SlideShare uma empresa Scribd logo
1 de 35
Taken from Board Policy No. 2022P
The Normal Stuff
General Use                 Personal Security

Personal Responsibility     Copyright

Lab Management              Repairs

                 Consequences

Please click on each title to learn more.
General Use
The network exists primarily for email and
  internet research.




                                     Return to contents
General Use


It is not intended to be used for non academic
   purposes.
General Use




Network bandwidth is limited so teachers
 should not waste or allow students to waste
 this resource.
General Use
The network exists primarily for email and
   internet research.
It is not intended to be used for non academic
   purposes.
Network bandwidth is limited so teachers
   should not waste or allow students to waste
   this resource.
Personal Responsibility
1. Use of network supports student learning
2.
3.
4.
5.
6.
7.
Personal Responsibility
1.
2. Do not break any laws or use network to make money.
3.
4.
5.
6.
7.
Personal Responsibility
1.
2.
3. Do not use network to express political views.
4.
5.
6.
7.
Personal Responsibility
1.
2.
3.
4. Do nothing to harm hardware, software, or the network.
5.
6.
7.
Personal Responsibility
1.
2.
3.
4.
5. Using the network to develop malicious programs is
   prohibited.
6.
7.
Personal Responsibility
1.
2.
3.
4.
5.
6. The use of the network to access, store, or distribute
   unauthorized material (i.e. pornography) is strictly
   prohibited.
7.
Personal Responsibility
1. Use of network supports student learning
2. Do not break any laws or use network to make money.
3. Do not use network to express political views.
4. Do nothing to harm hardware, software, or the network.
5. Using the network to develop malicious programs is
   prohibited.
6. Users are responsible for what they publish via the network.
   Harassment/Hate mail are prohibited. (remember whatever
   you write is a public document.)
7. The use of the network to access, store, or distribute
   unauthorized material (i.e. pornography) is strictly
   prohibited.
Lab Management




       Return to contents
Lab Management
Please follow through on the following elements of lab management:
1) Use a seating chart so there is a record of who was at each
    computer.
Lab Management

Please follow through on the following elements of lab management:
1)
2) No food or drink near computers.
Lab Management

Please follow through on the following elements of lab management:
1)
2)
3) Manage by walking around (lab time is not lecture, email, grading,
    or time for meeting with individuals).
Lab Management

Please follow through on the following elements of lab management:
1)
2)
3)
4) Use Management software (LanSchool).
Lab Management

Please follow through on the following elements of lab management:
1)
2)
3)
4) Make certain that the lab is cleaned up prior to the end of each
    period. (Leave at least 5 minutes for clean up).
Lab Management

Please follow through on the following elements of lab management:
1)
2)
3)
4)
5)
6) Make certain that your students know what they are doing prior
    to going to the lab… Most damage is done out of student
    frustration over assignments…If they don’t have a plan, they
    should not be on the computer…
Lab Management

Please follow through on the following elements of lab management:
1) Use a seating chart so there is a record of who was at each
    computer.
2) No food or drink near computers.
3) Manage by walking around (lab time is not lecture, email, grading,
    or time for meeting with individuals).
4) Use Management software (LanSchool).
5) Make certain that the lab is cleaned up prior to the end of each
    period. (Leave at least 5 minutes for clean up).
6) Make certain that your students know what they are doing prior
    to going to the lab… Most damage is done out of student
    frustration over assignments…If they don’t have a plan, they
    should not be on the computer…
Personal Security

 Do not share your passwords or
  account privileges with anyone
  else.

 Doing so may be considered
  making a gift of public funds
  and may jeopardize the security
  of your account.

                                    Return to contents
The unauthorized…
   Copyright                    -installation -use -storage
                                -or distribution of copyrighted
                                   material or software on district
                                   computers is prohibited.

Helpful hint… unless the district owns
the item or it is specifically marked as
being able to be used in educational
settings, it is copyrighted and you need
the creator’s permission.

This includes anything you get from the
internet as well.

           Return to contents
                                                     Image by Stephen Downes
Repairs




Return to contents
Repairs
1) Turn everything off and back on (90% of problems
   may be solved by a simple reboot.)
2)
3)
4)
Repairs
1)
2) If it is a gray tower, we need to fix it ourselves. (Send
   Bill and Paul an email… do not just write it on the
   board, we won’t see it)
3)
4)
Repairs
1)
2)
3) Do not let students work on computers.
4)
Repairs
1)
2)
3)
4) If you need a software update or a repair for a
   laptop/black tower, go online and fill out a trouble
   ticket. Do not leave it for someone else to take care
   of.
Repairs
1) Turn everything off and back on (90% of problems
   may be solved by a simple reboot.)
2) If it is a gray tower, we need to fix it ourselves. (Send
   Bill and Paul an email… do not just write it on the
   board, we won’t see it)
3) Do not let students work on computers.
4) If you need a software update or a repair for a
   laptop/black tower, go online and fill out a trouble
   ticket. Do not leave it for someone else to take care
   of.
Consequences




               Return to contents
Consequences
• For security and administrative purposes the district retains
  the right for authorized personnel to review network system
  use and file content.

