SlideShare uma empresa Scribd logo
1 de 5
Social Media
Acceptable Use Policy
2012-2013
Introduction
YOURSCHOOLNAME recognizes that access to technology in school gives students and teachers greater
opportunities to learn, engage, communicate, and develop skills that will prepare them for work, life, and
citizenship. We are committed to helping students develop 21st-century technology and communication skills.
To that end, we provide access to technologies for student and staff use. This Acceptable Use Policy outlines
the guidelines and behaviors that users are expected to follow when using school technologies or when using
personally-owned devices on the school campus.
 The network is intended for educational purposes.
 All activity over the network or using district technologies may be monitored and retained.
 Access to online content via the network may be restricted in accordance with our policies and federal
regulations, such as the Children’s Internet Protection Act (CIPA).
 Students are expected to follow the same rules for good behavior and respectful conduct online as
offline.
 Misuse of school resources can result in disciplinary action.
 We make a reasonable effort to ensure students’ safety and security online, but will not be held
accountable for any harm or damages that result from misuse of school technologies.
 Users of the network or other technologies are expected to alert IT staff immediately of any concerns for
safety or security.
Technologies Covered
YOURSCHOOLNAME may provide Internet access, desktop computers, mobile computers or devices,
videoconferencing capabilities, online collaboration capabilities, message boards, email, and more.
As new technologies emerge, YOURSCHOOLNAME will attempt to provide access to them. The policies
outlined in this document are intended to cover all available technologies, not just those specifically listed.
Usage Policies
All technologies provided by YOURSCHOOLNAME are intended for educational purposes. All users are
expected to use good judgment and to follow the specifics of this document as well as the spirit of it: be safe,
appropriate, careful and kind; don’t try to get around technological protection measures; use good common
sense; and ask if you don’t know.
Web Access
YOURSCHOOLNAME provides its users with access to the Internet, including web sites, resources, content,
and online tools. That access will be restricted in compliance with CIPA regulations and school policies. Web
browsing may be monitored and web activity records may be retained indefinitely.
Users are expected to respect that the web filter is a safety precaution, and should not try to circumvent it when
browsing the Web. If a site is blocked and a user believes it shouldn’t be, the user should follow protocol to
alert an IT staff member or submit the site for review.
Email
YOURSCHOOLNAME may provide users with email accounts for the purpose of school-related
communication. Availability and use may be restricted based on school policies.
If users are provided with email accounts, they should be used with care. Users should not send personal
information; should not attempt to open files or follow links from unknown or untrusted origin; should use
appropriate language; and should only communicate with other people as allowed by the district policy or the
teacher.
Users are expected to communicate with the same appropriate, safe, mindful, courteous conduct online as
offline. Email usage may be monitored and archived.
Social / Web 2.0 / Collaborative Content
Recognizing that collaboration is essential to education, YOURSCHOOLNAME may provide users with access
to web sites or tools that allow communication, collaboration, sharing, and messaging among users.
Users are expected to communicate with the same appropriate, safe, mindful, courteous conduct online as
offline. Posts, chats, sharing, and messaging may be monitored. Users should be careful not to share personally-
identifying information online.
Mobile Devices Policy
YOURSCHOOLNAME may provide users with mobile computers or other devices to promote learning both
inside and outside of the classroom. Users should abide by the same acceptable use policies when using school
devices off the school network as on the school network.
Users are expected to treat these devices with extreme care and caution; these are expensive devices that the
school is entrusting to your care. Users should report any loss, damage, or malfunction to IT staff immediately.
Users may be financially accountable for any damage resulting from negligence or misuse.
Use of school-issued mobile devices, including use of the school network, may be monitored.
Personally-Owned Devices
Students may use personally-owned devices (including laptops, tablets, smartphones, and cell phones) at any
time during school hours—unless such use interferes with the delivery of instruction by a teacher or staff or
creates a disturbance in the educational environment. Any misuse of personally-owned devices may result in
disciplinary action. Therefore, proper netiquette and adherence to the acceptable use policy should always be
used. In some cases, a separate network may be provided for personally-owned devices.
Security
Users are expected to take reasonable safeguards against the transmission of security threats over the school
network. This includes not opening or distributing infected files or programs and not opening files or programs
of unknown or untrusted origin. If you believe a computer or mobile device you are using might be infected
with a virus, please alert IT. Do not attempt to remove the virus yourself or download any programs to help
remove the virus.
Downloads
Users should not download or attempt to download or run .exe programs over the school network or onto school
