  other copyright owners who have authorized their use on
  the Site.
• You may download and reprint Content for non-
  commercial, non-public, personal use only. (If you are
  browsing this Site as an employee or member of any
  business or organization, you may download and reprint
  Content only for educational or other non-commercial
  purposes ( Technology Tips Number 170 Copyrights and
  the Internet, 2006).
File Backups
• Decide on the proper backup for media needs.
• Choose a backup application. For personal computers,
  there are many options.
• Prepare your backup device of choice.
• Open your choice of application, select the files you
  wish to keep, select the media where you will be
  saving the backup, and start it up.
• Make sure your backup process completes successfully
  before using computer again.

•   Retrieved April 13, 2013 from
    http://www.microsoft.com/athome/setup/backupdata.aspx#fbid=5MSho3QkC5-
Social-Media/Recommendation
• The user honesty will be noted in the Social Media
  environment.

• User interaction are important features in many Web-
  based news services (Li Q, Chen, Lin, 2010).
• Use common sense and common courtesy: for example,
  it’s best to ask permission to publish or report on
  conversations that are meant to be private or internal to
  (COMPANY). Make sure your efforts to be transparent
  don't violate (COMPANY)'s privacy, confidentiality, and
  legal guidelines for external commercial speech.
Children’s Internet Protection Act (CIPA)
• Attempting to shield children from cyberspace
  pornography, is the job of CIPA it does not resolve all the
  legal issues.
• Schools are required to have a policy of Internet safety
  that include the use of technology protection measures.
  Limitations in filtering technology under the.
Cyberbullying Rules
• Illegal activities are any violations of federal, state, or
  local laws and include, but are not limited to, copyright
  infringement and/or illegal file sharing; posting or
  publishing false or defamatory information about a person
  or organization; committing fraud; cyberstalking;
  cyberharassment; threatening another person; or
  intentionally engaging in communications for the purpose
  of abusing, annoying, threatening, terrifying, harassing, or
  embarrassing another person.
• Harassment includes, but is not limited to, slurs,
  comments, jokes, innuendoes, unwelcome compliments,
  cartoons, visual depictions, pranks, or verbal conduct
  relating to an individual that
Cyberbullying Rules Cont.
Visual depictions, pranks, or verbal conduct relating to an
  individual that (1) have the purpose or effect of creating
  an intimidating, hostile or offensive environment; (2)
  have the purpose or effect of unreasonably interfering
  with an individual’s work or school performance; or (3)
  interfere with school operations.
CONCLUSION
• General e-mail abuses range from accidentally sending
  a personal note to everyone transmitting sexually or
  racially charged correspondence. Protection of such
  misuse consist of but not limited: CIPA, viruses,
  cyberbullying, and the leaking out of personal
  information. The web is very informational but it can also
  be a major nigthmare if not promptly use. It is everyone
  jobs to monitor what site will be displayed on the
  computer.
Reference
• McCarthy, M. M. (2004). Filtering the Internet: The
  Children's Internet Protection Act. Legal Update.
  Educational Horizons, 82(2), 108-113.
• Li, Q., Wang, J., Chen, Y., & Lin, Z. (2010). User
  comments for news recommendation in forum-based
  social media. Information Sciences, 180(24), 4929-4939.
  doi:10.1016/j.ins.2010.08.044
• Siau, K., Nah, F., & Teng, L. (2002). ACCEPTABLE
  INTERNET USE POLICY. Communications Of The ACM,
  45(1), 75-79.

