SlideShare a Scribd company logo
1 of 17
Responsible Use
  Guidelines
     Eanes ISD
• Text Messaging
•     Electronic Media
  Blogs
• Posts
• Tweets
• Instant Messaging
• email
• Video Sharing
• Comments posted
• Social Network sites
• Forums
BYOT
     (Bring Your Own Technology)
     (Bring Your Own Technology)
• Students can bring their own technology to
  connect.
• We don’t support their devices technically
• We are not responsible for their data plans
  as they can connect to our “Eanes Guest”
  network.
• Must comply with the Responsible Use
  Guidelines
Unacceptable and
     Irresponsible Use
Unauthorized use of copyrighted materials or
      software licensing agreements
Unacceptable and
 Irresponsible Use
Sending or posting of abusive content
Unacceptable and
  Irresponsible Use
Use of technology to encourage illegal
 behavior or threaten school safety
Unacceptable and
     Irresponsible Use
Personal and/or political use to advocate for
       a candidate or political issue.
Unacceptable and
    Irresponsible Use
 Attempting to destroy or disable district
technology equipment, district data, or the
     data of other users or networks
Unacceptable and
    Irresponsible Use
Posting personal information about yourself
   or others (such as phone numbers or
    addresses) for non-school business
Unacceptable and
     Irresponsible Use
Forgery of electronic messages (email, posts,
    etc) or transmission of junk email.
Unacceptable and
     Irresponsible Use
Use of systems for commercial activities or
             commercial gain.
Unacceptable and
    Irresponsible Use
Wasting school resources through improper
      use of the computer systems.
Unacceptable and
     Irresponsible Use
Any use that violates the employee handbook
                 or is illegal.
Social Media & Cloud
            Storage

• Notify parents prior to use if for a class
  project
• Use of Facebook through a fan
  page acceptable
• Use of all social media during work hours
  should be professional in nature.
Social Media & Cloud
            Storage
• Cannot use district logo without consent
• Keep confidential files off of 3rd party
  cloud storage sites
• Keep personal life and professional life
  separate on email, social media
• Follow the Code of Ethics and Standard
  Practices for Texas Educators
Code of Ethics and Standard
          Practices for Texas Educators
Personal or Professional electronic
communication which violates any of the
following:
  •Confidentiality of student records
  •Confidentiality of health or personnel information
  concerning colleagues
  •Confidentiality of district records including
  evaluations and private email addreses
  •Harming others by knowingly making false
  statements about a colleague or the school system.
Responsible Use
  Guidelines
     Eanes ISD

More Related Content

What's hot

Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
Technology Safety Practices
Technology Safety PracticesTechnology Safety Practices
Technology Safety PracticesShireen Mitchell
 
Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)MMHoward
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
Software Asset Management Power Point For Employers W Presentation Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  NotesSoftware  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software Asset Management Power Point For Employers W Presentation Notesguest78023a
 
Mohamed rashid salim
Mohamed rashid salimMohamed rashid salim
Mohamed rashid salimHAMOOD13
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPSJeanette Murphy
 
The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethicssalj_16
 
Orientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafetyOrientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafetymthomson
 

What's hot (20)

Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Presentation1
Presentation1Presentation1
Presentation1
 
Technology Safety Practices
Technology Safety PracticesTechnology Safety Practices
Technology Safety Practices
 
Cybersmart
CybersmartCybersmart
Cybersmart
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Ali abdullah
Ali abdullahAli abdullah
Ali abdullah
 
TimDavis
TimDavisTimDavis
TimDavis
 
Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical use
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Parent ed is_mh
Parent ed is_mhParent ed is_mh
Parent ed is_mh
 
Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
COmPuter
COmPuterCOmPuter
COmPuter
 
Software Asset Management Power Point For Employers W Presentation Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  NotesSoftware  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software Asset Management Power Point For Employers W Presentation Notes
 
Mohamme d hamed
Mohamme d hamedMohamme d hamed
Mohamme d hamed
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Mohamed rashid salim
Mohamed rashid salimMohamed rashid salim
Mohamed rashid salim
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPS
 
The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethics
 
Orientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafetyOrientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafety
 

Viewers also liked

Welcome to the world of irresponsible intelligence!
Welcome to the world of irresponsible intelligence!Welcome to the world of irresponsible intelligence!
Welcome to the world of irresponsible intelligence!Krishna Kishore Bhavaraju
 
Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?
Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?
Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?Horizons RG
 
Following instructions
Following instructionsFollowing instructions
Following instructionsJohnPickar
 
Following and writing instructions (Continued)
Following and writing instructions (Continued)Following and writing instructions (Continued)
Following and writing instructions (Continued)Javier Cárdenas
 
Drug & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...
Drug  & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...Drug  & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...
Drug & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...OrnellaRN
 
13 Personality Traits Of A Horrible Employee
13 Personality Traits Of A Horrible Employee13 Personality Traits Of A Horrible Employee
13 Personality Traits Of A Horrible EmployeeD B
 
Following and writing instructions
Following and writing instructionsFollowing and writing instructions
Following and writing instructionsJavier Cárdenas
 

Viewers also liked (8)

Reducing irresponsible use of alcohol
Reducing irresponsible use of alcoholReducing irresponsible use of alcohol
Reducing irresponsible use of alcohol
 
Welcome to the world of irresponsible intelligence!
Welcome to the world of irresponsible intelligence!Welcome to the world of irresponsible intelligence!
Welcome to the world of irresponsible intelligence!
 
Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?
Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?
Dr. Alex Blaszczynski: Breaks in Play - An Irresponsible Strategy?
 
Following instructions
Following instructionsFollowing instructions
Following instructions
 
Following and writing instructions (Continued)
Following and writing instructions (Continued)Following and writing instructions (Continued)
Following and writing instructions (Continued)
 
Drug & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...
Drug  & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...Drug  & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...
Drug & substance abuse Marijuana, Cocaine, Heroine, alcohol and prescription...
 
13 Personality Traits Of A Horrible Employee
13 Personality Traits Of A Horrible Employee13 Personality Traits Of A Horrible Employee
13 Personality Traits Of A Horrible Employee
 
Following and writing instructions
Following and writing instructionsFollowing and writing instructions
Following and writing instructions
 

Similar to Responsible use presentation

Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]ajdredla
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]ajdredla
 
Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conductsupunls
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]Debbie Oliver
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyKoolteechatechnology
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policyiamprosperous
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbookJG4191
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ssLenva Shearing
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kittrtkaren
 

Similar to Responsible use presentation (20)

Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]
 
Ict code of conduct
Ict code of conductIct code of conduct
Ict code of conduct
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
Social media policy
Social media policySocial media policy
Social media policy
 
CMS Technology acceptable use policy
CMS Technology acceptable use policyCMS Technology acceptable use policy
CMS Technology acceptable use policy
 
Technology acceptable use policy gr 7 day 1
Technology acceptable use policy   gr 7 day 1Technology acceptable use policy   gr 7 day 1
Technology acceptable use policy gr 7 day 1
 
Acceptable Use Agreement Students 2011
Acceptable Use Agreement Students 2011Acceptable Use Agreement Students 2011
Acceptable Use Agreement Students 2011
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Computer safety
Computer safetyComputer safety
Computer safety
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
educ 103
educ 103educ 103
educ 103
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbook
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kit
 

More from Carl Hooker

Digital parent night
Digital parent nightDigital parent night
Digital parent nightCarl Hooker
 
Space…The Final Learning Frontier - TCEA 2014
Space…The Final Learning Frontier - TCEA 2014Space…The Final Learning Frontier - TCEA 2014
Space…The Final Learning Frontier - TCEA 2014Carl Hooker
 
10 Things Not to Do in a 1:1 iPad Classroom
10 Things Not to Do in a 1:1 iPad Classroom10 Things Not to Do in a 1:1 iPad Classroom
10 Things Not to Do in a 1:1 iPad ClassroomCarl Hooker
 
LEAP and Digital Learning at EanesISD
LEAP and Digital Learning at EanesISDLEAP and Digital Learning at EanesISD
LEAP and Digital Learning at EanesISDCarl Hooker
 
Middle School iPad Parent Night
Middle School iPad Parent NightMiddle School iPad Parent Night
Middle School iPad Parent NightCarl Hooker
 
Leap presentation
Leap presentationLeap presentation
Leap presentationCarl Hooker
 
April 17th Westlake High School Visit
April 17th Westlake High School VisitApril 17th Westlake High School Visit
April 17th Westlake High School VisitCarl Hooker
 