resources without express permission from IT staff. You may be able to download other file types, such as
images of videos. For the security of our network, download such files only from reputable sites, and only for
educational purposes.
Netiquette
 Users should always use the Internet, network resources, and online sites in a courteous and respectful
manner.
 Users should also recognize that among the valuable content online is unverified, incorrect, or
inappropriate content. Users should use trusted sources when conducting research via the Internet.
 Users should also remember not to post anything online that they wouldn’t want parents, teachers, or
future colleges or employers to see. Once something is online, it’s out there—and can sometimes be
shared and spread in ways you never intended.
Plagiarism
 Users should not plagiarize (or use as their own, without citing the original creator) content, including
words or images, from the Internet.
 Users should not take credit for things they didn’t create themselves, or misrepresent themselves as an
author or creator of something found online. Research conducted via the Internet should be
appropriately cited, giving credit to the original author.
Personal Safety
If you see a message, comment, image, or anything else online that makes you concerned for your personal
safety, bring it to the attention of an adult (teacher or staff if you’re at school; parent if you’re using the device
at home) immediately.
 Users should never share personal information, including phone number, address, social security
number, birthday, or financial information, over the Internet without adult permission.
 Users should recognize that communicating over the Internet brings anonymity and associated risks, and
should carefully safeguard the personal information of themselves and others.
 Users should never agree to meet someone they meet online in real life without parental permission.
Cyberbullying
Cyberbullying will not be tolerated. Harassing, dissing, flaming, denigrating, impersonating, outing, tricking,
excluding, and cyberstalking are all examples of cyberbullying. Don’t be mean. Don’t send emails or post
comments with the intent of scaring, hurting, or intimidating someone else.
Engaging in these behaviors, or any online activities intended to harm (physically or emotionally) another
person, will result in severe disciplinary action and loss of privileges. In some cases, cyberbullying can be a
crime. Remember that your activities are monitored and retained.
Examples of Acceptable Use
I will:
 Use school technologies for school-related activities and research.
 Follow the same guidelines for respectful, responsible behavior online that I am expected to follow
offline.
 Treat school resources carefully, and alert staff if there is any problem with their operation.
 Encourage positive, constructive discussion if allowed to use communicative or collaborative
technologies.
 Alert a teacher or other staff member if I see threatening/bullying, inappropriate, or harmful content
(images, messages, posts) online.
 Use school technologies at appropriate times, in approved places, for educational pursuits only.
 Cite sources when using online sites and resources for research; ensure there is no copyright
infringement.
 Recognize that use of school technologies is a privilege and treat it as such.
 Be cautious to protect the safety of myself and others.
 Help to protect the security of school resources.
This is not intended to be an exhaustive list. Users should use their own good judgment when using school
technologies.
Examples of Unacceptable Use
I will not:
 Use school technologies in a way that could be personally or physically harmful to myself or others.
 Search inappropriate images or content.
 Engage in cyberbullying, harassment, or disrespectful conduct toward others–staff or students.
 Try to find ways to circumvent the school’s safety measures and filtering tools.
 Use school technologies to send spam or chain mail.
 Plagiarize content I find online.
 Post personally-identifying information, about myself or others.
 Agree to meet someone I meet online in real life.
 Use language online that would be unacceptable in the classroom.
 Use school technologies for illegal activities or to pursue information on such activities.
 Attempt to hack or access sites, servers, accounts, or content that isn’t intended for my use.
This is not intended to be an exhaustive list. Users should use their own good judgment when using school
technologies.
Limitation of Liability
YOURSCHOOLNAME will not be responsible for damage or harm to persons, files, data, or hardware. While
YOURSCHOOLNAME employs filtering and other safety and security mechanisms, and attempts to ensure
their proper function, it makes no guarantees as to their effectiveness. YOURSCHOOLNAME will not be
responsible, financially or otherwise, for unauthorized transactions conducted over the school network.
Violations of this Acceptable Use Policy
Violations of this policy may have disciplinary repercussions, including:
 Suspension of network, technology, or computer privileges in extreme cases
 Notification to parents in most cases
 Detention or suspension from school and school-related activities
 Legal action and/or prosecution
I have read and understood this Acceptable Use Policy and agree to abide by it:
__________________________________________
(Student Printed Name)
__________________________________________
(Student Signature)
__________________________________________
(Date)
I have read and discussed this Acceptable Use Policy with my child:
__________________________________________
(Parent Printed Name)
__________________________________________
(Parent Signature)
__________________________________________
(Date)