• Technology Tips Number 170 Copyrights and the Internet,
  (2006).
Reference Cont.
• Wake County Public School System 2012-2013
  Employee Handbook, 2013 Retrieved April 9, 2013 from
  http://www.wcpss.net/employees/emp-handbk.pdf

More Related Content

What's hot

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Digital privacy
Digital privacyDigital privacy
Digital privacyAnna Adel
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 

What's hot (20)

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Data security
Data securityData security
Data security
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 

Viewers also liked

Acceptable use policies ppt
Acceptable use policies pptAcceptable use policies ppt
Acceptable use policies pptEducatorX
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHSMisterHobbs
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Dobusch Leonhard
 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Sue Barrett
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEUsman Ahmed
 
Employees and Internet Use - Legal Aspects
Employees and Internet Use - Legal Aspects Employees and Internet Use - Legal Aspects
Employees and Internet Use - Legal Aspects Darius Whelan
 
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Darius Whelan
 
Non-repudiation: Ability to leverage digital signature as a service
Non-repudiation: Ability to leverage digital signature as a serviceNon-repudiation: Ability to leverage digital signature as a service
Non-repudiation: Ability to leverage digital signature as a serviceNordic APIs
 
Confidentiality, Transparency, and Accountability: A Delicate Balance in Chil...
Confidentiality, Transparency, and Accountability: A Delicate Balance in Chil...Confidentiality, Transparency, and Accountability: A Delicate Balance in Chil...
Confidentiality, Transparency, and Accountability: A Delicate Balance in Chil...bartoncenter
 
Accountability That Works
Accountability That WorksAccountability That Works
Accountability That Worksbob_sutton6174
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 

Viewers also liked (14)

Acceptable use policies ppt
Acceptable use policies pptAcceptable use policies ppt
Acceptable use policies ppt
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHS
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles

 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
 
Employees and Internet Use - Legal Aspects
Employees and Internet Use - Legal Aspects Employees and Internet Use - Legal Aspects
Employees and Internet Use - Legal Aspects
 
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
 
Non-repudiation: Ability to leverage digital signature as a service
Non-repudiation: Ability to leverage digital signature as a serviceNon-repudiation: Ability to leverage digital signature as a service
Non-repudiation: Ability to leverage digital signature as a service
 
Confidentiality, Transparency, and Accountability: A Delicate Balance in Chil...
Confidentiality, Transparency, and Accountability: A Delicate Balance in Chil...Confidentiality, Transparency, and Accountability: A Delicate Balance in Chil...
Confidentiality, Transparency, and Accountability: A Delicate Balance in Chil...
 
Accountability That Works
Accountability That WorksAccountability That Works
Accountability That Works
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 

Similar to Acceptable use policy

Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureThe Pathway Group
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyKoolteechatechnology
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICTRolly Franco
 
Safety Presentation
Safety PresentationSafety Presentation
Safety PresentationSarah Sutter
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy projectRachel Nachman
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Vijay Dalmia
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETYSairam
 
Employee Technology Handbook.pdf
Employee Technology Handbook.pdfEmployee Technology Handbook.pdf
Employee Technology Handbook.pdfHemprasad Badgujar
 
Personal, Legal, Ethical, and Organizational Issues of .docx
Personal, Legal, Ethical, and Organizational Issues of .docxPersonal, Legal, Ethical, and Organizational Issues of .docx
Personal, Legal, Ethical, and Organizational Issues of .docxkarlhennesey
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 

Similar to Acceptable use policy (20)

Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
L50 slides
L50 slidesL50 slides
L50 slides
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy project
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETY
 
Employee Technology Handbook.pdf
Employee Technology Handbook.pdfEmployee Technology Handbook.pdf
Employee Technology Handbook.pdf
 
Personal, Legal, Ethical, and Organizational Issues of .docx
Personal, Legal, Ethical, and Organizational Issues of .docxPersonal, Legal, Ethical, and Organizational Issues of .docx
Personal, Legal, Ethical, and Organizational Issues of .docx
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Elet5e ch09
Elet5e ch09Elet5e ch09
Elet5e ch09
 
