technology acceptable use policy for students 08202011[1]
TRANSCRIPT
![Page 1: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/1.jpg)
Technology Acceptable Use Policy
Lockhart ISD
![Page 2: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/2.jpg)
Technology Acceptable Use Policy
PurposeStaff Technology Acceptable Use PolicyStudent Technology Acceptable Use
PolicyUser Agreements
![Page 3: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/3.jpg)
PURPOSETechnology Acceptable Use Policy
![Page 4: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/4.jpg)
Purpose
Enhance quality of student learningEnhance staff & student efficiencyEnsure protection of students and staffProtect hardware and softwareSets standards for technology usage
![Page 5: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/5.jpg)
Governances
SchoolLocal, state and federal lawLISD has a duty to investigate suspected
violations
![Page 6: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/6.jpg)
Technology Resources
Any electronic tool, device, program, or system that aids the educational and work environment
Personal devices are included in the AUPMust meet LISD minimum requirements—
virus protection softwareApproved by technology department or
campus administrator
![Page 7: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/7.jpg)
STAFF TECHNOLOGY ACCEPTABLE USE POLICY
Technology Acceptable Use Policy
![Page 8: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/8.jpg)
Staff Technology Acceptable Use Policy
LISD employees follow an acceptable use policy
![Page 9: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/9.jpg)
STUDENT TECHNOLOGY ACCEPTABLE USE POLICY
Technology Acceptable Use Policy
![Page 10: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/10.jpg)
Student Technology Acceptable Use Policy
Established for limited educational purposes Classroom activities, career development, limited
high-quality self-discovery activities
Not a public access service or public forum Student has access unless a parent/guardian
denies access All activity is monitored Follow same rules, good manners and common
sense guidelines used with other daily school activities
![Page 11: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/11.jpg)
General Unacceptable Behavior
Posting information that will cause damage or disruption of technology
Engaging in personal attacks Harassing another person Posting false or defamatory information Using criminal speech Using speech inappropriate in an educational
setting
![Page 12: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/12.jpg)
General Unacceptable Behavior
Abusing network resources–chain letters Displaying, accessing or sending offensive
messages or pictures Using for commercial purposes—garage
sales, fundraisers, benefits Political lobbying Accessing unauthorized district systems—
Skyward
![Page 13: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/13.jpg)
General Unacceptable Behavior
Using district resources to threaten employees Sending or posting messages that are
Abusive Obscene Sexually oriented Threatening Harassing Damaging to another’s reputation Illegal Bullying
![Page 14: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/14.jpg)
Students will only use teacher or classroom accounts No private email is allowed Students cannot create private accounts at school Students will not repost a message that was sent to
them privately without the permission of the person who sent them the message.
Students will not post private information about another person.
![Page 15: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/15.jpg)
World Wide Web
Online textbooks and curriculum sites
Sites will be actively monitored by teachers and the technology department
Annual Internet safety training for students
![Page 16: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/16.jpg)
Real-time, Interactive Communication Areas
Blogs, Wikis, & Social Networking will only be used when directed by the teacher
Use only to support educational activities
![Page 17: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/17.jpg)
School Web Sites
Class websites may have Group pictures without identification Individual students without identification Student work with first name only
Materials on web must meet academic standards Graphics, text, sound, etc. must have copyright
approval Must have link back to campus/district
![Page 18: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/18.jpg)
Personal Safety
Students will not share personal contact information about themselves or other people. Address Telephone School address Home address
Do not give full name or any other personal contact information for any purpose.
Do not agree to meet with someone you have met online.
Tell an adult if any message received is inappropriate or makes you feel uncomfortable
![Page 19: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/19.jpg)
System Security
Students should secure user names and passwords Notify an adult if a security problem has been
identified Do not attempt to gain unauthorized access to LISD
network Do not attempt to disrupt the network or destroy data Do not attempt to access blocked sites Do not use sniffing or remote access technology to
monitor network activity Do not create unauthorized networks
![Page 20: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/20.jpg)
Software and Files
Software is for educational use
Permission is needed to install, upload or download software
Intentional misuse may result in disciplinary action
Electronic files are not private
USB devices should be used for storage only—not software
![Page 21: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/21.jpg)
Technology Hardware
Used for educational purposes
Do not relocate hardware
LISD regulates hardware/software on the network including personal devices
LISD equipment may only be used to support educational goals
![Page 22: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/22.jpg)
Vandalism
Any malicious attempt to harm or destroy data or the network will result in cancellation of network privileges
Disciplinary measure will be enforced
![Page 23: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/23.jpg)
Plagiarism and Copyright Infringement
Plagiarism is not allowed
Copyright laws govern use of material
Copyrighted material used in the district must have author’s permission
![Page 24: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/24.jpg)
Videoconference
Videoconferencing is allowedMay be videotaped by district personnelSchool acceptable use and behavior
rules apply during conferences
![Page 25: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/25.jpg)
Student Rights
Electronic network is a limited forum for valid educational purposes
Searches will be conducted if there is reasonable suspicion of a violation
![Page 26: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/26.jpg)
Due Process
LISD will cooperate with local, state or federal officials if illegal activities occur
Student will be provided with notice and an opportunity to be heard in the manner set forth in the disciplinary code
![Page 27: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/27.jpg)
Violations of this Acceptable Use Policy
Violations of this policy may result in loss of access as well as other disciplinary or legal action.
Examples: Use of district network only under direct supervision Suspension of network privileges Revocation of network privileges Suspension of computer privileges Suspension from school Expulsion from school and/or Legal action and prosecution by the authorities
![Page 28: Technology acceptable use policy for students 08202011[1]](https://reader035.vdocuments.us/reader035/viewer/2022081602/5554d6b8b4c905a16f8b4db3/html5/thumbnails/28.jpg)
Student User Agreement
Student Name ___________________________________
Grade ________ School ________________________________________
I have read the Lockhart ISD Student Technology Acceptable Use Policy Rules and Procedures document. I agree to follow the rules contained in this policy. I understand that if I violate the rules my access can be terminated and I may face other disciplinary measures.
Student Signature _____________________________________________
Date ________________