Mais conteúdo relacionado

Mais procurados

E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy donekgrosvenor
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyKoolteechatechnology
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethicallyLinda Long
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policycollimic
 
Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issueslisadevine21
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schoolsPaul Chamberlain
 
Staff training session
Staff training sessionStaff training session
Staff training sessionmander5208
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3bweinert
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
E behaviour code brochure english
E behaviour code brochure englishE behaviour code brochure english
E behaviour code brochure englishThinkB4UClick
 
Internet safety pd boot camp 13 14
Internet safety pd boot camp 13 14Internet safety pd boot camp 13 14
Internet safety pd boot camp 13 14Marsha Harris
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints HandoutOllie Bray
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianKate Gukeisen
 

Mais procurados (19)

E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issues
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E behaviour code brochure english
E behaviour code brochure englishE behaviour code brochure english
E behaviour code brochure english
 
Internet safety pd boot camp 13 14
Internet safety pd boot camp 13 14Internet safety pd boot camp 13 14
Internet safety pd boot camp 13 14
 
Legal 08
Legal 08Legal 08
Legal 08
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 

Destaque

Fy ssp 15
Fy ssp 15Fy ssp 15
Fy ssp 15Har1982
 
Fall 2015 ci 350 syllabus
Fall 2015 ci 350 syllabusFall 2015 ci 350 syllabus
Fall 2015 ci 350 syllabusHar1982
 
Digital Storytelling
Digital StorytellingDigital Storytelling
Digital StorytellingHar1982
 
Fys syllabus
Fys syllabusFys syllabus
Fys syllabusHar1982
 
Journeys hfw
Journeys hfwJourneys hfw
Journeys hfwlgarza78
 

Destaque (6)

Fy ssp 15
Fy ssp 15Fy ssp 15
Fy ssp 15
 
Fall 2015 ci 350 syllabus
Fall 2015 ci 350 syllabusFall 2015 ci 350 syllabus
Fall 2015 ci 350 syllabus
 
Assure
AssureAssure
Assure
 
Digital Storytelling
Digital StorytellingDigital Storytelling
Digital Storytelling
 
Fys syllabus
Fys syllabusFys syllabus
Fys syllabus
 
Journeys hfw
Journeys hfwJourneys hfw
Journeys hfw
 

Semelhante a Social media policy

SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]Debbie Oliver
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policyBadaiaEnglish
 
Responsibly use policy
Responsibly use policyResponsibly use policy
Responsibly use policymariacabarcos
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Safety Presentation
Safety PresentationSafety Presentation
Safety PresentationSarah Sutter
 
Acceptable Internet Use In Schools
Acceptable Internet Use In SchoolsAcceptable Internet Use In Schools
Acceptable Internet Use In Schoolsvlferrari
 
Ferrari v policy
Ferrari v policyFerrari v policy
Ferrari v policyvlferrari
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
Acceptable use policy
Acceptable use policy Acceptable use policy
Acceptable use policy denverjewart
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educatorsjessa_delingon
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India
 
Internet safety and acceptable use policies
Internet safety and acceptable use policiesInternet safety and acceptable use policies
Internet safety and acceptable use policiesjac2015
 
Rules, regulations and recommendations on social media in HE
Rules, regulations and recommendations on social media in HERules, regulations and recommendations on social media in HE
Rules, regulations and recommendations on social media in HEInger-Marie Christensen
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying ResourcesAndy Jeter
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomMrs.Faust
 