Chapter8
Chapter8Chapter8
Chapter8
 

Recently uploaded

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 

Recently uploaded (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

Acceptable use policy

  • 1. ACCEPTABLE USE POLICY Geneva Crumel Fair EDU 352 Foundation of Educational Technology (CVS 1312A) Scott Shepard
  • 2. Introduction • It is the districts objective and goal to make the internet an intermediate education experience for the students. Harnessing the internet access for the students will assist the district in complying with the ADA, and being effective and safe for student use daily. For every great educational site, there are several more that features unacceptable content for children. Keeping the internet safe is to teach responsible use, which is why developing and implementing. Appropriate Use Policy (AUP) is so imperative. Please read and understand the Acceptable Use Policy.
  • 3. Rules for Password Management • Individual or individuals will be held responsible at “ALL” times for the proper use of District technology resources, and the district may suspend or revoke individual acess if he or she “Violate” the rules of expectation. • This account ONLY be used primarily for education purposes, will be LIMITED e.g. checking email yahoo.com Only. • Password-restricted areas of the Site and in our are in the Frequently asked questions. With the exception of the Sample Images, you may not manipulate or alter in any way images or other Content on the Site.
  • 4. Use of the Web • Accessing and using the site, you are agree to the terms and conditions set forth herein (Term in use of the Web). • There may be more terms and conditions applicable to specific areas of this Site or to particular content or transactions are also posted in particular areas of the Site and, together with these Terms of Use. • Applicable additional terms and conditions, are referred to as this "Agreement". • Violation of this policy may constitute cause for revocation of access privileges suspension of access to the district’s computers, other discplinary actions, and/or appropriate legal action. • Retrieved April 13, 2013 from http://www.wcpss.net/employees/emp-handbk.pdf
  • 5. Use of School E-mail Accounts • The district’s use of the email account is limited in size of storage on the server and in file size of attachments. • Should the account over the limited amount of space (45%) the system will send a "warning" message and then e-mail will be deleted from the server. • Frequently check email to avoid reaching the storage limit of your account. • Email will began to be return to sender in the event that the individuals are unable to do so for a period of time.
  • 6. FERPA and Protecting Private Data • When applicable, individual must comply with the Districts record manage program, the Open Meeting Act, the Family Educational Rights and Privacy Act (FERPA), including retention and confidentiality of student and district records, and campaign.
  • 7. Junk-Drives/Tranfering file/Computers • It is the responsibility of each user to use the computer resources provided by the district in an efficient, ethical, and legal manner. • By accepting of this policy shows the users computer of access their email or other network resources.
  • 8. Antivirus Software/Sign infected System • Implementing the tools that have be provided by the district will assist with any virus that may or may not be apparent. • The district provides up to date antivirus software that will protect the computer against most viruses, worms, Trojans, and other unwanted software that can infiltrate a PC. • It is critical to have antivirus software installed on your computer and configure it to check for updates automatically.
  • 9. Opening Document/Received E-mail • When using accounts, internet, email systems, it is important to know/be familiar with the laws and regulations governing the use of email and other messages. • Information Resources Management Commission Policy and Guidelines for Developing Filtering and Monitoring Policies for State Employee, students, and Third Party Using State information. • Accessing computers NCGS 14-454.
  • 10. Spam and Phishing • Web users should be wary of suspicious email. Signs that an email may be a phishing attempt include: the email contains obvious spelling errors. Phishers do this intentionally in order to avoid spam filters that many Internet providers use, and spam marketing techniques in connection with Internet Marketing. • Violations of our Terms of Service or this Spam and Phishing Policy may result in legal action against you and the termination, without notice, of your Service enrollment and/or anything associated with it, including, but not limited to, encryption keys, access logs and profiles.
  • 11. Shutting Down System • It is important to never just switch off the computer it may lose unsaved information and damage the computer's hard disk drive thereby losing saved information too. • Click the Start button • Click Shutdown • Select the Shut down the computer option click on it. • Click the yes button to confirm the selection. • Some computers can switch themselves off automatically. On others, you need to press the on/off button after you see the message: 'It is now safe to turn off the computer”. Retrieved April, 13, 2013 from http://www.pearsoned.co.uk/bookshop/article.asp?item=547