SXSWedu - March 7, 2012
SXSWedu - March 7, 2012SXSWedu - March 7, 2012
SXSWedu - March 7, 2012Carl Hooker
 
Wifi presentation tampa final
Wifi presentation tampa finalWifi presentation tampa final
Wifi presentation tampa finalCarl Hooker
 
iOS webinar on management
iOS webinar on managementiOS webinar on management
iOS webinar on managementCarl Hooker
 

More from Carl Hooker (10)

Digital parent night
Digital parent nightDigital parent night
Digital parent night
 
Space…The Final Learning Frontier - TCEA 2014
Space…The Final Learning Frontier - TCEA 2014Space…The Final Learning Frontier - TCEA 2014
Space…The Final Learning Frontier - TCEA 2014
 
10 Things Not to Do in a 1:1 iPad Classroom
10 Things Not to Do in a 1:1 iPad Classroom10 Things Not to Do in a 1:1 iPad Classroom
10 Things Not to Do in a 1:1 iPad Classroom
 
LEAP and Digital Learning at EanesISD
LEAP and Digital Learning at EanesISDLEAP and Digital Learning at EanesISD
LEAP and Digital Learning at EanesISD
 
Middle School iPad Parent Night
Middle School iPad Parent NightMiddle School iPad Parent Night
Middle School iPad Parent Night
 
Leap presentation
Leap presentationLeap presentation
Leap presentation
 
April 17th Westlake High School Visit
April 17th Westlake High School VisitApril 17th Westlake High School Visit
April 17th Westlake High School Visit
 
SXSWedu - March 7, 2012
SXSWedu - March 7, 2012SXSWedu - March 7, 2012
SXSWedu - March 7, 2012
 
Wifi presentation tampa final
Wifi presentation tampa finalWifi presentation tampa final
Wifi presentation tampa final
 
iOS webinar on management
iOS webinar on managementiOS webinar on management
iOS webinar on management
 

Recently uploaded

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Responsible use presentation

  • 1. Responsible Use Guidelines Eanes ISD
  • 2. • Text Messaging • Electronic Media Blogs • Posts • Tweets • Instant Messaging • email • Video Sharing • Comments posted • Social Network sites • Forums
  • 3. BYOT (Bring Your Own Technology) (Bring Your Own Technology) • Students can bring their own technology to connect. • We don’t support their devices technically • We are not responsible for their data plans as they can connect to our “Eanes Guest” network. • Must comply with the Responsible Use Guidelines
  • 4. Unacceptable and Irresponsible Use Unauthorized use of copyrighted materials or software licensing agreements
  • 5. Unacceptable and Irresponsible Use Sending or posting of abusive content
  • 6. Unacceptable and Irresponsible Use Use of technology to encourage illegal behavior or threaten school safety
  • 7. Unacceptable and Irresponsible Use Personal and/or political use to advocate for a candidate or political issue.
  • 8. Unacceptable and Irresponsible Use Attempting to destroy or disable district technology equipment, district data, or the data of other users or networks
  • 9. Unacceptable and Irresponsible Use Posting personal information about yourself or others (such as phone numbers or addresses) for non-school business
  • 10. Unacceptable and Irresponsible Use Forgery of electronic messages (email, posts, etc) or transmission of junk email.
  • 11. Unacceptable and Irresponsible Use Use of systems for commercial activities or commercial gain.
  • 12. Unacceptable and Irresponsible Use Wasting school resources through improper use of the computer systems.
  • 13. Unacceptable and Irresponsible Use Any use that violates the employee handbook or is illegal.
  • 14. Social Media & Cloud Storage • Notify parents prior to use if for a class project • Use of Facebook through a fan page acceptable • Use of all social media during work hours should be professional in nature.
  • 15. Social Media & Cloud Storage • Cannot use district logo without consent • Keep confidential files off of 3rd party cloud storage sites • Keep personal life and professional life separate on email, social media • Follow the Code of Ethics and Standard Practices for Texas Educators
  • 16. Code of Ethics and Standard Practices for Texas Educators Personal or Professional electronic communication which violates any of the following: •Confidentiality of student records •Confidentiality of health or personnel information concerning colleagues •Confidentiality of district records including evaluations and private email addreses •Harming others by knowingly making false statements about a colleague or the school system.
  • 17. Responsible Use Guidelines Eanes ISD