•

•
Consequences
•

• The district reserves the right to remove a user account to
  prevent further unauthorized activity.

•

•
Consequences
•

•

• The District’s service provider reserves the right to
  disconnect the district to prevent further unauthorized
  activity.
•
Consequences
•

•

•

• Violation of any of the conditions of use may be cause
  for loss of network privileges and/or disciplinary action
  up to and including termination of employment.
Consequences
• For security and administrative purposes the district retains
  the right for authorized personnel to review network system
  use and file content.

• The district reserves the right to remove a user account to
  prevent further unauthorized activity.

• The District’s service provider reserves the right to disconnect
  the district to prevent further unauthorized activity.

• Violation of any of the conditions of use may be cause for loss
  of network privileges and/or disciplinary action up to and
  including termination of employment.

Mais conteúdo relacionado

Semelhante a Staff Acceptable Use Policy

Project integrator
Project integratorProject integrator
Project integratorItzcel Mc'
 
Health and safety in the workplace.
Health and safety in the workplace.Health and safety in the workplace.
Health and safety in the workplace.OriginalGSM
 
Derby con 2014
Derby con 2014Derby con 2014
Derby con 2014TonikJDK
 
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IVIncident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IVAlexander Sverdlov
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceAjay Jassi
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNorth Texas Chapter of the ISSA
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Enabling technologyvirtualisationproject
Enabling technologyvirtualisationprojectEnabling technologyvirtualisationproject
Enabling technologyvirtualisationprojectJisc
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxDondonGoles
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxRichardSugbo
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptxChandniK7
 
IRJET- Use of the Neural Network in Database
IRJET- Use of the Neural Network in DatabaseIRJET- Use of the Neural Network in Database
IRJET- Use of the Neural Network in DatabaseIRJET Journal
 
Unit8 it solutions-nl-official
Unit8 it solutions-nl-officialUnit8 it solutions-nl-official
Unit8 it solutions-nl-officialltnlanltnlan
 
SUS - ease of use perceptions and eportfoliostfolios Stephen Bright
SUS - ease of use perceptions and eportfoliostfolios  Stephen BrightSUS - ease of use perceptions and eportfoliostfolios  Stephen Bright
SUS - ease of use perceptions and eportfoliostfolios Stephen BrightePortfolios Australia
 
SUS - ease of use perceptions and eportfoliostfolios Stephen Bright
SUS - ease of use perceptions and eportfoliostfolios  Stephen BrightSUS - ease of use perceptions and eportfoliostfolios  Stephen Bright
SUS - ease of use perceptions and eportfoliostfolios Stephen BrightePortfolios Australia
 
Getting Schooled DerbyCon 3.0
Getting Schooled DerbyCon 3.0Getting Schooled DerbyCon 3.0
Getting Schooled DerbyCon 3.0TonikJDK
 
Introduction to Basic IT Knowledge.pptx
Introduction to Basic IT  Knowledge.pptxIntroduction to Basic IT  Knowledge.pptx
Introduction to Basic IT Knowledge.pptxsboral2
 
Short introduction about computer.
Short introduction about computer.Short introduction about computer.
Short introduction about computer.Ramesh Pant
 

Semelhante a Staff Acceptable Use Policy (20)

Project integrator
Project integratorProject integrator
Project integrator
 
Health and safety in the workplace.
Health and safety in the workplace.Health and safety in the workplace.
Health and safety in the workplace.
 