Semelhante a Social media policy (20)

SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policy
 
Responsibly use policy
Responsibly use policyResponsibly use policy
Responsibly use policy
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
CES BYOT Agreement
CES BYOT AgreementCES BYOT Agreement
CES BYOT Agreement
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Acceptable Internet Use In Schools
Acceptable Internet Use In SchoolsAcceptable Internet Use In Schools
Acceptable Internet Use In Schools
 
Ferrari v policy
Ferrari v policyFerrari v policy
Ferrari v policy
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Acceptable use policy
Acceptable use policy Acceptable use policy
Acceptable use policy
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policy
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
 
Internet safety and acceptable use policies
Internet safety and acceptable use policiesInternet safety and acceptable use policies
Internet safety and acceptable use policies
 
Rules, regulations and recommendations on social media in HE
Rules, regulations and recommendations on social media in HERules, regulations and recommendations on social media in HE
Rules, regulations and recommendations on social media in HE
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 

Mais de Har1982

Survivor
SurvivorSurvivor
SurvivorHar1982
 
Storytelling
StorytellingStorytelling
StorytellingHar1982
 
Twitter in the classroom
Twitter in the classroomTwitter in the classroom
Twitter in the classroomHar1982
 
Twitter in class
Twitter in classTwitter in class
Twitter in classHar1982
 
Fys test
Fys testFys test
Fys testHar1982
 
Arts anad bots pres
Arts anad bots presArts anad bots pres
Arts anad bots presHar1982
 
Twitter in the classroom
Twitter in the classroomTwitter in the classroom
Twitter in the classroomHar1982
 
Facebook
FacebookFacebook
FacebookHar1982
 
Social media success
Social media successSocial media success
Social media successHar1982
 
Home page
Home pageHome page
Home pageHar1982
 
Management theories
Management theoriesManagement theories
Management theoriesHar1982
 
Assure.ppt
Assure.pptAssure.ppt
Assure.pptHar1982
 
Web 2.0 Tools for the 21st century learner
Web 2.0 Tools for the 21st century learnerWeb 2.0 Tools for the 21st century learner
Web 2.0 Tools for the 21st century learnerHar1982
 
Instructional computing and technology webquest
Instructional computing and technology webquestInstructional computing and technology webquest
Instructional computing and technology webquestHar1982
 

Mais de Har1982 (20)

Survivor
SurvivorSurvivor
Survivor
 
Storytelling
StorytellingStorytelling
Storytelling
 
Twitter in the classroom
Twitter in the classroomTwitter in the classroom
Twitter in the classroom
 
Twitter in class
Twitter in classTwitter in class
Twitter in class
 
Assure
AssureAssure
Assure
 
Assure
AssureAssure
Assure
 
Fys test
Fys testFys test
Fys test
 
Assure
AssureAssure
Assure
 
Arts anad bots pres
Arts anad bots presArts anad bots pres
Arts anad bots pres
 
Assure
AssureAssure
Assure
 
Twitter in the classroom
Twitter in the classroomTwitter in the classroom
Twitter in the classroom
 
Edmodo
EdmodoEdmodo
Edmodo
 
Facebook
FacebookFacebook
Facebook
 
Social media success
Social media successSocial media success
Social media success
 
Home page
Home pageHome page
Home page
 
Management theories
Management theoriesManagement theories
Management theories
 
Assure.ppt
Assure.pptAssure.ppt
Assure.ppt
 
Web 2.0 Tools for the 21st century learner
Web 2.0 Tools for the 21st century learnerWeb 2.0 Tools for the 21st century learner
Web 2.0 Tools for the 21st century learner
 
Script
ScriptScript
Script
 
Instructional computing and technology webquest
Instructional computing and technology webquestInstructional computing and technology webquest
Instructional computing and technology webquest
 

