Unacceptable Use. The user is responsible for all his/her actions and activities involving the network. Examples of prohibited conduct include but are not limited to the following: ❑ Using the network for any illegal activity, including violation of copyright or other contracts or transmitting any material in violation of U.S. and State regulations. ❑ Copying or downloading copyrighted material on any system connected to the school system's hardware/software without the owner's permission. Only the owner(s) or individuals specifically authorized by the owner(s) may copy or download copyrighted material to the system. School purchased software may not be copied for personal use. ❑ Students will not use district computers and laptops to copy or download copyrighted software, music or images, or for other violation of copyright laws. Peer-to-peer, file-sharing, torrent software may not be installed on a school system computer or laptop. ❑ Copying, printing or downloading copyrighted material for the users own use without the owner's permission. Users may redistribute copyrighted programs only with the owner’s permission. Such permission must be specified in the document or must be obtained directly from the owner in accordance with applicable copyright laws, Board policy and administrative procedures. This includes the district contracted photographer. ❑ Product advertisement or political lobbying is prohibited. ❑ Vandalism. Vandalism is defined as any malicious attempt to harm or destroy data of another user, the network or the Internet. This includes, but is not limited to, creating and/or uploading or downloading viruses, disconnect or disassemble any network or computer component. ❑ Using or attempting to use the network while privileges are suspended or revoked. ❑ Using the computer of a teacher, administrator, or other staff member without permission or supervision. ❑ Use of technology resources in such a way that you would disrupt other users (sounds and/or excessive bandwidth usage, e.g., radio/audio streaming, video streaming). ❑ Provide another student with user account information or passwords ❑ Unauthorized interception of electronic communications and other wiretapping, including electronic mail (The Electronic Communications Privacy Act 18 USC 2701-2709) ❑ Accessing, monitoring, and use of personal websites. ❑ Accessing, monitoring, and use of personal networks. ❑ Bypassing the firewall and bypass and attempt to circumvent network security, virus protection, network filtering, or policies. ❑ Use external drives or storage devices with the intent of infecting any school computer or network with a virus, Trojan, or program designed to damage, alter, destroy or provide access to unauthorized data or information. This includes software applications or utility applications that could alter the configuration of the operating system or network equipment, scan or probe the network, or provide access to unauthorized areas or data. ❑ Bullying: Policies have been adopted by the Xxxxxx County School System prohibiting bullying. Students should not use personal or school-owned technology resources to threaten, harass, or intimidate others. Prohibited behaviors include, but are not limited to o Seek to access, contribute to or initiate (create) inappropriate material on the internet, including (but not limited to) abusive, obscene, sexually-oriented material, or hate speech to communicate, or cause to be communicated through words, images or language by or through the use of electronic mail or electronic communication, directed at or about a specific person, causing substantial emotional distress to the victim or damaging to another’s reputation o Cyberbullying or the willful act of hostile or repeated harassing or intimidating of someone through digital technology, including but not limited to, email, blogs, social networking websites (ex: Facebook, Twitter, etc.), chat rooms, texts, and instant messaging o The use of cameras or camera phones to take embarrassing or inappropriate photographs or videos of student or school employees and posting them online o Sending threatening or abusive text messages or instant messages or any social network or digital form o Using websites or email to propagate gossip or hear-say/rumors to other students Hardware ❑ Personal equipment is not allowed to be connected to the wired network nor supported at Xxxxxx County Schools (exceptions to be considered for academic purposes only). Any deviation from this agreement must be presented to the Technology Director. ❑ Attempts to replace, repair, disconnect or disassemble any network or computer component without permission from the technology department is not permitted. ❑ Misuse of school resources can result in disciplinary action. ❑ School district technological resources are provided for school-related purposes. Acceptable uses of such technological resources are limited to responsible, efficient and legal activities that support learning. Use of school district technological resources for political purposes or for commercial gain or profit is prohibited. Student personal use of school district technological resources for amusement or entertainment is also prohibited.