Derby con 2014
Derby con 2014Derby con 2014
Derby con 2014
 
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IVIncident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Enabling technologyvirtualisationproject
Enabling technologyvirtualisationprojectEnabling technologyvirtualisationproject
Enabling technologyvirtualisationproject
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptx
 
IRJET- Use of the Neural Network in Database
IRJET- Use of the Neural Network in DatabaseIRJET- Use of the Neural Network in Database
IRJET- Use of the Neural Network in Database
 
Unit8 it solutions-nl-official
Unit8 it solutions-nl-officialUnit8 it solutions-nl-official
Unit8 it solutions-nl-official
 
CS Syllabus 2014
CS Syllabus 2014CS Syllabus 2014
CS Syllabus 2014
 
SUS - ease of use perceptions and eportfoliostfolios Stephen Bright
SUS - ease of use perceptions and eportfoliostfolios  Stephen BrightSUS - ease of use perceptions and eportfoliostfolios  Stephen Bright
SUS - ease of use perceptions and eportfoliostfolios Stephen Bright
 
SUS - ease of use perceptions and eportfoliostfolios Stephen Bright
SUS - ease of use perceptions and eportfoliostfolios  Stephen BrightSUS - ease of use perceptions and eportfoliostfolios  Stephen Bright
SUS - ease of use perceptions and eportfoliostfolios Stephen Bright
 
Getting Schooled DerbyCon 3.0
Getting Schooled DerbyCon 3.0Getting Schooled DerbyCon 3.0
Getting Schooled DerbyCon 3.0
 
Introduction to Basic IT Knowledge.pptx
Introduction to Basic IT  Knowledge.pptxIntroduction to Basic IT  Knowledge.pptx
Introduction to Basic IT Knowledge.pptx
 
Short introduction about computer.
Short introduction about computer.Short introduction about computer.
Short introduction about computer.
 

Mais de lagrange

Simple steps to incorporating you tube videos in powerpoint
Simple steps to incorporating you tube videos in powerpointSimple steps to incorporating you tube videos in powerpoint
Simple steps to incorporating you tube videos in powerpointlagrange
 
Gimp Vs Photoshop
Gimp Vs PhotoshopGimp Vs Photoshop
Gimp Vs Photoshoplagrange
 
Creating stuff on Firstclass
Creating stuff on FirstclassCreating stuff on Firstclass
Creating stuff on Firstclasslagrange
 
Can You Blog In A Wiki
Can You Blog In A WikiCan You Blog In A Wiki
Can You Blog In A Wikilagrange
 
Chapt 10 2 Qz Review
Chapt 10 2 Qz ReviewChapt 10 2 Qz Review
Chapt 10 2 Qz Reviewlagrange
 
Temps Et Sport
Temps Et SportTemps Et Sport
Temps Et Sportlagrange
 
Je Peux Te Parler
Je Peux Te ParlerJe Peux Te Parler
Je Peux Te Parlerlagrange
 
Je Peux Te Parler
Je Peux Te ParlerJe Peux Te Parler
Je Peux Te Parlerlagrange
 

Mais de lagrange (9)

Simple steps to incorporating you tube videos in powerpoint
Simple steps to incorporating you tube videos in powerpointSimple steps to incorporating you tube videos in powerpoint
Simple steps to incorporating you tube videos in powerpoint
 
Gimp Vs Photoshop
Gimp Vs PhotoshopGimp Vs Photoshop
Gimp Vs Photoshop
 
Creating stuff on Firstclass
Creating stuff on FirstclassCreating stuff on Firstclass
Creating stuff on Firstclass
 
Can You Blog In A Wiki
Can You Blog In A WikiCan You Blog In A Wiki
Can You Blog In A Wiki
 
Chapt 10 2 Qz Review
Chapt 10 2 Qz ReviewChapt 10 2 Qz Review
Chapt 10 2 Qz Review
 
Temps Et Sport
Temps Et SportTemps Et Sport
Temps Et Sport
 
Je Peux Te Parler
Je Peux Te ParlerJe Peux Te Parler
Je Peux Te Parler
 
Je Peux Te Parler
Je Peux Te ParlerJe Peux Te Parler
Je Peux Te Parler
 
Weather1
Weather1Weather1
Weather1
 

Último

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 

Último (20)