Último

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Social media policy

  • 1. Social Media Acceptable Use Policy 2012-2013 Introduction YOURSCHOOLNAME recognizes that access to technology in school gives students and teachers greater opportunities to learn, engage, communicate, and develop skills that will prepare them for work, life, and citizenship. We are committed to helping students develop 21st-century technology and communication skills. To that end, we provide access to technologies for student and staff use. This Acceptable Use Policy outlines the guidelines and behaviors that users are expected to follow when using school technologies or when using personally-owned devices on the school campus.  The network is intended for educational purposes.  All activity over the network or using district technologies may be monitored and retained.  Access to online content via the network may be restricted in accordance with our policies and federal regulations, such as the Children’s Internet Protection Act (CIPA).  Students are expected to follow the same rules for good behavior and respectful conduct online as offline.  Misuse of school resources can result in disciplinary action.  We make a reasonable effort to ensure students’ safety and security online, but will not be held accountable for any harm or damages that result from misuse of school technologies.  Users of the network or other technologies are expected to alert IT staff immediately of any concerns for safety or security. Technologies Covered YOURSCHOOLNAME may provide Internet access, desktop computers, mobile computers or devices, videoconferencing capabilities, online collaboration capabilities, message boards, email, and more. As new technologies emerge, YOURSCHOOLNAME will attempt to provide access to them. The policies outlined in this document are intended to cover all available technologies, not just those specifically listed. Usage Policies All technologies provided by YOURSCHOOLNAME are intended for educational purposes. All users are expected to use good judgment and to follow the specifics of this document as well as the spirit of it: be safe, appropriate, careful and kind; don’t try to get around technological protection measures; use good common sense; and ask if you don’t know. Web Access YOURSCHOOLNAME provides its users with access to the Internet, including web sites, resources, content, and online tools. That access will be restricted in compliance with CIPA regulations and school policies. Web browsing may be monitored and web activity records may be retained indefinitely. Users are expected to respect that the web filter is a safety precaution, and should not try to circumvent it when browsing the Web. If a site is blocked and a user believes it shouldn’t be, the user should follow protocol to alert an IT staff member or submit the site for review. Email YOURSCHOOLNAME may provide users with email accounts for the purpose of school-related communication. Availability and use may be restricted based on school policies.
  • 2. If users are provided with email accounts, they should be used with care. Users should not send personal information; should not attempt to open files or follow links from unknown or untrusted origin; should use appropriate language; and should only communicate with other people as allowed by the district policy or the teacher. Users are expected to communicate with the same appropriate, safe, mindful, courteous conduct online as offline. Email usage may be monitored and archived. Social / Web 2.0 / Collaborative Content Recognizing that collaboration is essential to education, YOURSCHOOLNAME may provide users with access to web sites or tools that allow communication, collaboration, sharing, and messaging among users. Users are expected to communicate with the same appropriate, safe, mindful, courteous conduct online as offline. Posts, chats, sharing, and messaging may be monitored. Users should be careful not to share personally- identifying information online. Mobile Devices Policy YOURSCHOOLNAME may provide users with mobile computers or other devices to promote learning both inside and outside of the classroom. Users should abide by the same acceptable use policies when using school devices off the school network as on the school network. Users are expected to treat these devices with extreme care and caution; these are expensive devices that the school is entrusting to your care. Users should report any loss, damage, or malfunction to IT staff immediately. Users may be financially accountable for any damage resulting from negligence or misuse. Use of school-issued mobile devices, including use of the school network, may be monitored. Personally-Owned Devices Students may use personally-owned devices (including laptops, tablets, smartphones, and cell phones) at any time during school hours—unless such use interferes with the delivery of instruction by a teacher or staff or creates a disturbance in the educational environment. Any misuse of personally-owned devices may result in disciplinary action. Therefore, proper netiquette and adherence to the acceptable use policy should always be used. In some cases, a separate network may be provided for personally-owned devices. Security Users are expected to take reasonable safeguards against the transmission of security threats over the school network. This includes not opening or distributing infected files or programs and not opening files or programs of unknown or untrusted origin. If you believe a computer or mobile device you are using might be infected with a virus, please alert IT. Do not attempt to remove the virus yourself or download any programs to help remove the virus. Downloads Users should not download or attempt to download or run .exe programs over the school network or onto school resources without express permission from IT staff. You may be able to download other file types, such as images of videos. For the security of our network, download such files only from reputable sites, and only for educational purposes. Netiquette  Users should always use the Internet, network resources, and online sites in a courteous and respectful manner.