Appears in 2 contracts
Samples: Technology Acceptable Use and Internet Safety Agreement, Technology Acceptable Use and Internet Safety Agreement
Unacceptable Use. The user is responsible for all his/her actions and activities involving the network. Examples of prohibited conduct include but are not limited to the following: ❑ Using the network for any illegal activity, including violation of copyright or other contracts or transmitting any material in violation of U.S. and State regulations. ❑ Copying or downloading copyrighted material on any system connected to the school system's hardware/software without the owner's permission. Only the owner(s) or individuals specifically authorized by the owner(s) may copy or download copyrighted material to the system. School purchased software may not be copied for personal use. ❑ Students will not use district computers and laptops to copy or download copyrighted software, music or images, or for other violation of copyright laws. Peer-to-peer, file-sharing, torrent software may not be installed on a school system computer or laptop. ❑ Copying, printing or downloading copyrighted material for the users own use without the owner's permission. Users may redistribute copyrighted programs only with the owner’s permission. Such permission must be specified in the document or must be obtained directly from the owner in accordance with applicable copyright laws, Board policy and administrative procedures. This includes the district contracted photographer. ❑ Product advertisement or political lobbying is prohibited. ❑ Vandalism. Vandalism is defined as any malicious attempt to harm or destroy data of another user, the network or the Internet. This includes, but is not limited to, creating and/or uploading or downloading viruses, disconnect or disassemble any network or computer component. ❑ Using or attempting to use the network while privileges are suspended or revoked. ❑ Using the computer of a teacher, administrator, or other staff member without permission or supervision. ❑ Use of technology resources in such a way that you would disrupt other users (sounds and/or excessive bandwidth usage, e.g., radio/audio streaming, video streaming). ❑ Provide another student with user account information or passwords ❑ Unauthorized interception of electronic communications and other wiretapping, including electronic mail (The Electronic Communications Privacy Act 18 USC 2701-2709) ❑ Accessing, monitoring, and use of personal websites. ❑ Accessing, monitoring, and use of personal networks. ❑ Bypassing the firewall and bypass and attempt to circumvent network security, virus protection, network filtering, or policies. ❑ Use external drives or storage devices with the intent of infecting any school computer or network with a virus, Trojan, or program designed to damage, alter, destroy or provide access to unauthorized data or information. This includes software applications or utility applications that could alter the configuration of the operating system or network equipment, scan or probe the network, or provide access to unauthorized areas or data. ❑ Bullying: Policies have been adopted by the Xxxxxx County School System prohibiting bullying. Students should not use personal or school-owned technology resources to threaten, harass, or intimidate others. Prohibited behaviors include, but are not limited to o Seek to access, contribute to or initiate (create) inappropriate material on the internet, including (but not limited to) abusive, obscene, sexually-oriented material, or hate speech to communicate, or cause to be communicated through words, images or language by or through the use of electronic mail or electronic communication, directed at or about a specific person, causing substantial emotional distress to the victim or damaging to another’s reputation o Cyberbullying or the willful act of hostile or repeated harassing or intimidating of someone through digital technology, including but not limited to, email, blogs, social networking websites (ex: Facebook, Twitter, etc.), chat rooms, texts, and instant messaging o The use of cameras or camera phones to take embarrassing or inappropriate photographs or videos of student or school employees and posting them online o Sending threatening or abusive text messages or instant messages or any social network or digital form o Using websites or email to propagate gossip or hear-say/rumors to other students Hardware ❑ Personal equipment is not allowed to be connected to the wired wired/wireless network nor supported at Xxxxxx County Schools (exceptions to be considered for academic purposes only). Any deviation from this agreement must be presented to the Technology Director. ❑ Attempts to replace, repair, disconnect or disassemble any network or computer component without permission from the technology department is not permitted. ❑ Misuse of school resources can result in disciplinary action. ❑ School district technological resources are provided for school-related purposes. Acceptable uses of such technological resources are limited to responsible, efficient and legal activities that support learning. Use of school district technological resources for political purposes or for commercial gain or profit is prohibited. Student personal use of school district technological resources for amusement or entertainment is also prohibited.