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 

Staff Acceptable Use Policy

  • 1. Taken from Board Policy No. 2022P
  • 2. The Normal Stuff General Use Personal Security Personal Responsibility Copyright Lab Management Repairs Consequences Please click on each title to learn more.
  • 3. General Use The network exists primarily for email and internet research. Return to contents
  • 4. General Use It is not intended to be used for non academic purposes.
  • 5. General Use Network bandwidth is limited so teachers should not waste or allow students to waste this resource.
  • 6. General Use The network exists primarily for email and internet research. It is not intended to be used for non academic purposes. Network bandwidth is limited so teachers should not waste or allow students to waste this resource.
  • 7. Personal Responsibility 1. Use of network supports student learning 2. 3. 4. 5. 6. 7.
  • 8. Personal Responsibility 1. 2. Do not break any laws or use network to make money. 3. 4. 5. 6. 7.
  • 9. Personal Responsibility 1. 2. 3. Do not use network to express political views. 4. 5. 6. 7.
  • 10. Personal Responsibility 1. 2. 3. 4. Do nothing to harm hardware, software, or the network. 5. 6. 7.
  • 11. Personal Responsibility 1. 2. 3. 4. 5. Using the network to develop malicious programs is prohibited. 6. 7.
  • 12. Personal Responsibility 1. 2. 3. 4. 5. 6. The use of the network to access, store, or distribute unauthorized material (i.e. pornography) is strictly prohibited. 7.
  • 13. Personal Responsibility 1. Use of network supports student learning 2. Do not break any laws or use network to make money. 3. Do not use network to express political views. 4. Do nothing to harm hardware, software, or the network. 5. Using the network to develop malicious programs is prohibited. 6. Users are responsible for what they publish via the network. Harassment/Hate mail are prohibited. (remember whatever you write is a public document.) 7. The use of the network to access, store, or distribute unauthorized material (i.e. pornography) is strictly prohibited.
  • 14. Lab Management Return to contents
  • 15. Lab Management Please follow through on the following elements of lab management: 1) Use a seating chart so there is a record of who was at each computer.
  • 16. Lab Management Please follow through on the following elements of lab management: 1) 2) No food or drink near computers.
  • 17. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) Manage by walking around (lab time is not lecture, email, grading, or time for meeting with individuals).
  • 18. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) 4) Use Management software (LanSchool).
  • 19. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) 4) Make certain that the lab is cleaned up prior to the end of each period. (Leave at least 5 minutes for clean up).
  • 20. Lab Management Please follow through on the following elements of lab management: 1) 2) 3) 4) 5) 6) Make certain that your students know what they are doing prior to going to the lab… Most damage is done out of student frustration over assignments…If they don’t have a plan, they should not be on the computer…
  • 21. Lab Management Please follow through on the following elements of lab management: 1) Use a seating chart so there is a record of who was at each computer. 2) No food or drink near computers. 3) Manage by walking around (lab time is not lecture, email, grading, or time for meeting with individuals). 4) Use Management software (LanSchool). 5) Make certain that the lab is cleaned up prior to the end of each period. (Leave at least 5 minutes for clean up). 6) Make certain that your students know what they are doing prior to going to the lab… Most damage is done out of student frustration over assignments…If they don’t have a plan, they should not be on the computer…
  • 22. Personal Security Do not share your passwords or account privileges with anyone else. Doing so may be considered making a gift of public funds and may jeopardize the security of your account. Return to contents
  • 23. The unauthorized… Copyright -installation -use -storage -or distribution of copyrighted material or software on district computers is prohibited. Helpful hint… unless the district owns the item or it is specifically marked as being able to be used in educational settings, it is copyrighted and you need the creator’s permission. This includes anything you get from the internet as well. Return to contents Image by Stephen Downes
  • 25. Repairs 1) Turn everything off and back on (90% of problems may be solved by a simple reboot.) 2) 3) 4)
  • 26. Repairs 1) 2) If it is a gray tower, we need to fix it ourselves. (Send Bill and Paul an email… do not just write it on the board, we won’t see it) 3) 4)
  • 27. Repairs 1) 2) 3) Do not let students work on computers. 4)
  • 28. Repairs 1) 2) 3) 4) If you need a software update or a repair for a laptop/black tower, go online and fill out a trouble ticket. Do not leave it for someone else to take care of.
  • 29. Repairs 1) Turn everything off and back on (90% of problems may be solved by a simple reboot.) 2) If it is a gray tower, we need to fix it ourselves. (Send Bill and Paul an email… do not just write it on the board, we won’t see it) 3) Do not let students work on computers. 4) If you need a software update or a repair for a laptop/black tower, go online and fill out a trouble ticket. Do not leave it for someone else to take care of.
  • 30. Consequences Return to contents
  • 31. Consequences • For security and administrative purposes the district retains the right for authorized personnel to review network system use and file content. • •
  • 32. Consequences • • The district reserves the right to remove a user account to prevent further unauthorized activity. • •
  • 33. Consequences • • • The District’s service provider reserves the right to disconnect the district to prevent further unauthorized activity. •
  • 34. Consequences • • • • Violation of any of the conditions of use may be cause for loss of network privileges and/or disciplinary action up to and including termination of employment.
  • 35. Consequences • For security and administrative purposes the district retains the right for authorized personnel to review network system use and file content. • The district reserves the right to remove a user account to prevent further unauthorized activity. • The District’s service provider reserves the right to disconnect the district to prevent further unauthorized activity. • Violation of any of the conditions of use may be cause for loss of network privileges and/or disciplinary action up to and including termination of employment.