  • 12. Installing Software on School Computer • Any software available for download via the Site is the copyrighted work of the district and/or its licensors. • The software will be governed by the terms of the end user license agreement that accompanies or is included with the software. • If one choose to download, installing, and/or using any such software indicates your acceptance of the terms of the end user license agreement.
  • 13. Implementing School-owned software • Content Filtering. User access, both adult and minor, shall be filtered to block profane or obscene (pornography) material or any other material inappropriate for minors. User activity and the operation of filtering protection measures will be monitored to ensure compliance with the Acceptable Use Policy. A system administrator may disable filtering to enable adult access for bona fide research or other lawful purposes. • Personal contact information about themselves or other people “shall NOT” be posted on the internet. • This includes but not limited to: address, telephone, school address, work address, or a student's full name.
  • 14. Copyrights Rules • The copyrights belongs to its partners, affiliates, contributors or third parties. • The copyrights in the Content are owned by the district or other copyright owners who have authorized their use on the Site. • You may download and reprint Content for non- commercial, non-public, personal use only. (If you are browsing this Site as an employee or member of any business or organization, you may download and reprint Content only for educational or other non-commercial purposes ( Technology Tips Number 170 Copyrights and the Internet, 2006).
  • 15. File Backups • Decide on the proper backup for media needs. • Choose a backup application. For personal computers, there are many options. • Prepare your backup device of choice. • Open your choice of application, select the files you wish to keep, select the media where you will be saving the backup, and start it up. • Make sure your backup process completes successfully before using computer again. • Retrieved April 13, 2013 from http://www.microsoft.com/athome/setup/backupdata.aspx#fbid=5MSho3QkC5-
  • 16. Social-Media/Recommendation • The user honesty will be noted in the Social Media environment. • User interaction are important features in many Web- based news services (Li Q, Chen, Lin, 2010). • Use common sense and common courtesy: for example, it’s best to ask permission to publish or report on conversations that are meant to be private or internal to (COMPANY). Make sure your efforts to be transparent don't violate (COMPANY)'s privacy, confidentiality, and legal guidelines for external commercial speech.
  • 17. Children’s Internet Protection Act (CIPA) • Attempting to shield children from cyberspace pornography, is the job of CIPA it does not resolve all the legal issues. • Schools are required to have a policy of Internet safety that include the use of technology protection measures. Limitations in filtering technology under the.
  • 18. Cyberbullying Rules • Illegal activities are any violations of federal, state, or local laws and include, but are not limited to, copyright infringement and/or illegal file sharing; posting or publishing false or defamatory information about a person or organization; committing fraud; cyberstalking; cyberharassment; threatening another person; or intentionally engaging in communications for the purpose of abusing, annoying, threatening, terrifying, harassing, or embarrassing another person. • Harassment includes, but is not limited to, slurs, comments, jokes, innuendoes, unwelcome compliments, cartoons, visual depictions, pranks, or verbal conduct relating to an individual that
  • 19. Cyberbullying Rules Cont. Visual depictions, pranks, or verbal conduct relating to an individual that (1) have the purpose or effect of creating an intimidating, hostile or offensive environment; (2) have the purpose or effect of unreasonably interfering with an individual’s work or school performance; or (3) interfere with school operations.
  • 20. CONCLUSION • General e-mail abuses range from accidentally sending a personal note to everyone transmitting sexually or racially charged correspondence. Protection of such misuse consist of but not limited: CIPA, viruses, cyberbullying, and the leaking out of personal information. The web is very informational but it can also be a major nigthmare if not promptly use. It is everyone jobs to monitor what site will be displayed on the computer.
  • 21. Reference • McCarthy, M. M. (2004). Filtering the Internet: The Children's Internet Protection Act. Legal Update. Educational Horizons, 82(2), 108-113. • Li, Q., Wang, J., Chen, Y., & Lin, Z. (2010). User comments for news recommendation in forum-based social media. Information Sciences, 180(24), 4929-4939. doi:10.1016/j.ins.2010.08.044 • Siau, K., Nah, F., & Teng, L. (2002). ACCEPTABLE INTERNET USE POLICY. Communications Of The ACM, 45(1), 75-79. • Technology Tips Number 170 Copyrights and the Internet, (2006).
  • 22. Reference Cont. • Wake County Public School System 2012-2013 Employee Handbook, 2013 Retrieved April 9, 2013 from http://www.wcpss.net/employees/emp-handbk.pdf