Appears in 2 contracts
Samples: Technology Acceptable Use and Internet Safety Agreement, Technology Acceptable Use and Internet Safety Agreement
Unacceptable Use. The user is responsible for all his/her actions and activities involving the network. Examples of prohibited conduct include but are not limited to the following: ❑ Using the network for any illegal activity, including violation of copyright or other contracts or transmitting any material in violation of U.S. and State regulations. ❑ Copying or downloading copyrighted material on any system connected to the school system's hardware/software without the owner's permission. Only the owner(s) or individuals specifically authorized by the owner(s) may copy or download copyrighted material to the system. School purchased software may not be copied for personal use. ❑ Students will not use district computers and laptops to copy or download copyrighted software, music or images, or for other violation of copyright laws. Peer-to-peer, file-sharing, torrent software may not be installed on a school system computer or laptop. ❑ Copying, printing or downloading copyrighted material for the users own use without the owner's permission. Users may redistribute copyrighted programs only with the owner’s permission. Such permission must be specified in the document or must be obtained directly from the owner in accordance with applicable copyright laws, Board policy and administrative procedures. This includes the district contracted photographer. ❑ Product advertisement or political lobbying is prohibited. ❑ Vandalism. Vandalism is defined as any malicious attempt to harm or destroy data of another user, the network or the Internet. This includes, but is not limited to, creating and/or uploading or downloading viruses, disconnect or disassemble any network or computer component. ❑ Using or attempting to use the network while privileges are suspended or revoked. ❑ Using the computer of a teacher, administrator, or other staff member without permission or supervision. ❑ Use of technology resources in such a way that you would disrupt other users (sounds and/or excessive bandwidth usage, e.g., radio/audio streaming, video streaming). ❑ Provide another student with user account information or passwords ❑ Unauthorized interception of electronic communications and other wiretapping, including electronic mail (The Electronic Communications Privacy Act 18 USC 2701-2709) ❑ Accessing, monitoring, and use of personal websites. ❑ Accessing, monitoring, and use of personal networks. ❑ Bypassing the firewall and bypass and attempt to circumvent network security, virus protection, network filtering, or policies. ❑ Use external drives or storage devices with the intent of infecting any school computer or network with a virus, Trojan, or program designed to damage, alter, destroy or provide access to unauthorized data or information. This includes software applications or utility applications that could alter the configuration of the operating system or network equipment, scan or probe the network, or provide access to unauthorized areas or data. ❑ Bullying: Policies have been adopted by the Xxxxxx Echols County School System prohibiting bullying. Students should not use personal or school-owned technology resources to threaten, harass, or intimidate others. Prohibited behaviors include, but are not limited to o Seek to access, contribute to or initiate (create) inappropriate material on the internet, including (but not limited to) abusive, obscene, sexually-oriented material, or hate speech to communicate, or cause to be communicated through words, images or language by or through the use of electronic mail or electronic communication, directed at or about a specific person, causing substantial emotional distress to the victim or damaging to another’s reputation o Cyberbullying or the willful act of hostile or repeated harassing or intimidating of someone through digital technology, including but not limited to, email, blogs, social networking websites (ex: Facebook, Twitter, etc.), chat rooms, texts, and instant messaging o The use of cameras or camera phones to take embarrassing or inappropriate photographs or videos of student or school employees and posting them online o Sending threatening or abusive text messages or instant messages or any social network or digital form o Using websites or email to propagate gossip or hear-say/rumors to other students Hardware ❑ Personal equipment is not allowed to be connected to the wired wired/wireless network nor supported at Xxxxxx Echols County Schools (exceptions to be considered for academic purposes only). Any deviation from this agreement must be presented to the Technology Director. ❑ Attempts to replace, repair, disconnect or disassemble any network or computer component without permission from the technology department is not permitted. ❑ Misuse of school resources can result in disciplinary action. ❑ School district technological resources are provided for school-related purposes. Acceptable uses of such technological resources are limited to responsible, efficient and legal activities that support learning. Use of school district technological resources for political purposes or for commercial gain or profit is prohibited. Student personal use of school district technological resources for amusement or entertainment is also prohibited.
Appears in 1 contract
Samples: Technology Acceptable Use and Internet Safety Agreement