  • 3.  Users should also recognize that among the valuable content online is unverified, incorrect, or inappropriate content. Users should use trusted sources when conducting research via the Internet.  Users should also remember not to post anything online that they wouldn’t want parents, teachers, or future colleges or employers to see. Once something is online, it’s out there—and can sometimes be shared and spread in ways you never intended. Plagiarism  Users should not plagiarize (or use as their own, without citing the original creator) content, including words or images, from the Internet.  Users should not take credit for things they didn’t create themselves, or misrepresent themselves as an author or creator of something found online. Research conducted via the Internet should be appropriately cited, giving credit to the original author. Personal Safety If you see a message, comment, image, or anything else online that makes you concerned for your personal safety, bring it to the attention of an adult (teacher or staff if you’re at school; parent if you’re using the device at home) immediately.  Users should never share personal information, including phone number, address, social security number, birthday, or financial information, over the Internet without adult permission.  Users should recognize that communicating over the Internet brings anonymity and associated risks, and should carefully safeguard the personal information of themselves and others.  Users should never agree to meet someone they meet online in real life without parental permission. Cyberbullying Cyberbullying will not be tolerated. Harassing, dissing, flaming, denigrating, impersonating, outing, tricking, excluding, and cyberstalking are all examples of cyberbullying. Don’t be mean. Don’t send emails or post comments with the intent of scaring, hurting, or intimidating someone else. Engaging in these behaviors, or any online activities intended to harm (physically or emotionally) another person, will result in severe disciplinary action and loss of privileges. In some cases, cyberbullying can be a crime. Remember that your activities are monitored and retained. Examples of Acceptable Use I will:  Use school technologies for school-related activities and research.  Follow the same guidelines for respectful, responsible behavior online that I am expected to follow offline.  Treat school resources carefully, and alert staff if there is any problem with their operation.  Encourage positive, constructive discussion if allowed to use communicative or collaborative technologies.  Alert a teacher or other staff member if I see threatening/bullying, inappropriate, or harmful content (images, messages, posts) online.  Use school technologies at appropriate times, in approved places, for educational pursuits only.  Cite sources when using online sites and resources for research; ensure there is no copyright infringement.  Recognize that use of school technologies is a privilege and treat it as such.  Be cautious to protect the safety of myself and others.  Help to protect the security of school resources.
  • 4. This is not intended to be an exhaustive list. Users should use their own good judgment when using school technologies. Examples of Unacceptable Use I will not:  Use school technologies in a way that could be personally or physically harmful to myself or others.  Search inappropriate images or content.  Engage in cyberbullying, harassment, or disrespectful conduct toward others–staff or students.  Try to find ways to circumvent the school’s safety measures and filtering tools.  Use school technologies to send spam or chain mail.  Plagiarize content I find online.  Post personally-identifying information, about myself or others.  Agree to meet someone I meet online in real life.  Use language online that would be unacceptable in the classroom.  Use school technologies for illegal activities or to pursue information on such activities.  Attempt to hack or access sites, servers, accounts, or content that isn’t intended for my use. This is not intended to be an exhaustive list. Users should use their own good judgment when using school technologies. Limitation of Liability YOURSCHOOLNAME will not be responsible for damage or harm to persons, files, data, or hardware. While YOURSCHOOLNAME employs filtering and other safety and security mechanisms, and attempts to ensure their proper function, it makes no guarantees as to their effectiveness. YOURSCHOOLNAME will not be responsible, financially or otherwise, for unauthorized transactions conducted over the school network. Violations of this Acceptable Use Policy Violations of this policy may have disciplinary repercussions, including:  Suspension of network, technology, or computer privileges in extreme cases  Notification to parents in most cases  Detention or suspension from school and school-related activities  Legal action and/or prosecution I have read and understood this Acceptable Use Policy and agree to abide by it: __________________________________________ (Student Printed Name) __________________________________________ (Student Signature) __________________________________________ (Date) I have read and discussed this Acceptable Use Policy with my child: __________________________________________ (Parent Printed Name)