staff acceptable use policy

Post on 18-Jun-2015

372 Views

Category:

Education

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Taken from Board Policy No. 2022P

The Normal StuffGeneral Use Personal Security

Personal Responsibility Copyright

Lab Management Repairs

Consequences

Please click on each title to learn more.

General Use

The network exists primarily for email and internet research.

Return to contents

General Use

It is not intended to be used for non academic purposes.

General Use

Network bandwidth is limited so teachers should not waste or allow students to waste this resource.

General Use

The network exists primarily for email and internet research.

It is not intended to be used for non academic purposes.

Network bandwidth is limited so teachers should not waste or allow students to waste this resource.

Personal Responsibility1. Use of network supports student learning2. 3.4.5.6.7.

Personal Responsibility1. 2. Do not break any laws or use network to make money.3.4.5.6.7.

Personal Responsibility1. 2. 3. Do not use network to express political views.4.5.6.7.

Personal Responsibility1. 2. 3. 4. Do nothing to harm hardware, software, or the network.5.6.7.

Personal Responsibility1. 2. 3. 4. 5. Using the network to develop malicious programs is

prohibited.6.7.

Personal Responsibility1. 2. 3. 4. 5. 6. The use of the network to access, store, or distribute

unauthorized material (i.e. pornography) is strictly prohibited.

7.

Personal Responsibility1. Use of network supports student learning2. Do not break any laws or use network to make money.3. Do not use network to express political views.4. Do nothing to harm hardware, software, or the network.5. Using the network to develop malicious programs is

prohibited.6. Users are responsible for what they publish via the network.

Harassment/Hate mail are prohibited. (remember whatever you write is a public document.)

7. The use of the network to access, store, or distribute unauthorized material (i.e. pornography) is strictly prohibited.

Lab Management

Return to contents

Please follow through on the following elements of lab management:1) Use a seating chart so there is a record of who was at each

computer.

Lab Management

Please follow through on the following elements of lab management:1) 2) No food or drink near computers.

Lab Management

Please follow through on the following elements of lab management:1) 2) 3) Manage by walking around (lab time is not lecture, email, grading,

or time for meeting with individuals).

Lab Management

Please follow through on the following elements of lab management:1) 2) 3) 4) Use Management software (LanSchool).

Lab Management

Please follow through on the following elements of lab management:1) 2) 3) 4) Make certain that the lab is cleaned up prior to the end of each

period. (Leave at least 5 minutes for clean up).

Lab Management

Please follow through on the following elements of lab management:1) 2) 3) 4) 5) 6) Make certain that your students know what they are doing prior

to going to the lab… Most damage is done out of student frustration over assignments…If they don’t have a plan, they should not be on the computer…

Lab Management

Please follow through on the following elements of lab management:1) Use a seating chart so there is a record of who was at each

computer.2) No food or drink near computers.3) Manage by walking around (lab time is not lecture, email, grading,

or time for meeting with individuals).4) Use Management software (LanSchool).5) Make certain that the lab is cleaned up prior to the end of each

period. (Leave at least 5 minutes for clean up).6) Make certain that your students know what they are doing prior

to going to the lab… Most damage is done out of student frustration over assignments…If they don’t have a plan, they should not be on the computer…

Lab Management

Personal Security

Do not share your passwords or account privileges with anyone else.

Doing so may be considered making a gift of public funds and may jeopardize the security of your account.

Return to contents

CopyrightThe unauthorized…-installation -use -storage-or distribution of copyrighted

material or software on district computers is prohibited.

Return to contentsImage by Stephen Downes

Helpful hint… unless the district owns the item or it is specifically marked as being able to be used in educational settings, it is copyrighted and you need the creator’s permission.

This includes anything you get from the internet as well.

Repairs

Return to contents

Repairs1) Turn everything off and back on (90% of problems

may be solved by a simple reboot.)2) 3) 4)

Repairs1) 2) If it is a gray tower, we need to fix it ourselves. (Send

Bill and Paul an email… do not just write it on the board, we won’t see it)

3) 4)

Repairs1) 2) 3) Do not let students work on computers.4)

Repairs1) 2) 3) 4) If you need a software update or a repair for a

laptop/black tower, go online and fill out a trouble ticket. Do not leave it for someone else to take care of.

Repairs1) Turn everything off and back on (90% of problems

may be solved by a simple reboot.)2) If it is a gray tower, we need to fix it ourselves. (Send

Bill and Paul an email… do not just write it on the board, we won’t see it)

3) Do not let students work on computers.4) If you need a software update or a repair for a

laptop/black tower, go online and fill out a trouble ticket. Do not leave it for someone else to take care of.

Consequences

Return to contents

Consequences• For security and administrative purposes the district retains

the right for authorized personnel to review network system use and file content.

Consequences•

• The district reserves the right to remove a user account to prevent further unauthorized activity.

Consequences•

• The District’s service provider reserves the right to disconnect the district to prevent further unauthorized activity.

Consequences•

• Violation of any of the conditions of use may be cause for loss of network privileges and/or disciplinary action up to and including termination of employment.

Consequences• For security and administrative purposes the district retains

the right for authorized personnel to review network system use and file content.

• The district reserves the right to remove a user account to prevent further unauthorized activity.

• The District’s service provider reserves the right to disconnect the district to prevent further unauthorized activity.

• Violation of any of the conditions of use may be cause for loss of network privileges and/or disciplinary action up to and including termination of employment.

top related